Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 Almost-Everywhere Secure Computation with Edge Corruptions Chandran, Nishanth
2013
28 4 p. 745-768
article
2 Almost-Everywhere Secure Computation with Edge Corruptions Chandran, Nishanth

28 4 p. 745-768
article
3 Collision Attack on Grindahl Peyrin, Thomas
2014
28 4 p. 879-898
article
4 Collision Attack on Grindahl Peyrin, Thomas

28 4 p. 879-898
article
5 New Proofs for NMAC and HMAC: Security without Collision Resistance Bellare, Mihir
2014
28 4 p. 844-878
article
6 New Proofs for NMAC and HMAC: Security without Collision Resistance Bellare, Mihir

28 4 p. 844-878
article
7 On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes Procter, Gordon
2014
28 4 p. 769-795
article
8 On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes Procter, Gordon

28 4 p. 769-795
article
9 Spreading Alerts Quietly and the Subgroup Escape Problem Aspnes, James
2014
28 4 p. 796-819
article
10 Spreading Alerts Quietly and the Subgroup Escape Problem Aspnes, James

28 4 p. 796-819
article
11 Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Gentry, Craig
2014
28 4 p. 820-843
article
12 Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Gentry, Craig

28 4 p. 820-843
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands