Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 5 of 820 results
Sort by: relevance publication year

Necessary and sufficient conditions for collision-free hashing

JOURNAL ARTICLE published March 1995 in Journal of Cryptology

Authors: Alexander Russell

Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions

JOURNAL ARTICLE published 1 January 2001 in Journal of Cryptology

Authors: Dingfeng Ye

Probability to meet in the middle

JOURNAL ARTICLE published February 1990 in Journal of Cryptology

Authors: Kazuo Nishimura | Masaaki Sibuya

Dynamic Traitor Tracing

JOURNAL ARTICLE published June 2001 in Journal of Cryptology

Authors: Amos Fiat | Tamir Tassa

Cryptanalysis of SHA-0 and Reduced SHA-1

JOURNAL ARTICLE published January 2015 in Journal of Cryptology

Authors: Eli Biham | Rafi Chen | Antoine Joux

Robust and Efficient Sharing of RSA Functions

JOURNAL ARTICLE published July 2007 in Journal of Cryptology

Authors: Rosario Gennaro | Tal Rabin | Stanislav Jarecki | Hugo Krawczyk

The Full Cost of Cryptanalytic Attacks

JOURNAL ARTICLE published March 2004 in Journal of Cryptology

Authors: Michael J. Wiener

Efficient Set Operations in the Presence of Malicious Adversaries

JOURNAL ARTICLE published July 2012 in Journal of Cryptology

Authors: Carmit Hazay | Kobbi Nissim

How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction

JOURNAL ARTICLE published January 2016 in Journal of Cryptology

Authors: Jean-Sébastien Coron | Thomas Holenstein | Robin Künzler | Jacques Patarin | Yannick Seurin | Stefano Tessaro

Public-Coin Parallel Zero-Knowledge for NP

JOURNAL ARTICLE published January 2013 in Journal of Cryptology

Authors: Rafael Pass | Alon Rosen | Wei-Lung Dustin Tseng

A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy

JOURNAL ARTICLE published July 2015 in Journal of Cryptology

Authors: Benjamin Fuller | Adam O’Neill | Leonid Reyzin

Secure Integration of Asymmetric and Symmetric Encryption Schemes

JOURNAL ARTICLE published January 2013 in Journal of Cryptology

Authors: Eiichiro Fujisaki | Tatsuaki Okamoto

Is There an Oblivious RAM Lower Bound for Online Reads?

JOURNAL ARTICLE published July 2021 in Journal of Cryptology

Authors: Mor Weiss | Daniel Wichs

Enhanced Public Key Security for the McEliece Cryptosystem

JOURNAL ARTICLE published January 2016 in Journal of Cryptology

Authors: Marco Baldi | Marco Bianchi | Franco Chiaraluce | Joachim Rosenthal | Davide Schipani

Cryptanalysis of the Tillich–Zémor Hash Function

JOURNAL ARTICLE published January 2011 in Journal of Cryptology

Authors: Markus Grassl | Ivana Ilić | Spyros Magliveras | Rainer Steinwandt

A Public Key Cryptosystem Based on Non-abelian Finite Groups

JOURNAL ARTICLE published January 2009 in Journal of Cryptology

Authors: Wolfgang Lempken | Trung van Tran | Spyros S. Magliveras | Wandi Wei

On Probability of Success in Linear and Differential Cryptanalysis

JOURNAL ARTICLE published January 2008 in Journal of Cryptology

Authors: Ali Aydın Selçuk

Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version

JOURNAL ARTICLE published October 2019 in Journal of Cryptology

Authors: Alexandre Duc | Sebastian Faust | François-Xavier Standaert

Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries

JOURNAL ARTICLE published April 2016 in Journal of Cryptology

Authors: Yehuda Lindell

(Inner-Product) Functional Encryption with Updatable Ciphertexts

JOURNAL ARTICLE published January 2024 in Journal of Cryptology

Authors: Valerio Cini | Sebastian Ramacher | Daniel Slamanig | Christoph Striecks | Erkan Tairi