Facet browsing currently unavailable
Page 1 of 818 results
Sort by: relevance publication year
Journal of Cryptology JOURNAL published |
Guest editors' introduction JOURNAL ARTICLE published January 1991 in Journal of Cryptology |
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions JOURNAL ARTICLE published October 2020 in Journal of Cryptology |
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver JOURNAL ARTICLE published March 1999 in Journal of Cryptology |
A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation JOURNAL ARTICLE published January 2017 in Journal of Cryptology |
Bucket Hashing and Its Application to Fast Message Authentication JOURNAL ARTICLE published March 1999 in Journal of Cryptology |
Jacobian Coordinates on Genus 2 Curves JOURNAL ARTICLE published April 2017 in Journal of Cryptology |
Hyperelliptic cryptosystems JOURNAL ARTICLE published October 1989 in Journal of Cryptology |
Secure Integration of Asymmetric and Symmetric Encryption Schemes JOURNAL ARTICLE published January 2013 in Journal of Cryptology |
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier JOURNAL ARTICLE published January 2017 in Journal of Cryptology |
On Tight Security Proofs for Schnorr Signatures JOURNAL ARTICLE published April 2019 in Journal of Cryptology |
Securely Obfuscating Re-Encryption JOURNAL ARTICLE published October 2011 in Journal of Cryptology |
Discrete Logarithm Problems with Auxiliary Inputs JOURNAL ARTICLE published July 2010 in Journal of Cryptology |
Updating Key Size Estimations for Pairings JOURNAL ARTICLE published October 2019 in Journal of Cryptology |
Editorial JOURNAL ARTICLE published January 1988 in Journal of Cryptology |
Simple and Generic Constructions of Succinct Functional Encryption JOURNAL ARTICLE published July 2021 in Journal of Cryptology |
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives JOURNAL ARTICLE published January 2006 in Journal of Cryptology |
Authenticated Adversarial Routing JOURNAL ARTICLE published October 2014 in Journal of Cryptology |
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions JOURNAL ARTICLE published July 2009 in Journal of Cryptology |
Cryptanalysis of Full RIPEMD-128 JOURNAL ARTICLE published October 2016 in Journal of Cryptology |