nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Bug Attacks
|
Biham, Eli |
|
2015 |
29 |
4 |
p. 775-805 |
artikel |
2 |
Bug Attacks
|
Biham, Eli |
|
|
29 |
4 |
p. 775-805 |
artikel |
3 |
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
|
Abe, Masayuki |
|
2015 |
29 |
4 |
p. 833-878 |
artikel |
4 |
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
|
Abe, Masayuki |
|
|
29 |
4 |
p. 833-878 |
artikel |
5 |
Cryptanalysis of Full RIPEMD-128
|
Landelle, Franck |
|
2015 |
29 |
4 |
p. 927-951 |
artikel |
6 |
Cryptanalysis of Full RIPEMD-128
|
Landelle, Franck |
|
|
29 |
4 |
p. 927-951 |
artikel |
7 |
Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes
|
Dinur, Itai |
|
2015 |
29 |
4 |
p. 697-728 |
artikel |
8 |
Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes
|
Dinur, Itai |
|
|
29 |
4 |
p. 697-728 |
artikel |
9 |
New Second-Preimage Attacks on Hash Functions
|
Andreeva, Elena |
|
2015 |
29 |
4 |
p. 657-696 |
artikel |
10 |
New Second-Preimage Attacks on Hash Functions
|
Andreeva, Elena |
|
|
29 |
4 |
p. 657-696 |
artikel |
11 |
The $$\mathbb {Q}$$Q-curve Construction for Endomorphism-Accelerated Elliptic Curves
|
Smith, Benjamin |
|
2015 |
29 |
4 |
p. 806-832 |
artikel |
12 |
The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves
|
Smith, Benjamin |
|
|
29 |
4 |
p. 806-832 |
artikel |
13 |
Toward a Game Theoretic View of Secure Computation
|
Asharov, Gilad |
|
2015 |
29 |
4 |
p. 879-926 |
artikel |
14 |
Toward a Game Theoretic View of Secure Computation
|
Asharov, Gilad |
|
|
29 |
4 |
p. 879-926 |
artikel |
15 |
Unconditionally Anonymous Ring and Mesh Signatures
|
Boyen, Xavier |
|
2015 |
29 |
4 |
p. 729-774 |
artikel |
16 |
Unconditionally Anonymous Ring and Mesh Signatures
|
Boyen, Xavier |
|
|
29 |
4 |
p. 729-774 |
artikel |