Showing 21 - 40 results of 149 for search '"Provable security"', query time: 0.19s Refine Results
  1. 21
    Published 2016
    Table of Contents: “… -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 22
    Published 2016
    Table of Contents: “… -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 23
    Published 2006
    Table of Contents: “… Security: Key Agreement -- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols -- Efficient…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 24
    Published 2016
    Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 25
    Published 2016
    Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 26
    Published 2017
    Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 27
    Published 2017
    Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 28
    Published 2017
    Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 29
    Published 2016
    Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 30
    by Smart, Nigel P.
    Published 2016
    Table of Contents: “… on Public Key Schemes -- Definitions of Security -- Complexity Theoretic Approaches -- Provable Security…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 31
    Published 1999
    Table of Contents: “…Practice-Oriented Provable-Security -- to Secure Computation -- Commitment Schemes and Zero…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 32
  13. 33
    Published 2010
    Table of Contents: “… Problems -- Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign -- The Geometry of Provable…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 34
    Published 2000
    Table of Contents: “… Application to Cryptosystems -- Symmetric-Key Schemes I -- Provable Security for the Skipjack-like Structure…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 35
    Published 2015
    Table of Contents: “… Attacks -- A Provable-Security Analysis of Intel’s Secure Key RNG -- A Formal Treatment of Backdoored…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 36
    Published 2001
    Table of Contents: “… on Feistel Schemes -- A Compact Rijndael Hardware Architecture with S-Box Optimization -- Provable Security…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 37
    Published 2006
    Table of Contents: “… Key Distribution Patterns -- Provably Secure Tripartite Password Protected Key Exchange Protocol Based…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 38
    Published 2006
    Table of Contents: “… Applications -- Signatures -- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 39
    Published 2015
    Table of Contents: “… of Block Ciphers -- A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity.…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 40
    Published 2006
    Table of Contents: “… Secure Electronic Cash Based on Blind Multisignature Schemes -- Efficient Provably Secure Restrictive…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search