„Network Coding“
Suchergebnisse
3.793 Treffer
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
Analysis of an Unconditionally Secure Distributed Oblivious Transfer
-
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
-
Slender-Set Differential Cryptanalysis
-
Public-Coin Parallel Zero-Knowledge for NP
-
Security Analysis of Randomize-Hash-then-Sign Digital Signatures
-
Batch Verification of Short Signatures
-
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
-
On-line Ciphers and the Hash-CBC Constructions
-
Bonsai Trees, or How to Delegate a Lattice Basis
-
Computational Indistinguishability Between Quantum States and Its Cryptographic Application
-
Programmable Hash Functions and Their Applications
-
Efficient Set Operations in the Presence of Malicious Adversaries
-
Multi-Verifier Signatures
-
A Simple Variant of the Merkle–Damgård Scheme with a Permutation
-
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
-
Smooth Projective Hashing and Two-Message Oblivious Transfer
-
Parallel Repetition of Computationally Sound Protocols Revisited
-
Secure Proxy Signature Schemes for Delegation of Signing Rights
-
Which Languages Have 4-Round Zero-Knowledge Proofs?