nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Proof of Security of Yao’s Protocol for Two-Party Computation
|
Lindell, Yehuda |
|
2008 |
22 |
2 |
p. 161-188 |
artikel |
2 |
A Proof of Security of Yao’s Protocol for Two-Party Computation
|
Lindell, Yehuda |
|
|
22 |
2 |
p. 161-188 |
artikel |
3 |
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography
|
Barbosa, M. |
|
2008 |
22 |
2 |
p. 259-281 |
artikel |
4 |
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography
|
Barbosa, M. |
|
|
22 |
2 |
p. 259-281 |
artikel |
5 |
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
|
Nguyen, Phong Q. |
|
2008 |
22 |
2 |
p. 139-160 |
artikel |
6 |
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
|
Nguyen, Phong Q. |
|
|
22 |
2 |
p. 139-160 |
artikel |
7 |
Multipartite Secret Sharing by Bivariate Interpolation
|
Tassa, Tamir |
|
2008 |
22 |
2 |
p. 227-258 |
artikel |
8 |
Multipartite Secret Sharing by Bivariate Interpolation
|
Tassa, Tamir |
|
|
22 |
2 |
p. 227-258 |
artikel |
9 |
Non-interactive Timestamping in the Bounded-Storage Model
|
Moran, Tal |
|
2009 |
22 |
2 |
p. 189-226 |
artikel |
10 |
Non-interactive Timestamping in the Bounded-Storage Model
|
Moran, Tal |
|
|
22 |
2 |
p. 189-226 |
artikel |