Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             6 results found
no title author magazine year volume issue page(s) type
1 Almost-Everywhere Secure Computation with Edge Corruptions Chandran, Nishanth
2013
28 4 p. 745-768
article
2 Collision Attack on Grindahl Peyrin, Thomas
2014
28 4 p. 879-898
article
3 New Proofs for NMAC and HMAC: Security without Collision Resistance Bellare, Mihir
2014
28 4 p. 844-878
article
4 On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes Procter, Gordon
2014
28 4 p. 769-795
article
5 Spreading Alerts Quietly and the Subgroup Escape Problem Aspnes, James
2014
28 4 p. 796-819
article
6 Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Gentry, Craig
2014
28 4 p. 820-843
article
                             6 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands