Sciweavers

2967 search results - page 63 / 594
» Cryptology
Sort
View
CRYPTO
1995
Springer
89views Cryptology» more  CRYPTO 1995»
15 years 1 months ago
Secure Signature Schemes based on Interactive Protocols
Ronald Cramer, Ivan Damgård
CRYPTO
1995
Springer
100views Cryptology» more  CRYPTO 1995»
15 years 1 months ago
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, M...
CRYPTO
1995
Springer
118views Cryptology» more  CRYPTO 1995»
15 years 1 months ago
MDx-MAC and Building Fast MACs from Hash Functions
Bart Preneel, Paul C. van Oorschot
IMA
1995
Springer
168views Cryptology» more  IMA 1995»
15 years 1 months ago
The Main Conjecture for MDS Codes
J. W. P. Hirschfeld
ASIACRYPT
1991
Springer
15 years 1 months ago
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jenn...