Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
84 | Yonatan Aumann, Yehuda Lindell |
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
53 | Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, Andreas Tielmann |
The disagreement power of an adversary: extended abstract. |
PODC |
2009 |
DBLP DOI BibTeX RDF |
fault-tolerance, failure-detectors, adversaries |
51 | Nan Zhang 0004, Wei Zhao 0001 |
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems. |
IEEE Trans. Knowl. Data Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
45 | James Pita, Manish Jain, Fernando Ordóñez, Milind Tambe, Sarit Kraus, Reuma Magori-Cohen |
Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties. |
AAMAS (1) |
2009 |
DBLP BibTeX RDF |
Bayesian and Stackelberg games, security of agent systems, game theory |
45 | Murat Kantarcioglu, Onur Kardes |
Privacy-Preserving Data Mining Applications in the Malicious Model. |
ICDM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Ueli M. Maurer |
Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
44 | Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette |
Authenticated On-Line Encryption. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks |
44 | B. Prabhu, K. Srinathan, C. Pandu Rangan |
Trading Players for Efficiency in Unconditional Multiparty Computation. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
generalized adversaries, secure multiparty computation |
42 | Yehuda Lindell, Benny Pinkas |
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Joseph Y. Halpern, Riccardo Pucella |
Modeling Adversaries in a Logic for Security Protocol Analysis. |
FASec |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Joseph Y. Halpern, Mark R. Tuttle |
Knowledge, Probability, and Adversaries. |
J. ACM |
1993 |
DBLP DOI BibTeX RDF |
Byzantine generals problem, coordinated attack problem, probabilistic knowledge, game theory, probability, knowledge |
41 | Yoav Freund, Michael J. Kearns, Yishay Mansour, Dana Ron, Ronitt Rubinfeld, Robert E. Schapire |
Efficient Algorithms for Learning to Play Repeated Games Against Computationally Bounded Adversaries. |
FOCS |
1995 |
DBLP DOI BibTeX RDF |
repeated games playing, computationally bounded adversaries, penny-matching, classically studied finite automata, learning (artificial intelligence), game theory, finite automata, learning algorithm, computational efficiency |
36 | Younho Lee, Yongsu Park |
Framework Design and Performance Analysis on Pairwise Key Establishment. |
APNOMS |
2009 |
DBLP DOI BibTeX RDF |
Wireless sensor networks, network security, secure communications |
36 | Abraham Bachrach, Alborz Geramifard, Daniel Gurdan, Ruijie He, Sam Prentice, Jan Stumpf, Nicholas Roy |
Co-ordinated Tracking and Planning Using Air and Ground Vehicles. |
ISER |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Virgil D. Gligor |
On the evolution of adversary models in security protocols: from the beginning to sensor networks. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Serge Vaudenay |
On Privacy Models for RFID. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Ivan Damgård, Joe Kilian, Louis Salvail |
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
35 | Yehuda Lindell, Benny Pinkas |
A Proof of Security of Yao's Protocol for Two-Party Computation. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Semi-honest adversaries, Yao’s two-party protocol, Secure two-party computation, Proofs of security |
35 | Matthew K. Franklin, Mark A. Gondree, Payman Mohassel |
Improved Efficiency for Private Stable Matching. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
Gale-Shapley, secure multiparty computation, stable matching, passive adversaries, stable marriage, privacy-preserving protocols |
35 | Manuel Blum 0001, Shafi Goldwasser |
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
chosen cyphertext attack, integer factorization, partial information, probabilistic encryption, passive adversaries |
33 | Sidharth Jaggi, Michael Langberg, Sachin Katti, Tracey Ho, Dina Katabi, Muriel Médard, Michelle Effros |
Resilient Network Coding in the Presence of Byzantine Adversaries. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Carmit Hazay, Yehuda Lindell |
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Vipul Goyal, Payman Mohassel, Adam D. Smith |
Efficient Two Party and Multi Party Computation Against Covert Adversaries. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Yehuda Lindell, Benny Pinkas, Nigel P. Smart |
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma 0002 |
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Oded Goldreich 0001 |
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Praveen Paruchuri, Jonathan P. Pearce, Milind Tambe, Fernando Ordóñez, Sarit Kraus |
An efficient heuristic approach for security against multiple adversaries. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
Bayesian and Stackelberg games, security of agent systems, game theory |
33 | Giovanni Di Crescenzo |
Security of erasable memories against adaptive adversaries. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
erasable memory, secure data deletion, storage security |
33 | Daniele Micciancio, Bogdan Warinschi |
Soundness of Formal Encryption in the Presence of Active Adversaries. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
33 | M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan |
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Donald Beaver, Stuart Haber |
Cryptographic Protocols Provably Secure Against Dynamic Adversaries. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
30 | Xiaoling Zhou, Nan Yang, Ou Wu |
Combining Adversaries with Anti-adversaries in Training. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Xiaoling Zhou, Nan Yang, Ou Wu |
