nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
|
Stankovski, Paul |
|
2012 |
27 |
1 |
p. 1-22 |
artikel |
2 |
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
|
Stankovski, Paul |
|
|
27 |
1 |
p. 1-22 |
artikel |
3 |
A New Interactive Hashing Theorem
|
Haitner, Iftach |
|
2013 |
27 |
1 |
p. 109-138 |
artikel |
4 |
A New Interactive Hashing Theorem
|
Haitner, Iftach |
|
|
27 |
1 |
p. 109-138 |
artikel |
5 |
A One-Time Stegosystem and Applications to Efficient Covert Communication
|
Kiayias, Aggelos |
|
2012 |
27 |
1 |
p. 23-44 |
artikel |
6 |
A One-Time Stegosystem and Applications to Efficient Covert Communication
|
Kiayias, Aggelos |
|
|
27 |
1 |
p. 23-44 |
artikel |
7 |
Concurrent Zero Knowledge, Revisited
|
Pass, Rafael |
|
2012 |
27 |
1 |
p. 45-66 |
artikel |
8 |
Concurrent Zero Knowledge, Revisited
|
Pass, Rafael |
|
|
27 |
1 |
p. 45-66 |
artikel |
9 |
Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms
|
Hong, Jin |
|
2012 |
27 |
1 |
p. 181 |
artikel |
10 |
(Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher
|
Sen Gupta, Sourav |
|
2012 |
27 |
1 |
p. 67-108 |
artikel |
11 |
(Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher
|
Sen Gupta, Sourav |
|
|
27 |
1 |
p. 67-108 |
artikel |
12 |
Security Models and Proof Strategies for Plaintext-Aware Encryption
|
Birkett, James |
|
2013 |
27 |
1 |
p. 139-180 |
artikel |
13 |
Security Models and Proof Strategies for Plaintext-Aware Encryption
|
Birkett, James |
|
|
27 |
1 |
p. 139-180 |
artikel |