nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
|
Okamoto, Tatsuaki |
|
2015 |
77 |
2-3 |
p. 725-771 |
artikel |
2 |
Almost $$2$$2-perfect $$6$$6-cycle systems
|
Lindner, Charles C. |
|
2015 |
77 |
2-3 |
p. 321-333 |
artikel |
3 |
Batch verifiable computation of outsourced functions
|
Zhang, Liang Feng |
|
2015 |
77 |
2-3 |
p. 563-585 |
artikel |
4 |
Enumeration of Kerdock codes of length 64
|
Phelps, Kevin |
|
2015 |
77 |
2-3 |
p. 357-363 |
artikel |
5 |
Finding shortest lattice vectors faster using quantum search
|
Laarhoven, Thijs |
|
2015 |
77 |
2-3 |
p. 375-400 |
artikel |
6 |
Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2
|
McGuire, Gary |
|
2015 |
77 |
2-3 |
p. 653-662 |
artikel |
7 |
Guest Editorial: Special Issue in Honor of Scott A. Vanstone
|
Blake, Ian |
|
2015 |
77 |
2-3 |
p. 287-299 |
artikel |
8 |
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
|
Düll, Michael |
|
2015 |
77 |
2-3 |
p. 493-514 |
artikel |
9 |
Isogenies of abelian varieties over finite fields
|
Silverberg, Alice |
|
2015 |
77 |
2-3 |
p. 427-439 |
artikel |
10 |
Linearly homomorphic structure-preserving signatures and their applications
|
Libert, Benoît |
|
2015 |
77 |
2-3 |
p. 441-477 |
artikel |
11 |
Maximal arcs and quasi-symmetric designs
|
Jungnickel, Dieter |
|
2015 |
77 |
2-3 |
p. 365-374 |
artikel |
12 |
Normal forms of hyperelliptic curves of genus 3
|
Frey, Gerhard |
|
2015 |
77 |
2-3 |
p. 677-712 |
artikel |
13 |
On tight bounds for binary frameproof codes
|
Guo, Chuan |
|
2015 |
77 |
2-3 |
p. 301-319 |
artikel |
14 |
Open problems in hash function security
|
Andreeva, Elena |
|
2015 |
77 |
2-3 |
p. 611-631 |
artikel |
15 |
Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses
|
Chee, Yeow Meng |
|
2015 |
77 |
2-3 |
p. 479-491 |
artikel |
16 |
PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials
|
Hoffstein, Jeffrey |
|
2015 |
77 |
2-3 |
p. 541-552 |
artikel |
17 |
Perfect hash families of strength three with three rows from varieties on finite projective geometries
|
Fuji-Hara, Ryoh |
|
2015 |
77 |
2-3 |
p. 351-356 |
artikel |
18 |
Power map permutations and the discrete log problem
|
Landrock, Peter |
|
2015 |
77 |
2-3 |
p. 713-724 |
artikel |
19 |
Primitive normal bases for quartic and cubic extensions: a geometric approach
|
Hachenberger, Dirk |
|
2015 |
77 |
2-3 |
p. 335-350 |
artikel |
20 |
Quantifying the security advantage of password expiration policies
|
Chiasson, Sonia |
|
2015 |
77 |
2-3 |
p. 401-408 |
artikel |
21 |
Reflections on slide with a twist attacks
|
Dinur, Itai |
|
2015 |
77 |
2-3 |
p. 633-651 |
artikel |
22 |
Some primality tests that eluded Lucas
|
Roettger, E. L. |
|
2015 |
77 |
2-3 |
p. 515-539 |
artikel |
23 |
Square integer Heffter arrays with empty cells
|
Archdeacon, D. S. |
|
2015 |
77 |
2-3 |
p. 409-426 |
artikel |
24 |
The asymptotic existence of DR$$(v,k,k-1)$$(v,k,k-1)-BIBDs
|
Lamken, E. R. |
|
2015 |
77 |
2-3 |
p. 553-562 |
artikel |
25 |
The random oracle model: a twenty-year retrospective
|
Koblitz, Neal |
|
2015 |
77 |
2-3 |
p. 587-610 |
artikel |
26 |
Zero-knowledge proofs of knowledge for group homomorphisms
|
Maurer, Ueli |
|
2015 |
77 |
2-3 |
p. 663-676 |
artikel |