Combining Adversaries with Anti-adversaries in Training. |
AAAI |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Saadia Gabriel, Hamid Palangi, Yejin Choi 0001 |
NaturalAdversaries: Can Naturalistic Adversaries Be as Effective as Artificial Adversaries? |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Motasem Alfarra, Juan C. Pérez, Ali K. Thabet, Adel Bibi, Philip H. S. Torr, Bernard Ghanem |
Combating Adversaries with Anti-adversaries. |
AAAI |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Saadia Gabriel, Hamid Palangi, Yejin Choi 0001 |
NaturalAdversaries: Can Naturalistic Adversaries Be as Effective as Artificial Adversaries? |
EMNLP (Findings) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Motasem Alfarra, Juan C. Pérez, Ali K. Thabet, Adel Bibi, Philip H. S. Torr, Bernard Ghanem |
Combating Adversaries with Anti-Adversaries. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
30 | Yonatan Aumann, Yehuda Lindell |
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. |
J. Cryptol. |
2010 |
DBLP DOI BibTeX RDF |
|
30 | Yonatan Aumann, Yehuda Lindell |
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
27 | Zhenhua Liu 0005, Wenyuan Xu |
Zeroing-in on network metric minima for sink location determination. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
sink location privacy, sensor networks |
27 | Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui, Andreas Tielmann |
The Disagreement Power of an Adversary. |
DISC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | John L. Miller 0001, Jon Crowcroft |
Probabilistic event resolution with the pairwise random protocol. |
NOSSDAV |
2009 |
DBLP DOI BibTeX RDF |
pairwise random protocol, secure coin flipping, security, fairness, distributed virtual environment, network games, cheating, bit commitment |
27 | Junji Shikata, Tsutomu Matsumoto |
Unconditionally Secure Steganography Against Active Attacks. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Aggelos Kiayias, Hong-Sheng Zhou |
Equivocal Blind Signatures and Adaptive UC-Security. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jang-Ping Sheu, Jehn-Ruey Jiang, Ching Tu |
Anonymous Path Routing in Wireless Sensor Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A. Rokicki |
Stability of the Multiple-Access Channel Under Maximum Broadcast Loads. |
SSS |
2007 |
DBLP DOI BibTeX RDF |
deterministic broadcast, adversarial queuing, stability, fairness, latency, multiple-access channel |
27 | Aggelos Kiayias, Hong-Sheng Zhou |
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge. |
ICALP |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Guomin Yang, Jing Chen 0001, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang 0002 |
A More Natural Way to Construct Identity-Based Identification Schemes. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Concurrent attacks, Identity-based cryptography, Identification schemes |
27 | Souvik Ray, Zhao Zhang |
SCUBE: A DoS-Resistant Distributed Search Protocol. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nan Zhang 0004 |
On the Communication Complexity of Privacy-Preserving Information Sharing Protocols. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Men Long, Chwan-Hwa John Wu |
Energy-efficient and intrusion-resilient authentication for ubiquitous access to factory floor information. |
IEEE Trans. Ind. Informatics |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Gene Itkis, Robert McNerney, Scott Russell |
Intrusion-Resilient Secure Channels. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth 0002, Scott Shenker, Ion Stoica |
Reliable broadcast in unknown fixed-identity networks. |
PODC |
2005 |
DBLP DOI BibTeX RDF |
unknown network, byzantine agreement, reliable broadcast |
27 | Bogdan S. Chlebus, Mariusz A. Rokicki |
Asynchronous Broadcast in Radio Networks. |
SIROCCO |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Jiejun Kong, Xiaoyan Hong |
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. |
MobiHoc |
2003 |
DBLP DOI BibTeX RDF |
trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability |
27 | Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin |
On Adaptive vs. Non-adaptive Security of Multiparty Protocols. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Salil P. Vadhan |
Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Everlasting security, Space-bounded adversaries, Averaging samplers, Expander graphs, Extractors, Unconditional security, Bounded-storage model |
26 | Ran Canetti, Rosario Gennaro |
Incoercible Multiparty Computation (extended abstract). |
FOCS |
1996 |
DBLP DOI BibTeX RDF |
incoercible multiparty computation, secure multiparty protocols, coercion resilience, computationally bounded adversaries, public communication channels, adaptive security problem, deniable encryptions, protocols, trapdoor permutations |
24 | Doran Chakraborty, Peter Stone |
Online Multiagent Learning against Memory Bounded Adversaries. |
ECML/PKDD (1) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Marc Mouffron, Frederic Rousseau 0002, Huafei Zhu |
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Squared Euclidean Distance, Stand-alone and simulation-based model, Secure two-party computation |
24 | Angelo Troina, Alessandro Aldini, Roberto Gorrieri |
Towards a Formal Treatment of Secrecy Against Computational Adversaries. |
Global Computing |
2004 |
DBLP DOI BibTeX RDF |
|
24 | K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan |
Asynchronous Secure Communication Tolerating Mixed Adversaries. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
24 | K. Srinathan, C. Pandu Rangan |
Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Michal Sramka, Reihaneh Safavi-Naini, Jörg Denzinger, Mina Askari |
