The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "J. Cryptology"( http://dblp.L3S.de/Venues/J._Cryptology )

URL (DBLP): http://dblp.uni-trier.de/db/journals/joc

Publication years (Num. hits)
1988-1989 (15) 1990-1991 (33) 1992-1993 (27) 1994-1995 (25) 1996 (15) 1997 (16) 1998 (17) 1999 (16) 2000 (20) 2001 (15) 2002 (16) 2003-2004 (27) 2005 (18) 2006 (17) 2007 (20) 2008 (20) 2009 (20) 2010 (20) 2011 (26) 2012 (23) 2013 (24) 2014 (24) 2015 (28) 2016 (26) 2017 (33) 2018 (32) 2019 (15)
Publication types (Num. hits)
article(588)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 354 occurrences of 214 keywords

Results
Found 588 publication records. Showing 588 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé Cryptanalysis of the CLT13 Multilinear Map. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor Hardness-Preserving Reductions via Cuckoo Hashing. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya On the Impossibility of Structure-Preserving Deterministic Primitives. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Georg Fuchsbauer, Christian Hanser, Daniel Slamanig Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Fabrice Benhamouda, David Pointcheval On the Tightness of Forward-Secure Signature Reductions. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Florent Bernard, Patrick Haddad, Viktor Fischer, Jean Nicolai From Physical to Stochastic Modeling of a TERO-Based TRNG. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov, Benedikt Schmidt Automated Analysis of Cryptographic Assumptions in Generic Group Models. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg Multidimensional Linear Cryptanalysis. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Susumu Kiyoshima Round-Efficient Black-Box Construction of Composable Multi-Party Computation. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nils Fleischhacker, Tibor Jager, Dominique Schröder On Tight Security Proofs for Schnorr Signatures. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Susumu Kiyoshima Non-black-box Simulation in the Fully Concurrent Setting, Revisited. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alexandre Duc, Stefan Dziembowski, Sebastian Faust Unifying Leakage Models: From Probing Attacks to Noisy Leakage. Search on Bibsonomy J. Cryptology The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bin Zhang 0003, Chao Xu, Dengguo Feng Practical Cryptanalysis of Bluetooth Encryption with Condition Masking. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shan Chen, Rodolphe Lampe, Jooyoung Lee 0001, Yannick Seurin, John P. Steinberger Minimizing the Two-Round Even-Mansour Cipher. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nicolas Bruneau, Sylvain Guilley, Zakaria Najm, Yannick Teglia Multivariate High-Order Attacks of Shuffled Tables Recomputation. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Hila Zarosim On the Feasibility of Extending Oblivious Transfer. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eiichiro Fujisaki All-But-Many Encryption. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dominique Unruh Everlasting Multi-party Computation. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vadim Lyubashevsky, Daniele Micciancio Asymptotically Efficient Lattice-Based Digital Signatures. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Benny Applebaum, Yuval Ishai, Eyal Kushilevitz Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Eran Omri, Hila Zarosim Completeness for Symmetric Two-Party Functionalities: Revisited. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Carmit Hazay Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ananth Raghunathan, Gil Segev, Salil P. Vadhan Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem Characterization of Secure Multiparty Computation Without Broadcast. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christina Boura, Virginie Lallemand, María Naya-Plasencia, Valentin Suder Making the Impossible Possible. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman Key-Recovery Attacks on ASASA. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dario Catalano, Dario Fiore Practical Homomorphic Message Authenticators for Arithmetic Circuits. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shoni Gilboa, Shay Gueron, Ben Morris How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function? Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh On the (Im-)Possibility of Extending Coin Toss. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michael Hutter, Erich Wenger Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Mihir Bellare, Gregory Neven Robust Encryption. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas Fast Garbling of Circuits Under Standard Assumptions. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ilan Komargodski, Gil Segev, Eylon Yogev Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Saqib A. Kakvi, Eike Kiltz Optimal Security Proofs for Full Domain Hash, Revisited. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Ilan Komargodski, Gil Segev Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller Efficient Slide Attacks. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev Incremental Deterministic Public-Key Encryption. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Gil Segev Function-Private Functional Encryption in the Private-Key Setting. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shi Bai, Tancrède Lepoint, Adeline Roux-Langlois, Amin Sakzad, Damien Stehlé, Ron Steinfeld Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Gil Segev On Constructing One-Way Permutations from Indistinguishability Obfuscation. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ben Morris, Phillip Rogaway, Till Stegers Deterministic Encryption with the Thorp Shuffle. Search on Bibsonomy J. Cryptology The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk Authenticated Confidential Channel Establishment and the Security of TLS-DHE. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mahdi Cheraghchi, Venkatesan Guruswami Non-malleable Coding Against Bit-Wise and Split-State Tampering. