Facet browsing currently unavailable
Page 5 of 820 results
Sort by: relevance publication year
Necessary and sufficient conditions for collision-free hashing JOURNAL ARTICLE published March 1995 in Journal of Cryptology |
Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions JOURNAL ARTICLE published 1 January 2001 in Journal of Cryptology |
Probability to meet in the middle JOURNAL ARTICLE published February 1990 in Journal of Cryptology |
Dynamic Traitor Tracing JOURNAL ARTICLE published June 2001 in Journal of Cryptology |
Cryptanalysis of SHA-0 and Reduced SHA-1 JOURNAL ARTICLE published January 2015 in Journal of Cryptology |
Robust and Efficient Sharing of RSA Functions JOURNAL ARTICLE published July 2007 in Journal of Cryptology |
The Full Cost of Cryptanalytic Attacks JOURNAL ARTICLE published March 2004 in Journal of Cryptology |
Efficient Set Operations in the Presence of Malicious Adversaries JOURNAL ARTICLE published July 2012 in Journal of Cryptology |
Public-Coin Parallel Zero-Knowledge for NP JOURNAL ARTICLE published January 2013 in Journal of Cryptology |
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy JOURNAL ARTICLE published July 2015 in Journal of Cryptology |
Secure Integration of Asymmetric and Symmetric Encryption Schemes JOURNAL ARTICLE published January 2013 in Journal of Cryptology |
Is There an Oblivious RAM Lower Bound for Online Reads? JOURNAL ARTICLE published July 2021 in Journal of Cryptology |
Enhanced Public Key Security for the McEliece Cryptosystem JOURNAL ARTICLE published January 2016 in Journal of Cryptology |
Cryptanalysis of the Tillich–Zémor Hash Function JOURNAL ARTICLE published January 2011 in Journal of Cryptology |
A Public Key Cryptosystem Based on Non-abelian Finite Groups JOURNAL ARTICLE published January 2009 in Journal of Cryptology |
On Probability of Success in Linear and Differential Cryptanalysis JOURNAL ARTICLE published January 2008 in Journal of Cryptology |
Making Masking Security Proofs Concrete (Or How to Evaluate the Security of Any Leaking Device), Extended Version JOURNAL ARTICLE published October 2019 in Journal of Cryptology |
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries JOURNAL ARTICLE published April 2016 in Journal of Cryptology |
(Inner-Product) Functional Encryption with Updatable Ciphertexts JOURNAL ARTICLE published January 2024 in Journal of Cryptology |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm JOURNAL ARTICLE published October 2008 in Journal of Cryptology |