Period of time: 2014年2期
Publisher: Springer Publishing Company
Founded in: 1988
Total resources: 13
ISSN: 0933-2790
Subject: O1 Mathematics
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Journal of Cryptology,volume 27,issue 2
Menu
Improved Practical Attacks on Round-Reduced Keccak
By Dinur Itai,Dunkelman Orr,Shamir Adi in (2014)
Journal of Cryptology,volume 27,issue 2 , Vol. 27, Iss. 2, 2014-04 , pp.Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
By Brakerski Zvika,Segev Gil in (2014)
Journal of Cryptology,volume 27,issue 2 , Vol. 27, Iss. 2, 2014-04 , pp.Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication
By Longa Patrick,Sica Francesco in (2014)
Journal of Cryptology,volume 27,issue 2 , Vol. 27, Iss. 2, 2014-04 , pp.On the Amortized Complexity of Zero-Knowledge Protocols
By Cramer Ronald,Damgård Ivan,Keller Marcel in (2014)
Journal of Cryptology,volume 27,issue 2 , Vol. 27, Iss. 2, 2014-04 , pp.On Strong Simulation and Composable Point Obfuscation
By Bitansky Nir,Canetti Ran in (2014)
Journal of Cryptology,volume 27,issue 2 , Vol. 27, Iss. 2, 2014-04 , pp.Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
By Hazay Carmit,Toft Tomas in (2014)
Journal of Cryptology,volume 27,issue 2 , Vol. 27, Iss. 2, 2014-04 , pp.