|
Journals in DBLP
- Thomas Beth, Willi Geiselmann, Rainer Steinwandt
Mathematical Techniques in Cryptology-Editorial. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:377-378 [Journal]
- Mihir Bellare, Adriana Palacio
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:379-396 [Journal]
- Ian F. Blake, Theodoulos Garefalakis, Igor Shparlinski
On the bit security of the Diffie-Hellman key. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:397-404 [Journal]
- Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal]
- Alfred Menezes, Edlyn Teske
Cryptographic implications of Hess' generalized GHS attack. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:439-460 [Journal]
- James A. Muir, Douglas R. Stinson
On the low hamming weight discrete logarithm problem for nonadjacent representations. [Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:461-472 [Journal]
|