Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             6 results found
no title author magazine year volume issue page(s) type
1 Confined Guessing: New Signatures From Standard Assumptions Böhl, Florian
2014
28 1 p. 176-208
article
2 Cryptanalysis of SHA-0 and Reduced SHA-1 Biham, Eli
2014
28 1 p. 110-160
article
3 Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation Patra, Arpita
2013
28 1 p. 49-109
article
4 Quantum Private Information Retrieval has Linear Communication Complexity Baumeler, Ämin
2014
28 1 p. 161-175
article
5 Slidex Attacks on the Even–Mansour Encryption Scheme Dunkelman, Orr
2013
28 1 p. 1-28
article
6 Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? Bellare, Mihir
2013
28 1 p. 29-48
article
                             6 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands