Cryptology

Results: 302



#Item
1A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:38
2An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:55
3Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division.  Nigel Smart, Professor of Cryptology,

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
4Full version of an extended abstract published in Proceedings of PKC 2015, Springer-Verlag, 2015. Available from the IACR Cryptology ePrint Archive as ReportA Profitable Sub-Prime Loan: Obtaining the Advantage

Full version of an extended abstract published in Proceedings of PKC 2015, Springer-Verlag, 2015. Available from the IACR Cryptology ePrint Archive as ReportA Profitable Sub-Prime Loan: Obtaining the Advantage

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
5Network of Excellence in Cryptology ISTSpecial Purpose Hardware for Attacking Cryptographic Systems (SHARCS ‘06)

Network of Excellence in Cryptology ISTSpecial Purpose Hardware for Attacking Cryptographic Systems (SHARCS ‘06)

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-04-17 15:01:59
6Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
7Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
8An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
9A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
10Cryptology and Its Applications Nordic Research Training course, Bergen Zero knowledge and some applications  Helger Lipmaa

Cryptology and Its Applications Nordic Research Training course, Bergen Zero knowledge and some applications Helger Lipmaa

Add to Reading List

Source URL: kodu.ut.ee

Language: English - Date: 2008-09-12 11:33:08