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jae Hong Seo Short Signatures from Diffie-Hellman: Realizing Almost Compact Public Key. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammad Hajiabadi, Bruce M. Kapron Reproducible Circularly Secure Bit Encryption: Applications and Realizations. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eike Kiltz, Adam O'Neill, Adam D. Smith Instantiability of RSA-OAEP Under Chosen-Plaintext Attack. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi 0001 Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Genkin, Adi Shamir, Eran Tromer Acoustic Cryptanalysis. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert Efficient Cryptosystems From 2k-th Power Residue Symbols. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer The Hunting of the SNARK. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi 0001, David Cash, Abhishek Jain 0002 Efficient Authentication from Hard Learning Problems. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sune K. Jakobsen Information Theoretical Cryptogenography. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shahin Tajik, Enrico Dietz, Sven Frohmann, Helmar Dittrich, Dmitry Nedospasov, Clemens Helfmeier, Jean-Pierre Seifert, Christian Boit, Heinz-Wilhelm Hübers Photonic Side-Channel Analysis of Arbiter PUFs. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Céline Blondeau, Gregor Leander, Kaisa Nyberg Differential-Linear Cryptanalysis Revisited. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andreas J. Winter 0002 Weak Locking Capacity of Quantum Channels Can be Much Larger Than Private Capacity. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Benny Applebaum, Pavel Raykov From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Boaz Barak, Mohammad Mahmoody-Ghidary Merkle's Key Agreement Protocol is Optimal: An O(n2) Attack on Any Key Agreement from Random Oracles. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Manoj Prabhakaran, Mike Rosulek Reconciling Non-malleability with Homomorphic Encryption. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hendrik W. Lenstra Jr., Alice Silverberg Lattices with Symmetry. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata, Takafumi Aoki Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jooyoung Lee 0001, Martijn Stam, John P. Steinberger The Security of Tandem-DM in the Ideal Cipher Model. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Benny Applebaum, Yoni Moses Locally Computable UOWHF with Linear Shrinkage. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ran Cohen, Yehuda Lindell Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hüseyin Hisil, Craig Costello Jacobian Coordinates on Genus 2 Curves. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Guy N. Rothblum Obfuscating Conjunctions. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ilan Komargodski, Moni Naor, Eylon Yogev Secret-Sharing for NP. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Luis Villar An Algebraic Framework for Diffie-Hellman Assumptions. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1David Cash, Alptekin Küpçü, Daniel Wichs Dynamic Proofs of Retrievability Via Oblivious RAM. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Charanjit S. Jutla, Arnab Roy 0003 Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Carmit Hazay, Arpita Patra Efficient One-Sided Adaptively Secure Computation. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner More Efficient Oblivious Transfer Extensions. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dominique Schröder, Dominique Unruh Security of Blind Signatures Revisited. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yosuke Todo Integral Cryptanalysis on Full MISTY1. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann Practical Cryptanalysis of ISO 9796-2 and EMV Signatures. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani Enhanced Public Key Security for the McEliece Cryptosystem. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benny Applebaum Garbling XOR Gates "For Free" in the Standard Model. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benny Applebaum, Andrej Bogdanov, Alon Rosen A Dichotomy for Local Small-Bias Generators. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Ran Canetti, Carmit Hazay Toward a Game Theoretic View of Secure Computation. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Iftach Haitner, Eran Omri, Hila Zarosim Limits on the Usefulness of Random Oracles. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Oriol Farràs, Yuval Mintz Secret-Sharing Schemes for Very Dense Graphs. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo Structure-Preserving Signatures and Commitments to Group Elements. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter Fast Cryptography in Genus 2. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tal Moran, Moni Naor, Gil Segev An Optimally Fair Coin Toss. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs Leakage-Resilient Cryptography from Minimal Assumptions. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benjamin Smith 0003 The ℚ-curve Construction for Endomorphism-Accelerated Elliptic Curves. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen Automata Evaluation and Text Search Protocols with Simulation-Based Security. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael J. Freedman, Carmit Hazay, Kobbi Nissim, Benny Pinkas Efficient Set Intersection with Simulation-Based Security. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Franck Landelle, Thomas Peyrin Cryptanalysis of Full RIPEMD-128. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrew Chi-Chih Yao, Moti Yung, Yunlei Zhao Concurrent Knowledge Extraction in Public-Key Models. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt, Angela Zottarel Signature Schemes Secure Against Hard-to-Invert Leakage. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer New Second-Preimage Attacks on Hash Functions. Search on Bibsonomy J. Cryptology The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 588 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license