„Network Coding“
Suchergebnisse
3.793 Treffer
-
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
-
Parallel and Concurrent Security of the HB and HB+ Protocols
-
Secure Computation of the Median (and Other Elements of Specified Ranks)
-
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
-
The TLS Handshake Protocol: A Modular Analysis
-
Obfuscation for Cryptographic Purposes
-
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
-
Cryptanalysis of MD2
-
Efficient Cache Attacks on AES, and Countermeasures
-
New Approaches for Deniable Authentication
-
The Twin Diffie–Hellman Problem and Applications
-
Cryptography with Constant Input Locality
-
General Composition and Universal Composability in Secure Multiparty Computation
-
Upper and Lower Bounds on Black-Box Steganography
-
Reducing Complexity Assumptions for Statistically-Hiding Commitment
-
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography
-
Non-interactive Timestamping in the Bounded-Storage Model
-
A Proof of Security of Yao’s Protocol for Two-Party Computation
-
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
-
Chernoff-Type Direct Product Theorems