Facet browsing currently unavailable
Page 3 of 820 results
Sort by: relevance publication year
Editorial JOURNAL ARTICLE published July 2021 in Journal of Cryptology |
Preface JOURNAL ARTICLE published January 1992 in Journal of Cryptology |
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors JOURNAL ARTICLE published October 2018 in Journal of Cryptology |
On the existence of statistically hiding bit commitment schemes and fail-stop signatures JOURNAL ARTICLE published June 1997 in Journal of Cryptology |
Jacobian Coordinates on Genus 2 Curves JOURNAL ARTICLE published April 2017 in Journal of Cryptology |
Discrete Logarithm Problems with Auxiliary Inputs JOURNAL ARTICLE published July 2010 in Journal of Cryptology |
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier JOURNAL ARTICLE published January 2017 in Journal of Cryptology |
A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation JOURNAL ARTICLE published January 2017 in Journal of Cryptology |
How to Achieve Perfect Simulation and a Complete Problem for Non-interactive Perfect Zero-Knowledge JOURNAL ARTICLE published July 2015 in Journal of Cryptology |
Photonic Side-Channel Analysis of Arbiter PUFs JOURNAL ARTICLE published April 2017 in Journal of Cryptology |
Algebraic nonlinearity and its applications to cryptography JOURNAL ARTICLE published December 1994 in Journal of Cryptology |
Simple and Generic Constructions of Succinct Functional Encryption JOURNAL ARTICLE published July 2021 in Journal of Cryptology |
Utility Dependence in Correct and Fair Rational Secret Sharing JOURNAL ARTICLE published January 2011 in Journal of Cryptology |
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes JOURNAL ARTICLE published July 2019 in Journal of Cryptology |
Arithmetic operations inGF(2 m ) JOURNAL ARTICLE published March 1993 in Journal of Cryptology |
On the Existence of Secure Keystream Generators JOURNAL ARTICLE published January 2001 in Journal of Cryptology |
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions JOURNAL ARTICLE published July 2009 in Journal of Cryptology |
Enhanced Public Key Security for the McEliece Cryptosystem JOURNAL ARTICLE published January 2016 in Journal of Cryptology |
Kummer for Genus One Over Prime-Order Fields JOURNAL ARTICLE published January 2020 in Journal of Cryptology |
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version) JOURNAL ARTICLE published October 2023 in Journal of Cryptology |