nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Elliptic Curve Trapdoor System
|
Teske, Edlyn |
|
2005 |
19 |
1 |
p. 115-133 |
artikel |
2 |
An Elliptic Curve Trapdoor System
|
Teske, Edlyn |
|
|
19 |
1 |
p. 115-133 |
artikel |
3 |
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
|
Denef, Jan |
|
2005 |
19 |
1 |
p. 1-25 |
artikel |
4 |
An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2
|
Denef, Jan |
|
|
19 |
1 |
p. 1-25 |
artikel |
5 |
Characterization of Security Notions for Probabilistic Private-Key Encryption
|
Katz, Jonathan |
|
2005 |
19 |
1 |
p. 67-95 |
artikel |
6 |
Characterization of Security Notions for Probabilistic Private-Key Encryption
|
Katz, Jonathan |
|
|
19 |
1 |
p. 67-95 |
artikel |
7 |
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives
|
Chang, Yan-Cheng |
|
2005 |
19 |
1 |
p. 97-114 |
artikel |
8 |
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives
|
Chang, Yan-Cheng |
|
|
19 |
1 |
p. 97-114 |
artikel |
9 |
Threshold Password-Authenticated Key Exchange
|
MacKenzie, Philip |
|
2005 |
19 |
1 |
p. 27-66 |
artikel |
10 |
Threshold Password-Authenticated Key Exchange
|
MacKenzie, Philip |
|
|
19 |
1 |
p. 27-66 |
artikel |