Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 820 results
Sort by: relevance publication year

Probability to meet in the middle

JOURNAL ARTICLE published February 1990 in Journal of Cryptology

Authors: Kazuo Nishimura | Masaaki Sibuya

Dynamic Traitor Tracing

JOURNAL ARTICLE published June 2001 in Journal of Cryptology

Authors: Amos Fiat | Tamir Tassa

Cryptanalysis of SHA-0 and Reduced SHA-1

JOURNAL ARTICLE published January 2015 in Journal of Cryptology

Authors: Eli Biham | Rafi Chen | Antoine Joux

Robust and Efficient Sharing of RSA Functions

JOURNAL ARTICLE published July 2007 in Journal of Cryptology

Authors: Rosario Gennaro | Tal Rabin | Stanislav Jarecki | Hugo Krawczyk

The Full Cost of Cryptanalytic Attacks

JOURNAL ARTICLE published March 2004 in Journal of Cryptology

Authors: Michael J. Wiener

Efficient Set Operations in the Presence of Malicious Adversaries

JOURNAL ARTICLE published July 2012 in Journal of Cryptology

Authors: Carmit Hazay | Kobbi Nissim

Public-Coin Parallel Zero-Knowledge for NP

JOURNAL ARTICLE published January 2013 in Journal of Cryptology

Authors: Rafael Pass | Alon Rosen | Wei-Lung Dustin Tseng

A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy

JOURNAL ARTICLE published July 2015 in Journal of Cryptology

Authors: Benjamin Fuller | Adam O’Neill | Leonid Reyzin

Is There an Oblivious RAM Lower Bound for Online Reads?

JOURNAL ARTICLE published July 2021 in Journal of Cryptology

Authors: Mor Weiss | Daniel Wichs

Enhanced Public Key Security for the McEliece Cryptosystem

JOURNAL ARTICLE published January 2016 in Journal of Cryptology

Authors: Marco Baldi | Marco Bianchi | Franco Chiaraluce | Joachim Rosenthal | Davide Schipani

Cryptanalysis of the Tillich–Zémor Hash Function

JOURNAL ARTICLE published January 2011 in Journal of Cryptology

Authors: Markus Grassl | Ivana Ilić | Spyros Magliveras | Rainer Steinwandt

A Public Key Cryptosystem Based on Non-abelian Finite Groups

JOURNAL ARTICLE published January 2009 in Journal of Cryptology

Authors: Wolfgang Lempken | Trung van Tran | Spyros S. Magliveras | Wandi Wei

On Probability of Success in Linear and Differential Cryptanalysis

JOURNAL ARTICLE published January 2008 in Journal of Cryptology

Authors: Ali Aydın Selçuk

Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version

JOURNAL ARTICLE published October 2019 in Journal of Cryptology

Authors: Alexandre Duc | Sebastian Faust | François-Xavier Standaert

Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries

JOURNAL ARTICLE published April 2016 in Journal of Cryptology

Authors: Yehuda Lindell

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm

JOURNAL ARTICLE published October 2008 in Journal of Cryptology

Authors: Mihir Bellare | Chanathip Namprempre

Some improved bounds on the information rate of perfect secret sharing schemes

JOURNAL ARTICLE published October 1992 in Journal of Cryptology

Authors: E. F. Brickell | D. R. Stinson

On the classification of ideal secret sharing schemes

JOURNAL ARTICLE published January 1991 in Journal of Cryptology

Authors: Ernest F. Brickell | Daniel M. Davenport

Probabilistic Reliability and Privacy of Communication Using Multicast in General Neighbor Networks

JOURNAL ARTICLE published April 2008 in Journal of Cryptology

Authors: Jérôme Renault | Tristan Tomala

On key storage in secure networks

JOURNAL ARTICLE published September 1995 in Journal of Cryptology

Authors: Martin Dyer | Trevor Fenner | Alan Frieze | Andrew Thomason