-
21Published 2016Table of Contents: “… -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable…”
Full Text via HEAL-Link
Electronic eBook -
22Published 2016Table of Contents: “… -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable…”
Full Text via HEAL-Link
Electronic eBook -
23Published 2006Table of Contents: “… Security: Key Agreement -- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols -- Efficient…”
Full Text via HEAL-Link
Electronic eBook -
24Published 2016Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
25Published 2016Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
26Published 2017Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
Full Text via HEAL-Link
Electronic eBook -
27Published 2017Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
Full Text via HEAL-Link
Electronic eBook -
28Published 2017Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
Full Text via HEAL-Link
Electronic eBook -
29Published 2016Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
30by Smart, Nigel P.Table of Contents: “… on Public Key Schemes -- Definitions of Security -- Complexity Theoretic Approaches -- Provable Security…”
Published 2016
Full Text via HEAL-Link
Electronic eBook -
31Published 1999Table of Contents: “…Practice-Oriented Provable-Security -- to Secure Computation -- Commitment Schemes and Zero…”
Full Text via HEAL-Link
Electronic eBook -
32
-
33Published 2010Table of Contents: “… Problems -- Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign -- The Geometry of Provable…”
Full Text via HEAL-Link
Electronic eBook -
34Published 2000Table of Contents: “… Application to Cryptosystems -- Symmetric-Key Schemes I -- Provable Security for the Skipjack-like Structure…”
Full Text via HEAL-Link
Electronic eBook -
35Published 2015Table of Contents: “… Attacks -- A Provable-Security Analysis of Intel’s Secure Key RNG -- A Formal Treatment of Backdoored…”
Full Text via HEAL-Link
Electronic eBook -
36Published 2001Table of Contents: “… on Feistel Schemes -- A Compact Rijndael Hardware Architecture with S-Box Optimization -- Provable Security…”
Full Text via HEAL-Link
Electronic eBook -
37Published 2006Table of Contents: “… Key Distribution Patterns -- Provably Secure Tripartite Password Protected Key Exchange Protocol Based…”
Full Text via HEAL-Link
Electronic eBook -
38Published 2006Table of Contents: “… Applications -- Signatures -- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption…”
Full Text via HEAL-Link
Electronic eBook -
39Published 2015Table of Contents: “… of Block Ciphers -- A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity.…”
Full Text via HEAL-Link
Electronic eBook -
40Published 2006Table of Contents: “… Secure Electronic Cash Based on Blind Multisignature Schemes -- Efficient Provably Secure Restrictive…”
Full Text via HEAL-Link
Electronic eBook