Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Ascon v1.2: Lightweight Authenticated Encryption and HashingJournal of cryptology, 2021-07, Vol.34 (3) [Peer Reviewed Journal]The Author(s) 2021 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09398-9Digital Resources/Online E-Resources |
|
2 |
Material Type: Article
|
On the Hardness of Module Learning with Errors with Short DistributionsJournal of cryptology, 2023-01, Vol.36 (1), p.1-70 [Peer Reviewed Journal]Attribution ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-022-09441-3Digital Resources/Online E-Resources |
|
3 |
Material Type: Article
|
I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groupsJournal of cryptology, 2023-07, Vol.36 (3) [Peer Reviewed Journal]Attribution ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-023-09459-1Digital Resources/Online E-Resources |
|
4 |
Material Type: Article
|
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionJournal of cryptology, 2018-07, Vol.31 (3), p.885-916 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-017-9273-9Digital Resources/Online E-Resources |
|
5 |
Material Type: Article
|
TFHE: Fast Fully Homomorphic Encryption Over the TorusJournal of cryptology, 2020-01, Vol.33 (1), p.34-91 [Peer Reviewed Journal]Attribution ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-019-09319-xDigital Resources/Online E-Resources |
|
6 |
Material Type: Article
|
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and ConstructionsJournal of cryptology, 2020-10, Vol.33 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-020-09350-3Digital Resources/Online E-Resources |
|
7 |
Material Type: Article
|
Making the Impossible PossibleJournal of cryptology, 2018-01, Vol.31 (1), p.101-133 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-016-9251-7Digital Resources/Online E-Resources |
|
8 |
Material Type: Article
|
Updating key size estimations for pairingsJournal of cryptology, 2019-10, Vol.32 (4), p.1298-1336 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-018-9280-5Digital Resources/Online E-Resources |
|
9 |
Material Type: Article
|
Unifying Leakage Models: From Probing Attacks to Noisy LeakageJournal of cryptology, 2019-01, Vol.32 (1), p.151-177 [Peer Reviewed Journal]The Author(s) 2018 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-018-9284-1Digital Resources/Online E-Resources |
|
10 |
Material Type: Article
|
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on GimliJournal of cryptology, 2021-10, Vol.34 (4) [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09413-zDigital Resources/Online E-Resources |
|
11 |
Material Type: Article
|
Efficient Cryptosystems From $2^k$ -th Power Residue SymbolsJournal of cryptology, 2016-04 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-016-9229-5Digital Resources/Online E-Resources |
|
12 |
Material Type: Article
|
Efficient quantum key distribution scheme and a proof of its unconditional securityJournal of cryptology, 2005-04, Vol.18 (2), p.133-165 [Peer Reviewed Journal]2005 INIST-CNRS ;Springer-Verlag 2004. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-004-0142-yFull text available |
|
13 |
Material Type: Article
|
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and ExtensionsJournal of cryptology, 2008-07, Vol.21 (3), p.350-391 [Peer Reviewed Journal]International Association for Cryptologic Research 2007 ;2008 INIST-CNRS ;International Association for Cryptologic Research 2007. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-007-9006-6Full text available |
|
14 |
Material Type: Article
|
Adaptively Secure Distributed PRFs from LWEJournal of cryptology, 2021-07, Vol.34 (3), p.1-46 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09393-0Digital Resources/Online E-Resources |
|
15 |
Material Type: Article
|
Quark: A Lightweight HashJournal of cryptology, 2013-04, Vol.26 (2), p.313-339 [Peer Reviewed Journal]International Association for Cryptologic Research 2012 ;2014 INIST-CNRS ;International Association for Cryptologic Research 2012. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-012-9125-6Full text available |
|
16 |
Material Type: Article
|
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUICJournal of cryptology, 2021-07, Vol.34 (3) [Peer Reviewed Journal]The Author(s) 2021 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09389-wDigital Resources/Online E-Resources |
|
17 |
Material Type: Article
|
Efficient Selective Identity-Based Encryption Without Random OraclesJournal of cryptology, 2011-10, Vol.24 (4), p.659-693 [Peer Reviewed Journal]International Association for Cryptologic Research 2010 ;2015 INIST-CNRS ;International Association for Cryptologic Research 2010. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-010-9078-6Full text available |
|
18 |
Material Type: Article
|
Secure distributed key generation for discrete-log based cryptosystemsJournal of cryptology, 2007-01, Vol.20 (1), p.51-83 [Peer Reviewed Journal]2007 INIST-CNRS ;International Association for Cryptologic Research 2006. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-006-0347-3Full text available |
|
19 |
Material Type: Article
|
The Q-curve construction for endomorphism-accelerated elliptic curvesJournal of cryptology, 2016-10, Vol.29 (4) [Peer Reviewed Journal]Copyright ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-015-9210-8Digital Resources/Online E-Resources |
|
20 |
Material Type: Article
|
Generic Attacks on Hash CombinersJournal of cryptology, 2020-07, Vol.33 (3), p.742-823 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-019-09328-wDigital Resources/Online E-Resources |