Sciweavers

53 search results - page 1 / 11
» crypto 2000
Sort
View
127
Voted
CRYPTO
2000
Springer
121views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
John Black, Phillip Rogaway
109
Voted
CRYPTO
2000
Springer
99views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Timed Commitments
Dan Boneh, Moni Naor
101
Voted
CRYPTO
2000
Springer
81views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Optimistic Fair Secure Computation
Christian Cachin, Jan Camenisch
120
Voted
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Differential Fault Attacks on Elliptic Curve Cryptosystems
Ingrid Biehl, Bernd Meyer, Volker Müller
123
Voted
CRYPTO
2000
Springer
129views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Weaknesses in the SL2(IFs2) Hashing Scheme
Rainer Steinwandt, Markus Grassl, Willi Geiselmann...