nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis of an Unconditionally Secure Distributed Oblivious Transfer
|
Ghodosi, Hossein |
|
2011 |
26 |
1 |
p. 75-79 |
artikel |
2 |
Analysis of an Unconditionally Secure Distributed Oblivious Transfer
|
Ghodosi, Hossein |
|
|
26 |
1 |
p. 75-79 |
artikel |
3 |
A Single-Key Attack on the Full GOST Block Cipher
|
Isobe, Takanori |
|
2012 |
26 |
1 |
p. 172-189 |
artikel |
4 |
A Single-Key Attack on the Full GOST Block Cipher
|
Isobe, Takanori |
|
|
26 |
1 |
p. 172-189 |
artikel |
5 |
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields
|
Joux, Antoine |
|
2011 |
26 |
1 |
p. 119-143 |
artikel |
6 |
Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields
|
Joux, Antoine |
|
|
26 |
1 |
p. 119-143 |
artikel |
7 |
Input Locality and Hardness Amplification
|
Bogdanov, Andrej |
|
2011 |
26 |
1 |
p. 144-171 |
artikel |
8 |
Input Locality and Hardness Amplification
|
Bogdanov, Andrej |
|
|
26 |
1 |
p. 144-171 |
artikel |
9 |
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
|
Freeman, David Mandell |
|
2011 |
26 |
1 |
p. 39-74 |
artikel |
10 |
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
|
Freeman, David Mandell |
|
|
26 |
1 |
p. 39-74 |
artikel |
11 |
Practical Chosen Ciphertext Secure Encryption from Factoring
|
Hofheinz, Dennis |
|
2011 |
26 |
1 |
p. 102-118 |
artikel |
12 |
Practical Chosen Ciphertext Secure Encryption from Factoring
|
Hofheinz, Dennis |
|
|
26 |
1 |
p. 102-118 |
artikel |
13 |
Public-Coin Parallel Zero-Knowledge for NP
|
Pass, Rafael |
|
2011 |
26 |
1 |
p. 1-10 |
artikel |
14 |
Public-Coin Parallel Zero-Knowledge for NP
|
Pass, Rafael |
|
|
26 |
1 |
p. 1-10 |
artikel |
15 |
Secure Integration of Asymmetric and Symmetric Encryption Schemes
|
Fujisaki, Eiichiro |
|
2011 |
26 |
1 |
p. 80-101 |
artikel |
16 |
Secure Integration of Asymmetric and Symmetric Encryption Schemes
|
Fujisaki, Eiichiro |
|
|
26 |
1 |
p. 80-101 |
artikel |
17 |
Slender-Set Differential Cryptanalysis
|
Borghoff, Julia |
|
2011 |
26 |
1 |
p. 11-38 |
artikel |
18 |
Slender-Set Differential Cryptanalysis
|
Borghoff, Julia |
|
|
26 |
1 |
p. 11-38 |
artikel |