Sciweavers

2967 search results - page 78 / 594
» Cryptology
Sort
View
TCC
2010
Springer
117views Cryptology» more  TCC 2010»
14 years 7 months ago
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge
Rafail Ostrovsky, Omkant Pandey, Ivan Visconti
ICISC
2009
140views Cryptology» more  ICISC 2009»
14 years 7 months ago
Serial Model for Attack Tree Computations
Aivo Jürgenson, Jan Willemson
ICISC
2009
120views Cryptology» more  ICISC 2009»
14 years 7 months ago
Secret Handshakes with Revocation Support
Alessandro Sorniotti, Refik Molva
ICISC
2009
120views Cryptology» more  ICISC 2009»
14 years 7 months ago
Factoring Unbalanced Moduli with Known Bits
Eric Brier, David Naccache, Mehdi Tibouchi