Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Fuller, Benjamin
2013
28 3 p. 671-717
article
2 A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Fuller, Benjamin

28 3 p. 671-717
article
3 GNUC: A New Universal Composability Framework Hofheinz, Dennis
2013
28 3 p. 423-508
article
4 GNUC: A New Universal Composability Framework Hofheinz, Dennis

28 3 p. 423-508
article
5 How to Achieve Perfect Simulation and a Complete Problem for Non-interactive Perfect Zero-Knowledge Malka, Lior
2013
28 3 p. 533-550
article
6 How to Achieve Perfect Simulation and a Complete Problem for Non-interactive Perfect Zero-Knowledge Malka, Lior

28 3 p. 533-550
article
7 Improved Single-Key Attacks on 8-Round AES-192 and AES-256 Dunkelman, Orr
2013
28 3 p. 397-422
article
8 Improved Single-Key Attacks on 8-Round AES-192 and AES-256 Dunkelman, Orr

28 3 p. 397-422
article
9 On the Complexity of Constructing Pseudorandom Functions (Especially when They Don’t Exist) Miles, Eric
2013
28 3 p. 509-532
article
10 On the Complexity of Constructing Pseudorandom Functions (Especially when They Don’t Exist) Miles, Eric

28 3 p. 509-532
article
11 Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography Tsaban, Boaz
2013
28 3 p. 601-622
article
12 Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography Tsaban, Boaz

28 3 p. 601-622
article
13 Protocols for Multiparty Coin Toss with a Dishonest Majority Beimel, Amos
2013
28 3 p. 551-600
article
14 Protocols for Multiparty Coin Toss with a Dishonest Majority Beimel, Amos

28 3 p. 551-600
article
15 Provable Unlinkability Against Traffic Analysis with Low Message Overhead Berman, Ron
2013
28 3 p. 623-640
article
16 Provable Unlinkability Against Traffic Analysis with Low Message Overhead Berman, Ron

28 3 p. 623-640
article
17 Reflection Cryptanalysis of PRINCE-Like Ciphers Soleimany, Hadi
2013
28 3 p. 718-744
article
18 Reflection Cryptanalysis of PRINCE-Like Ciphers Soleimany, Hadi

28 3 p. 718-744
article
19 Tight Security for Signature Schemes Without Random Oracles Schäge, Sven
2013
28 3 p. 641-670
article
20 Tight Security for Signature Schemes Without Random Oracles Schäge, Sven

28 3 p. 641-670
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands