„Network Coding“
Suchergebnisse
3.793 Treffer
-
A study of password security
-
A generalization of Hellman's extension to Shannon's approach to cryptography
-
Inferring sequences produced by a linear congruential generator missing low-order bits
-
A construction for authentication/secrecy codes from certain combinatorial designs
-
A key distribution system equivalent to factoring
-
Zero-knowledge proofs of identity
-
The generation of random numbers that are probably prime
-
Some constructions and bounds for authentication codes
-
Is the Data Encryption Standard a group? (Results of cycling experiments on DES)
-
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
-
On Black-Box Complexity of Universally Composable Security in the CRS Model
-
Breaking RSA May Be As Difficult As Factoring
-
Concurrent Knowledge Extraction in Public-Key Models
-
Efficient Set Intersection with Simulation-Based Security
-
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction
-
Enhanced Public Key Security for the McEliece Cryptosystem
-
New Proofs for NMAC and HMAC: Security without Collision Resistance
-
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs
-
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
-
Almost-Everywhere Secure Computation with Edge Corruptions