Sciweavers

5722 search results - page 31 / 1145
» Security Function Interactions
Sort
View
107
Voted
FC
2005
Springer
99views Cryptology» more  FC 2005»
15 years 10 months ago
Information-Theoretic Security Analysis of Physical Uncloneable Functions
Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M....
128
Voted
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
15 years 10 months ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
124
Voted
FSE
2010
Springer
124views Cryptology» more  FSE 2010»
15 years 10 months ago
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
97
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Mix and Match: Secure Function Evaluation via Ciphertexts
Markus Jakobsson, Ari Juels