|
Journals in DBLP
J. Cryptology 2007, volume: 20, number: 2
- Johan Håstad
The Security of the IAPM and IACBC Modes. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:2, pp:153-163 [Journal]
- Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel
Constant-Round Oblivious Transfer in the Bounded Storage Model. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:2, pp:165-202 [Journal]
- Joonsang Baek, Ron Steinfeld, Yuliang Zheng
Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:2, pp:203-235 [Journal]
- Tamir Tassa
Hierarchical Threshold Secret Sharing. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2007, v:20, n:2, pp:237-264 [Journal]
|