|
Journals in DBLP
J. Cryptology 2002, volume: 15, number: 2
- Victor Shoup, Rosario Gennaro
Securing Threshold Cryptosystems against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2002, v:15, n:2, pp:75-96 [Journal]
- Moni Naor, Omer Reingold
Constructing Pseudo-Random Permutations with a Prescribed Structure. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2002, v:15, n:2, pp:97-102 [Journal]
- Martín Abadi, Phillip Rogaway
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). [Citation Graph (0, 0)][DBLP] J. Cryptology, 2002, v:15, n:2, pp:103-127 [Journal]
- Steven D. Galbraith
Elliptic Curve Paillier Schemes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2002, v:15, n:2, pp:129-138 [Journal]
- Anna M. Johnston, Peter Gemmell
Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2002, v:15, n:2, pp:139-148 [Journal]
|