„Network Coding“
Suchergebnisse
3.793 Treffer
-
Reflection Cryptanalysis of PRINCE-Like Ciphers
-
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
-
Tight Security for Signature Schemes Without Random Oracles
-
Protocols for Multiparty Coin Toss with a Dishonest Majority
-
On the Complexity of Constructing Pseudorandom Functions (Especially when They Don’t Exist)
-
GNUC: A New Universal Composability Framework
-
Computing on Authenticated Data
-
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
-
From Non-adaptive to Adaptive Pseudorandom Functions
-
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
-
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions
-
Confined Guessing: New Signatures From Standard Assumptions
-
Quantum Private Information Retrieval has Linear Communication Complexity
-
Cryptanalysis of SHA-0 and Reduced SHA-1
-
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
-
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
-
A Characterization of Chameleon Hash Functions and New, Efficient Designs
-
Authenticated Adversarial Routing
-
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions
-
Cryptography in the Multi-string Model