no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Almost-Everywhere Secure Computation with Edge Corruptions
|
Chandran, Nishanth |
|
2013 |
28 |
4 |
p. 745-768 |
article |
2 |
Almost-Everywhere Secure Computation with Edge Corruptions
|
Chandran, Nishanth |
|
|
28 |
4 |
p. 745-768 |
article |
3 |
Collision Attack on Grindahl
|
Peyrin, Thomas |
|
2014 |
28 |
4 |
p. 879-898 |
article |
4 |
Collision Attack on Grindahl
|
Peyrin, Thomas |
|
|
28 |
4 |
p. 879-898 |
article |
5 |
New Proofs for NMAC and HMAC: Security without Collision Resistance
|
Bellare, Mihir |
|
2014 |
28 |
4 |
p. 844-878 |
article |
6 |
New Proofs for NMAC and HMAC: Security without Collision Resistance
|
Bellare, Mihir |
|
|
28 |
4 |
p. 844-878 |
article |
7 |
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
|
Procter, Gordon |
|
2014 |
28 |
4 |
p. 769-795 |
article |
8 |
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
|
Procter, Gordon |
|
|
28 |
4 |
p. 769-795 |
article |
9 |
Spreading Alerts Quietly and the Subgroup Escape Problem
|
Aspnes, James |
|
2014 |
28 |
4 |
p. 796-819 |
article |
10 |
Spreading Alerts Quietly and the Subgroup Escape Problem
|
Aspnes, James |
|
|
28 |
4 |
p. 796-819 |
article |
11 |
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs
|
Gentry, Craig |
|
2014 |
28 |
4 |
p. 820-843 |
article |
12 |
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs
|
Gentry, Craig |
|
|
28 |
4 |
p. 820-843 |
article |