Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5722
search results - page 32 / 1145
»
Security Function Interactions
Sort
relevance
views
votes
recent
update
View
thumb
title
87
Voted
CRYPTO
1999
Springer
87
views
Cryptology
»
more
CRYPTO 1999
»
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier
15 years 7 months ago
Download
cseweb.ucsd.edu
Mihir Bellare, Oded Goldreich, Hugo Krawczyk
claim paper
Read More »
89
Voted
FOCS
1996
IEEE
77
views
Theoretical Computer Science
»
more
FOCS 1996
»
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security
15 years 6 months ago
Download
cseweb.ucsd.edu
Mihir Bellare, Ran Canetti, Hugo Krawczyk
claim paper
Read More »
87
Voted
CRYPTO
2010
Springer
120
views
Cryptology
»
more
CRYPTO 2010
»
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
15 years 3 months ago
Download
cseweb.ucsd.edu
Mihir Bellare, David Cash
claim paper
Read More »
76
click to vote
DT
2010
53
views
more
DT 2010
»
Secure and Robust Error Correction for Physical Unclonable Functions
15 years 2 months ago
Download
people.csail.mit.edu
Meng-Day (Mandel) Yu, Srinivas Devadas
claim paper
Read More »
70
click to vote
COMPSEC
2006
91
views
more
COMPSEC 2006
»
Security considerations for incremental hash functions based on pair block chaining
15 years 2 months ago
Download
www.cs.berkeley.edu
Raphael Chung-Wei Phan, David Wagner
claim paper
Read More »
« Prev
« First
page 32 / 1145
Last »
Next »