nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Cryptographic implications of Hess' generalized GHS attack
|
Menezes, Alfred |
|
2005 |
16 |
6 |
p. 439-460 |
artikel |
2 |
Cryptographic implications of Hess' generalized GHS attack
|
Menezes, Alfred |
|
|
16 |
6 |
p. 439-460 |
artikel |
3 |
Mathematical Techniques in Cryptology—Editorial
|
Beth, Thomas |
|
2005 |
16 |
6 |
p. 377-378 |
artikel |
4 |
Mathematical Techniques in Cryptology—Editorial
|
Beth, Thomas |
|
|
16 |
6 |
p. 377-378 |
artikel |
5 |
Modular proofs for key exchange: rigorous optimizations in the Canetti–Krawczyk model
|
Hitchcock, Yvonne |
|
2005 |
16 |
6 |
p. 405-438 |
artikel |
6 |
Modular proofs for key exchange: rigorous optimizations in the Canetti–Krawczyk model
|
Hitchcock, Yvonne |
|
|
16 |
6 |
p. 405-438 |
artikel |
7 |
On the bit security of the Diffie-Hellman key
|
Blake, Ian F. |
|
2005 |
16 |
6 |
p. 397-404 |
artikel |
8 |
On the bit security of the Diffie-Hellman key
|
Blake, Ian F. |
|
|
16 |
6 |
p. 397-404 |
artikel |
9 |
On the low hamming weight discrete logarithm problem for nonadjacent representations
|
Muir, J.A. |
|
2005 |
16 |
6 |
p. 461-472 |
artikel |
10 |
On the low hamming weight discrete logarithm problem for nonadjacent representations
|
Muir, J.A. |
|
|
16 |
6 |
p. 461-472 |
artikel |
11 |
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
|
Bellare, Mihir |
|
2005 |
16 |
6 |
p. 379-396 |
artikel |
12 |
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
|
Bellare, Mihir |
|
|
16 |
6 |
p. 379-396 |
artikel |