Sciweavers

12 search results - page 1 / 3
» crypto 1995
Sort
View
CRYPTO
1995
Springer
89views Cryptology» more  CRYPTO 1995»
13 years 8 months ago
Secure Signature Schemes based on Interactive Protocols
Ronald Cramer, Ivan Damgård
CRYPTO
1995
Springer
93views Cryptology» more  CRYPTO 1995»
13 years 8 months ago
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
Mihir Bellare, Roch Guérin, Phillip Rogaway
CRYPTO
1995
Springer
118views Cryptology» more  CRYPTO 1995»
13 years 8 months ago
MDx-MAC and Building Fast MACs from Hash Functions
Bart Preneel, Paul C. van Oorschot
CRYPTO
1995
Springer
100views Cryptology» more  CRYPTO 1995»
13 years 8 months ago
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, M...
CPA
1995
143views Cryptology» more  CPA 1995»
13 years 8 months ago
Crypto in Europe - Markets, Law and Policy
Much of the debate on cryptography has assumed that the real tension is between the state’s desire for effective policing and the privacy of the individual. We argue that this i...
Ross J. Anderson