Facet browsing currently unavailable
Page 10 of 820 results
Sort by: relevance publication year
Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question JOURNAL ARTICLE published March 2001 in Journal of Cryptology |
Multivariate High-Order Attacks of Shuffled Tables Recomputation JOURNAL ARTICLE published April 2018 in Journal of Cryptology |
Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem JOURNAL ARTICLE published January 2019 in Journal of Cryptology |
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* JOURNAL ARTICLE published January 2002 in Journal of Cryptology |
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions JOURNAL ARTICLE published April 2005 in Journal of Cryptology |
More Constructions of Lossy and Correlation-Secure Trapdoor Functions JOURNAL ARTICLE published January 2013 in Journal of Cryptology |
On Subversion-Resistant SNARKs JOURNAL ARTICLE published July 2021 in Journal of Cryptology |
Integral Cryptanalysis on Full MISTY1 JOURNAL ARTICLE published July 2017 in Journal of Cryptology |
Robust and Efficient Sharing of RSA Functions JOURNAL ARTICLE published March 2000 in Journal of Cryptology |
On the Tightness of Forward-Secure Signature Reductions JOURNAL ARTICLE published January 2019 in Journal of Cryptology |
Optimal Randomizer Efficiency in the Bounded-Storage Model JOURNAL ARTICLE published January 2004 in Journal of Cryptology |
CryptHOL: Game-Based Proofs in Higher-Order Logic JOURNAL ARTICLE published April 2020 in Journal of Cryptology |
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem JOURNAL ARTICLE published April 2005 in Journal of Cryptology |
Improved Cryptanalysis of AES-like Permutations JOURNAL ARTICLE published October 2014 in Journal of Cryptology |
Perfectly Balanced Boolean Functions and Golić Conjecture JOURNAL ARTICLE published July 2012 in Journal of Cryptology |
Threshold Password-Authenticated Key Exchange JOURNAL ARTICLE published January 2006 in Journal of Cryptology |
Accelerating Pollard’s Rho Algorithm on Finite Fields JOURNAL ARTICLE published April 2012 in Journal of Cryptology |
Computationally Secure Oblivious Transfer JOURNAL ARTICLE published January 2005 in Journal of Cryptology |
RSA-OAEP Is Secure under the RSA Assumption JOURNAL ARTICLE published March 2004 in Journal of Cryptology |
Differential-Linear Cryptanalysis Revisited JOURNAL ARTICLE published July 2017 in Journal of Cryptology |