Sciweavers

2967 search results - page 66 / 594
» Cryptology
Sort
View
CISC
2008
Springer
100views Cryptology» more  CISC 2008»
14 years 11 months ago
Security Analysis of Multivariate Polynomials for Hashing
Luk Bettale, Jean-Charles Faugère, Ludovic ...
CISC
2008
Springer
94views Cryptology» more  CISC 2008»
14 years 11 months ago
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Debra L. Cook, Moti Yung, Angelos D. Keromytis
CANS
2006
Springer
84views Cryptology» more  CANS 2006»
14 years 11 months ago
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks
Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Z...
CISC
2006
Springer
95views Cryptology» more  CISC 2006»
14 years 11 months ago
A Revocation Scheme Preserving Privacy
Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kut...
CRYPTO
2008
Springer
85views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs
Yevgeniy Dodis, Victor Shoup, Shabsi Walfish