Loading…
Loading…
Loading…
Dispelling myths on superposition attacks: formal security model and attack analyses
Music, Luka, Chevalier, Céline, Kashefi, Elham
Published in Designs, codes, and cryptography (01.04.2022)
Published in Designs, codes, and cryptography (01.04.2022)
Get full text
Journal Article
Loading…
Two classes of optimal LRCs with information (r, t)-locality
Tan, Pan, Zhou, Zhengchun, Sidorenko, Vladimir, Parampalli, Udaya
Published in Designs, codes, and cryptography (01.09.2020)
Published in Designs, codes, and cryptography (01.09.2020)
Get full text
Journal Article
Loading…
The Communication Complexity of Private Simultaneous Messages, Revisited
Applebaum, Benny, Holenstein, Thomas, Mishra, Manoj, Shayevitz, Ofer
Published in Journal of cryptology (01.07.2020)
Published in Journal of cryptology (01.07.2020)
Get full text
Journal Article
Loading…
Special issue from mathematics to embedded devices
Aubry, Yves, Barthélémy, Pierre, El Mrabet, Nadia
Published in Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences (01.07.2021)
Published in Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences (01.07.2021)
Get full text
Journal Article
Book
Loading…
Loading…
Double-authentication-preventing signatures
Poettering, Bertram, Stebila, Douglas
Published in International journal of information security (01.02.2017)
Published in International journal of information security (01.02.2017)
Get full text
Journal Article
Loading…
On the construction of self-dual cyclic codes over Z4 with arbitrary even length
Cao, Yuan, Cao, Yonglin, Ling, San, Wang, Guidong
Published in Cryptography and communications (01.09.2022)
Published in Cryptography and communications (01.09.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
On the Security of Oscillator-Based Random Number Generators
Baudet, Mathieu, Lubicz, David, Micolod, Julien, Tassiaux, André
Published in Journal of cryptology (01.04.2011)
Published in Journal of cryptology (01.04.2011)
Get full text
Journal Article
Loading…
Loading…
Loading…
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
Orencik, Cengiz, Selcuk, Ayse, Savas, Erkay, Kantarcioglu, Murat
Published in International journal of information security (01.06.2016)
Published in International journal of information security (01.06.2016)
Get full text
Journal Article
Loading…
Loading…