Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 10 of 820 results
Sort by: relevance publication year

Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question

JOURNAL ARTICLE published March 2001 in Journal of Cryptology

Authors: Yongge Wang | Yvo Desmedt

Multivariate High-Order Attacks of Shuffled Tables Recomputation

JOURNAL ARTICLE published April 2018 in Journal of Cryptology

Authors: Nicolas Bruneau | Sylvain Guilley | Zakaria Najm | Yannick Teglia

Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem

JOURNAL ARTICLE published January 2019 in Journal of Cryptology

Authors: Shi Bai | Steven D. Galbraith | Liangze Li | Daniel Sheffield

Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*

JOURNAL ARTICLE published January 2002 in Journal of Cryptology

Authors: Martín Abadi | Phillip Rogaway

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions

JOURNAL ARTICLE published April 2005 in Journal of Cryptology

Authors: John Black | Phillip Rogaway

More Constructions of Lossy and Correlation-Secure Trapdoor Functions

JOURNAL ARTICLE published January 2013 in Journal of Cryptology

Authors: David Mandell Freeman | Oded Goldreich | Eike Kiltz | Alon Rosen | Gil Segev

On Subversion-Resistant SNARKs

JOURNAL ARTICLE published July 2021 in Journal of Cryptology

Authors: Behzad Abdolmaleki | Helger Lipmaa | Janno Siim | Michał Zając

Integral Cryptanalysis on Full MISTY1

JOURNAL ARTICLE published July 2017 in Journal of Cryptology

Authors: Yosuke Todo

Robust and Efficient Sharing of RSA Functions

JOURNAL ARTICLE published March 2000 in Journal of Cryptology

Authors: Rosario Gennaro | Tal Rabin | Stanislav Jarecki | Hugo Krawczyk

On the Tightness of Forward-Secure Signature Reductions

JOURNAL ARTICLE published January 2019 in Journal of Cryptology

Authors: Michel Abdalla | Fabrice Benhamouda | David Pointcheval

Optimal Randomizer Efficiency in the Bounded-Storage Model

JOURNAL ARTICLE published January 2004 in Journal of Cryptology

Authors: Stefan Dziembowski | Ueli Maurer

CryptHOL: Game-Based Proofs in Higher-Order Logic

JOURNAL ARTICLE published April 2020 in Journal of Cryptology

Authors: David A. Basin | Andreas Lochbihler | S. Reza Sefidgar

An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem

JOURNAL ARTICLE published April 2005 in Journal of Cryptology

Authors: Rosario Gennaro

Improved Cryptanalysis of AES-like Permutations

JOURNAL ARTICLE published October 2014 in Journal of Cryptology

Authors: Jérémy Jean | María Naya-Plasencia | Thomas Peyrin

Perfectly Balanced Boolean Functions and Golić Conjecture

JOURNAL ARTICLE published July 2012 in Journal of Cryptology

Authors: Stanislav V. Smyshlyaev

Threshold Password-Authenticated Key Exchange

JOURNAL ARTICLE published January 2006 in Journal of Cryptology

Authors: Philip MacKenzie | Thomas Shrimpton | Markus Jakobsson

Accelerating Pollard’s Rho Algorithm on Finite Fields

JOURNAL ARTICLE published April 2012 in Journal of Cryptology

Authors: Jung Hee Cheon | Jin Hong | Minkyu Kim

Computationally Secure Oblivious Transfer

JOURNAL ARTICLE published January 2005 in Journal of Cryptology

Authors: Moni Naor | Benny Pinkas

RSA-OAEP Is Secure under the RSA Assumption

JOURNAL ARTICLE published March 2004 in Journal of Cryptology

Authors: Eiichiro Fujisaki | Tatsuaki Okamoto | David Pointcheval | Jacques Stern

Differential-Linear Cryptanalysis Revisited

JOURNAL ARTICLE published July 2017 in Journal of Cryptology

Authors: Céline Blondeau | Gregor Leander | Kaisa Nyberg