nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Another Look at "Provable Security"
|
Koblitz, Neal |
|
2005 |
20 |
1 |
p. 3-37 |
artikel |
2 |
Another Look at "Provable Security"
|
Koblitz, Neal |
|
|
20 |
1 |
p. 3-37 |
artikel |
3 |
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
|
Coron, Jean-Sebastien |
|
2006 |
20 |
1 |
p. 39-50 |
artikel |
4 |
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring
|
Coron, Jean-Sebastien |
|
|
20 |
1 |
p. 39-50 |
artikel |
5 |
Editor's Note
|
|
|
2007 |
20 |
1 |
p. 1 |
artikel |
6 |
Editor's Note
|
|
|
|
20 |
1 |
p. 1 |
artikel |
7 |
Scalable Protocols for Authenticated Group Key Exchange
|
Katz, Jonathan |
|
2006 |
20 |
1 |
p. 85-113 |
artikel |
8 |
Scalable Protocols for Authenticated Group Key Exchange
|
Katz, Jonathan |
|
|
20 |
1 |
p. 85-113 |
artikel |
9 |
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
|
Gennaro, Rosario |
|
2006 |
20 |
1 |
p. 51-83 |
artikel |
10 |
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
|
Gennaro, Rosario |
|
|
20 |
1 |
p. 51-83 |
artikel |
11 |
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
|
Catalano, Dario |
|
2006 |
20 |
1 |
p. 115-149 |
artikel |
12 |
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
|
Catalano, Dario |
|
|
20 |
1 |
p. 115-149 |
artikel |