A practice-oriented framework for measuring privacy and utility in data sanitization systems. |
EDBT/ICDT Workshops |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Dmitry G. Korzun, Andrei V. Gurtov |
A local equilibrium model for P2P resource ranking. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao |
A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Sipat Triukose, Zhihua Wen, Michael Rabinovich |
Content delivery networks: how big is big enough? |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Alma Riska, Erik Riedel |
Evaluation of disk-level workloads at different time scales. |
SIGMETRICS Perform. Evaluation Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta |
Mitigating attacks on open functionality in SMS-capable cellular networks. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
open-functionality, denial-of-service, telecommunications, SMS |
18 | Iuon-Chang Lin, Shu-Yan Huang |
A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Hemanta K. Maji, Manoj Prabhakaran 0001, Mike Rosulek |
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu |
Relationship privacy: output perturbation for queries with joins. |
PODS |
2009 |
DBLP DOI BibTeX RDF |
output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis |
18 | Arnold L. Rosenberg |
Path-robust multi-channel wireless networks. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Yejun Zhou, Hui Li 0006, Jianfeng Ma 0001 |
Secure Error-Correction Network Coding in a Randomized Setting. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Chi-Jen Lu |
On the Security Loss in Cryptographic Reductions. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Cristian Ene, Yassine Lakhnech, Van Chan Ngo |
Formal Indistinguishability Extended to the Random Oracle Model. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Timo Brecher, Emmanuel Bresson, Mark Manulis |
Fully Robust Tree-Diffie-Hellman Group Key Exchange. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Huafei Zhu, Feng Bao 0001 |
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
simulator, Oblivious transfer, universally composable |
18 | Bogdan S. Chlebus, Dariusz R. Kowalski |
Locally scalable randomized consensus for synchronous crash failures. |
SPAA |
2009 |
DBLP DOI BibTeX RDF |
bit communication complexity, graph expansion, fault tolerance, scalability, lower bound, message passing, randomization, consensus, synchrony |
18 | Alessandro Aldini, Alessandra Di Pierro |
Estimating the maximum information leakage. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Approximate noninterference, Bisimulation semantics, Process algebra, Probabilistic models, Covert channels |
18 | Jonathan Katz, Yehuda Lindell |
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Expected polynomial-time, Black-box simulation, Zero-knowledge, Secure multiparty computation |
18 | Michael Backes 0001, Dominique Unruh |
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Formal methods, zero-knowledge proofs, computational soundness |
18 | Ghaith Hammouri, Berk Sunar |
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
HB+, tamper resilience, provable security, PUF |
18 | Wenliang Du, Zhouxuan Teng, Zutao Zhu |
Privacy-MaxEnt: integrating background knowledge in privacy quantification. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
privacy quantification, data publishing |
18 | Carmine Ventre, Ivan Visconti |
Completely Non-malleable Encryption Revisited. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng 0001 |
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi |
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data |
18 | Marcin Bienkowski, Marek Chrobak, Lukasz Jez |
Randomized Algorithms for Buffer Management with 2-Bounded Delay. |
WAOA |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Mehmet S. Kiraz, Berry Schoenmakers |
An Efficient Protocol for Fair Secure Two-Party Computation. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Saurabh Panjwani |
Tackling Adaptive Corruptions in Multicast Encryption Protocols. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
Adaptive Corruptions, Selective Decryption, Multicast, Encryption |
18 | Stefan Dziembowski, Krzysztof Pietrzak |
Intrusion-Resilient Secret Sharing. |
FOCS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Mehmet S. Kiraz, Berry Schoenmakers, José Villegas |
Efficient Committed Oblivious Transfer of Bit Strings. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Committed oblivious transfer, Commitments, Homomorphic encryption |
18 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Duncan S. Wong, Wei Wu 0001 |
Certificateless Signature Revisited. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Certificateless cryptology, Signature, Security model, Random oracle |
18 | Bogdan Groza |
An Extension of the RSA Trapdoor in a KEM/DEM Framework. |
SYNASC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Hassan Jameel, Riaz Ahmed Shaikh 0001, Heejo Lee, Sungyoung Lee |
Human Identification Through Image Evaluation Using Secret Predicates. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Dmitry Gavinsky, Julia Kempe, Iordanis Kerenidis, Ran Raz, Ronald de Wolf |
Exponential separations for one-way quantum communication complexity, with applications to cryptography. |
STOC |
2007 |
DBLP DOI BibTeX RDF |
cryptography, communication complexity, quantum |
18 | Ueli M. Maurer, Stefano Tessaro |
Domain Extension of Public Random Functions: Beyond the Birthday Barrier. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
18 | François Macé, François-Xavier Standaert, Jean-Jacques Quisquater |
Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Adi Rosén, Michael S. Tsirkin |
On Delivery Times in Packet Networks under Adversarial Traffic. |
Theory Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|