Works matching IS 18622976 AND DT 2017 AND VI 11 AND IP 3
Results: 3
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack.
- Published in:
- Journal of Mathematical Cryptology, 2017, v. 11, n. 3, p. 177, doi. 10.1515/jmc-2015-0059
- By:
- Publication type:
- Article
Rigorous upper bounds on data complexities of block cipher cryptanalysis.
- Published in:
- Journal of Mathematical Cryptology, 2017, v. 11, n. 3, p. 147, doi. 10.1515/jmc-2016-0026
- By:
- Publication type:
- Article
Isolated elliptic curves and the MOV attack.
- Published in:
- Journal of Mathematical Cryptology, 2017, v. 11, n. 3, p. 131, doi. 10.1515/jmc-2016-0053
- By:
- Publication type:
- Article