Loading…
Loading…
Loading…
Loading…
Proactive Secret Sharing with a Dishonest Majority
Dolev, Shlomi, ElDefrawy, Karim, Lampkins, Joshua, Ostrovsky, Rafail, Yung, Moti
Published in Security and Cryptography for Networks (2016)
Published in Security and Cryptography for Networks (2016)
Get full text
Book Chapter
Loading…
Compact IBBE and Fuzzy IBE from Simple Assumptions
Gong, Junqing, Libert, Benoît, Ramanna, Somindu C.
Published in Security and Cryptography for Networks (2018)
Published in Security and Cryptography for Networks (2018)
Get full text
Book Chapter
Loading…
Loading…
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended abstract)
KIM, Jongsung, BIRYUKOV, Alex, PRENEEL, Bart, HONG, Seokhie
Published in Lecture notes in computer science (2006)
Get full text
Published in Lecture notes in computer science (2006)
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Secure Two-Party Computation over Unreliable Channels
Gelles, Ran, Paskin-Cherniavsky, Anat, Zikas, Vassilis
Published in Security and Cryptography for Networks (2018)
Published in Security and Cryptography for Networks (2018)
Get full text
Book Chapter
Loading…
Bounded Size-Hiding Private Set Intersection
Bradley, Tatiana, Faber, Sky, Tsudik, Gene
Published in Security and Cryptography for Networks (2016)
Published in Security and Cryptography for Networks (2016)
Get full text
Book Chapter
Loading…
Loading…
Bounded KDM Security from iO and OWF
Marcedone, Antonio, Pass, Rafael, Shelat, Abhi
Published in Security and Cryptography for Networks (2016)
Published in Security and Cryptography for Networks (2016)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Balancing accountability and privacy using E-cash
CAMENISCH, Jan, HOHENBERGER, Susan, LYSYANSKAYA, Anna
Published in Lecture notes in computer science (2006)
Get full text
Published in Lecture notes in computer science (2006)
Conference Proceeding
Loading…
Loading…
Loading…