Results 141 to 150 of about 1,402 (165)
Some of the next articles are maybe not open access.
From Indifferentiability to Constructive Cryptography (and Back)
Theory of Cryptography Conference, 2016U. Maurer, R. Renner
semanticscholar +1 more source
Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations
Australasian Conference on Information Security and Privacy, 2017Yusuke Naito
semanticscholar +1 more source
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction
Journal of Cryptology, 2014Jean-Sébastien Coron +2 more
exaly
Improved Indifferentiability Security Bound for the Prefix-Free Merkle-Damgård Hash Function
Conference on Information Security and Cryptology, 2018K. Ammour, Lei Wang
semanticscholar +1 more source
Security Definitions for Hash Functions: Combining UCE and Indifferentiability
International Conference on Security and Cryptography for Networks, 2018D. Jost, U. Maurer
semanticscholar +1 more source
"Gli indifferenti" da Moravia a Maselli
2007L'adattamento cinematografico del romanzo di Moravia "Gli indifferenti"
openaire +1 more source

