nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Characterization of Secure Multiparty Computation Without Broadcast
|
Cohen, Ran |
|
2017 |
31 |
2 |
p. 587-609 |
artikel |
2 |
Characterization of Secure Multiparty Computation Without Broadcast
|
Cohen, Ran |
|
|
31 |
2 |
p. 587-609 |
artikel |
3 |
Deterministic Encryption with the Thorp Shuffle
|
Morris, Ben |
|
2017 |
31 |
2 |
p. 521-536 |
artikel |
4 |
Deterministic Encryption with the Thorp Shuffle
|
Morris, Ben |
|
|
31 |
2 |
p. 521-536 |
artikel |
5 |
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance
|
Bai, Shi |
|
2017 |
31 |
2 |
p. 610-640 |
artikel |
6 |
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance
|
Bai, Shi |
|
|
31 |
2 |
p. 610-640 |
artikel |
7 |
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
|
Brakerski, Zvika |
|
2017 |
31 |
2 |
p. 434-520 |
artikel |
8 |
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
|
Brakerski, Zvika |
|
|
31 |
2 |
p. 434-520 |
artikel |
9 |
Multivariate High-Order Attacks of Shuffled Tables Recomputation
|
Bruneau, Nicolas |
|
2017 |
31 |
2 |
p. 351-393 |
artikel |
10 |
Multivariate High-Order Attacks of Shuffled Tables Recomputation
|
Bruneau, Nicolas |
|
|
31 |
2 |
p. 351-393 |
artikel |
11 |
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
|
Hazay, Carmit |
|
2017 |
31 |
2 |
p. 537-586 |
artikel |
12 |
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
|
Hazay, Carmit |
|
|
31 |
2 |
p. 537-586 |
artikel |
13 |
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking
|
Zhang, Bin |
|
2017 |
31 |
2 |
p. 394-433 |
artikel |
14 |
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking
|
Zhang, Bin |
|
|
31 |
2 |
p. 394-433 |
artikel |
15 |
Robust Encryption
|
Abdalla, Michel |
|
2017 |
31 |
2 |
p. 307-350 |
artikel |
16 |
Robust Encryption
|
Abdalla, Michel |
|
|
31 |
2 |
p. 307-350 |
artikel |