Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             5 results found
no title author magazine year volume issue page(s) type
1 A Proof of Security of Yao’s Protocol for Two-Party Computation Lindell, Yehuda
2008
22 2 p. 161-188
article
2 Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography Barbosa, M.
2008
22 2 p. 259-281
article
3 Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Nguyen, Phong Q.
2008
22 2 p. 139-160
article
4 Multipartite Secret Sharing by Bivariate Interpolation Tassa, Tamir
2008
22 2 p. 227-258
article
5 Non-interactive Timestamping in the Bounded-Storage Model Moran, Tal
2009
22 2 p. 189-226
article
                             5 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands