Found: 4
Select item for more details and to access through your institution.
Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation.
- Published in:
- Journal of Mathematical Cryptology, 2011, v. 5, n. 2, p. 115, doi. 10.1515/JMC.2011.009
- By:
- Publication type:
- Article
Computing endomorphism rings of elliptic curves under the GRH.
- Published in:
- Journal of Mathematical Cryptology, 2011, v. 5, n. 2, p. 101, doi. 10.1515/JMC.2011.008
- By:
- Publication type:
- Article
Security of blind signatures under aborts and applications to adaptive oblivious transfer.
- Published in:
- Journal of Mathematical Cryptology, 2011, v. 5, n. 2, p. 169, doi. 10.1515/JMC.2011.011
- By:
- Publication type:
- Article
Cryptanalysis of three matrix-based key establishment protocols.
- Published in:
- Journal of Mathematical Cryptology, 2011, v. 5, n. 2, p. 159, doi. 10.1515/JMC.2011.010
- By:
- Publication type:
- Article