„Network Coding“
Suchergebnisse
3.793 Treffer
-
On Best-Possible Obfuscation
-
Rotational Rebound Attacks on Reduced Skein
-
Key-Dependent Message Security: Generic Amplification and Completeness
-
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
-
On Strong Simulation and Composable Point Obfuscation
-
On the Amortized Complexity of Zero-Knowledge Protocols
-
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
-
(Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher
-
A One-Time Stegosystem and Applications to Efficient Covert Communication
-
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
-
Round-Optimal Password-Based Authenticated Key Exchange
-
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge
-
A Comparison of Cryptanalytic Tradeoff Algorithms
-
Fully Leakage-Resilient Signatures
-
Enhancements of Trapdoor Permutations
-
Polynomial Runtime and Composability
-
Logic Minimization Techniques with Applications to Cryptology
-
Mercurial Commitments with Applications to Zero-Knowledge Sets
-
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
-
Practical Chosen Ciphertext Secure Encryption from Factoring