skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 468  for All Library Resources

Results 1 2 3 4 5 next page
Refined by: Journal Title: Journal Of Cryptology remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Material Type:
Article
Add to My Research

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

Journal of cryptology, 2021-07, Vol.34 (3) [Peer Reviewed Journal]

The Author(s) 2021 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09398-9

Digital Resources/Online E-Resources

2
On the Hardness of Module Learning with Errors with Short Distributions
Material Type:
Article
Add to My Research

On the Hardness of Module Learning with Errors with Short Distributions

Journal of cryptology, 2023-01, Vol.36 (1), p.1-70 [Peer Reviewed Journal]

Attribution ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-022-09441-3

Digital Resources/Online E-Resources

3
I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups
Material Type:
Article
Add to My Research

I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups

Journal of cryptology, 2023-07, Vol.36 (3) [Peer Reviewed Journal]

Attribution ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-023-09459-1

Digital Resources/Online E-Resources

4
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression
Material Type:
Article
Add to My Research

Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression

Journal of cryptology, 2018-07, Vol.31 (3), p.885-916 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-017-9273-9

Digital Resources/Online E-Resources

5
TFHE: Fast Fully Homomorphic Encryption Over the Torus
Material Type:
Article
Add to My Research

TFHE: Fast Fully Homomorphic Encryption Over the Torus

Journal of cryptology, 2020-01, Vol.33 (1), p.34-91 [Peer Reviewed Journal]

Attribution ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-019-09319-x

Digital Resources/Online E-Resources

6
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions
Material Type:
Article
Add to My Research

Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions

Journal of cryptology, 2020-10, Vol.33 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-020-09350-3

Digital Resources/Online E-Resources

7
Making the Impossible Possible
Material Type:
Article
Add to My Research

Making the Impossible Possible

Journal of cryptology, 2018-01, Vol.31 (1), p.101-133 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-016-9251-7

Digital Resources/Online E-Resources

8
Updating key size estimations for pairings
Material Type:
Article
Add to My Research

Updating key size estimations for pairings

Journal of cryptology, 2019-10, Vol.32 (4), p.1298-1336 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-018-9280-5

Digital Resources/Online E-Resources

9
Unifying Leakage Models: From Probing Attacks to Noisy Leakage
Material Type:
Article
Add to My Research

Unifying Leakage Models: From Probing Attacks to Noisy Leakage

Journal of cryptology, 2019-01, Vol.32 (1), p.151-177 [Peer Reviewed Journal]

The Author(s) 2018 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-018-9284-1

Digital Resources/Online E-Resources

10
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli
Material Type:
Article
Add to My Research

Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli

Journal of cryptology, 2021-10, Vol.34 (4) [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09413-z

Digital Resources/Online E-Resources

11
Efficient Cryptosystems From $2^k$ -th Power Residue Symbols
Material Type:
Article
Add to My Research

Efficient Cryptosystems From $2^k$ -th Power Residue Symbols

Journal of cryptology, 2016-04 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-016-9229-5

Digital Resources/Online E-Resources

12
Efficient quantum key distribution scheme and a proof of its unconditional security
Material Type:
Article
Add to My Research

Efficient quantum key distribution scheme and a proof of its unconditional security

Journal of cryptology, 2005-04, Vol.18 (2), p.133-165 [Peer Reviewed Journal]

2005 INIST-CNRS ;Springer-Verlag 2004. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-004-0142-y

Full text available

13
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Material Type:
Article
Add to My Research

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

Journal of cryptology, 2008-07, Vol.21 (3), p.350-391 [Peer Reviewed Journal]

International Association for Cryptologic Research 2007 ;2008 INIST-CNRS ;International Association for Cryptologic Research 2007. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-007-9006-6

Full text available

14
Adaptively Secure Distributed PRFs from LWE
Material Type:
Article
Add to My Research

Adaptively Secure Distributed PRFs from LWE

Journal of cryptology, 2021-07, Vol.34 (3), p.1-46 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09393-0

Digital Resources/Online E-Resources

15
Quark: A Lightweight Hash
Material Type:
Article
Add to My Research

Quark: A Lightweight Hash

Journal of cryptology, 2013-04, Vol.26 (2), p.313-339 [Peer Reviewed Journal]

International Association for Cryptologic Research 2012 ;2014 INIST-CNRS ;International Association for Cryptologic Research 2012. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-012-9125-6

Full text available

16
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
Material Type:
Article
Add to My Research

Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC

Journal of cryptology, 2021-07, Vol.34 (3) [Peer Reviewed Journal]

The Author(s) 2021 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09389-w

Digital Resources/Online E-Resources

17
Efficient Selective Identity-Based Encryption Without Random Oracles
Material Type:
Article
Add to My Research

Efficient Selective Identity-Based Encryption Without Random Oracles

Journal of cryptology, 2011-10, Vol.24 (4), p.659-693 [Peer Reviewed Journal]

International Association for Cryptologic Research 2010 ;2015 INIST-CNRS ;International Association for Cryptologic Research 2010. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-010-9078-6

Full text available

18
Secure distributed key generation for discrete-log based cryptosystems
Material Type:
Article
Add to My Research

Secure distributed key generation for discrete-log based cryptosystems

Journal of cryptology, 2007-01, Vol.20 (1), p.51-83 [Peer Reviewed Journal]

2007 INIST-CNRS ;International Association for Cryptologic Research 2006. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-006-0347-3

Full text available

19
The Q-curve construction for endomorphism-accelerated elliptic curves
Material Type:
Article
Add to My Research

The Q-curve construction for endomorphism-accelerated elliptic curves

Journal of cryptology, 2016-10, Vol.29 (4) [Peer Reviewed Journal]

Copyright ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-015-9210-8

Digital Resources/Online E-Resources

20
Generic Attacks on Hash Combiners
Material Type:
Article
Add to My Research

Generic Attacks on Hash Combiners

Journal of cryptology, 2020-07, Vol.33 (3), p.742-823 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-019-09328-w

Digital Resources/Online E-Resources

Results 1 - 20 of 468  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Searching Remote Databases, Please Wait