Facet browsing currently unavailable
Page 1 of 818 results
Sort by: relevance publication year
A generalization of Hellman's extension to Shannon's approach to cryptography JOURNAL ARTICLE published October 1989 in Journal of Cryptology |
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality JOURNAL ARTICLE published October 2020 in Journal of Cryptology |
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles JOURNAL ARTICLE published April 2013 in Journal of Cryptology |
Journal of Cryptology JOURNAL published |
Guest editors' introduction JOURNAL ARTICLE published January 1991 in Journal of Cryptology |
White-Box Cryptography: Don’t Forget About Grey-Box Attacks JOURNAL ARTICLE published October 2019 in Journal of Cryptology |
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions JOURNAL ARTICLE published October 2020 in Journal of Cryptology |
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver JOURNAL ARTICLE published March 1999 in Journal of Cryptology |
Editorial JOURNAL ARTICLE published January 1988 in Journal of Cryptology |
A secure protocol for the oblivious transfer (extended abstract) JOURNAL ARTICLE published June 1996 in Journal of Cryptology |
Low Bandwidth Dynamic Traitor Tracing Schemes JOURNAL ARTICLE published April 2005 in Journal of Cryptology |
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable JOURNAL ARTICLE published July 2022 in Journal of Cryptology |
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives JOURNAL ARTICLE published January 2006 in Journal of Cryptology |
Authenticated Adversarial Routing JOURNAL ARTICLE published October 2014 in Journal of Cryptology |
A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions JOURNAL ARTICLE published July 2006 in Journal of Cryptology |
Efficient Implementation of Pairing-Based Cryptosystems JOURNAL ARTICLE published September 2004 in Journal of Cryptology |
Cryptanalysis of SHA-0 and Reduced SHA-1 JOURNAL ARTICLE published January 2015 in Journal of Cryptology |
Efficient Slide Attacks JOURNAL ARTICLE published July 2018 in Journal of Cryptology |
Robust and Efficient Sharing of RSA Functions JOURNAL ARTICLE published July 2007 in Journal of Cryptology |
The Full Cost of Cryptanalytic Attacks JOURNAL ARTICLE published March 2004 in Journal of Cryptology |