61![On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute, On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,](https://www.pdfsearch.io/img/5bd41338b286e3c523e4e7bc932e109a.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-21 12:09:46
|
---|
62![New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to](https://www.pdfsearch.io/img/582ec2afec6a2f4a81619d825cb99c23.jpg) | Add to Reading ListSource URL: www.cs.tau.ac.ilLanguage: English - Date: 2001-12-26 10:46:32
|
---|
63![Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski† Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†](https://www.pdfsearch.io/img/5b41943ea8b5fc43ffa668a7c3281b19.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-12-24 16:10:17
|
---|
64![A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI](https://www.pdfsearch.io/img/bb106e31cd80eac27e98560a105cd207.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-21 12:10:24
|
---|
65![MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog](https://www.pdfsearch.io/img/933e44c97bdea36ff2a2ac694fe3a3a7.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-12-30 04:23:42
|
---|
66![Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email: Proposal of a new efficient public key system for encryption and digital signatures Gerold Gr¨ unauer Email:](https://www.pdfsearch.io/img/956d303edf12aeb732411e8e5e65d5b7.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-11-27 12:23:14
|
---|
67![An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing: An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:](https://www.pdfsearch.io/img/3de78805a464d5d2e97246ae85e92c9a.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 1998-07-30 12:00:14
|
---|
68![Analysis of variance / Means / Summary statistics / Weighted mean / Weight function / Gender / One-way ANOVA / Statistics / Mathematical analysis / Statistical tests Analysis of variance / Means / Summary statistics / Weighted mean / Weight function / Gender / One-way ANOVA / Statistics / Mathematical analysis / Statistical tests](/pdf-icon.png) | Add to Reading ListSource URL: core.ecu.eduLanguage: English - Date: 2013-03-05 21:15:10
|
---|
69![CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003. CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.](https://www.pdfsearch.io/img/8d92584140be5dc0763eae1ddd02882d.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2003-02-14 22:08:35
|
---|
70![CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class. CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.](https://www.pdfsearch.io/img/79c58599583c2d410c7b800b7d89525e.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2015-02-11 11:47:35
|
---|