Results 131 to 140 of about 1,402 (165)
Some of the next articles are maybe not open access.
Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection
Australasian Conference on Information Security and PrivacyYao Cheng +3 more
semanticscholar +1 more source
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
IACR Cryptology ePrint Archive, 2020Y. Dodis +3 more
semanticscholar +1 more source
Offline-Online Indifferentiability of Cryptographic Systems
IACR Cryptology ePrint ArchiveAshrujit Ghoshal +2 more
semanticscholar +1 more source
Indifferentiability of 3-Round Confusion-Diffusion Networks
International Conference on Security and Cryptography for NetworksRitam Bhaumik +3 more
semanticscholar +1 more source
A synthetic indifferentiability analysis of some block-cipher-based hash functions
Designs, Codes, and Cryptography, 2008Xuejia Lai
exaly
Le parole non sono indifferenti
2009L'articolo fa parte di una rubrica 'Diversamente' sulla disabilità€ a scuola apparsa nell'annata 2008-2009.
openaire +1 more source
Improved indifferentiability security bound for the JH mode
Designs, Codes, and Cryptography, 2015Dustin Moody, Souradyuti Paul
exaly

