Search

Your search keyword '"Marc Fischlin"' showing total 230 results

Search Constraints

Start Over You searched for: Author "Marc Fischlin" Remove constraint Author: "Marc Fischlin"
230 results on '"Marc Fischlin"'

Search Results

201. Robust Multi-property Combiners for Hash Functions Revisited

202. A Closer Look at PKI: Security and Efficiency

203. On the Security of OAEP

204. Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes

205. A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves

206. Topics in Cryptology - CT-RSA 2009 : The Cryptographers' Track at the RSA Conference 2009, San Francisco,CA, USA, April 20-24, 2009, Proceedings

207. Progressive Verification: The Case of Message Authentication

208. The Cramer-Shoup Strong-RSA Signature Scheme Revisited

209. Lower bounds for the signature size of incremental schemes

210. Identification Protocols Secure against Reset Attacks

211. Public-Key Cryptography (Dagstuhl Seminar 11391)

212. Cryptographic limitations on parallelizing membership and equivalence queries with applications to random-self-reductions

213. Authentication in Key-Exchange: Definitions, Relations and Composition

217. Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning

218. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts

219. Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems

220. Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields

221. The Sum Can Be Weaker Than Each Part

222. Disjunctions for Hash Proof Systems: New Constructions and Applications

223. Universal Security; From bits and mips to pools, lakes - and beyond

224. From Selective to Full Security: Semi-Generic Transformations in the Standard Model

225. Password-Based Authenticated Key Exchange

226. Generating Provable Primes Efficiently on Embedded Devices

227. Ring-LWE in Polynomial Rings

228. Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable

229. Adaptive-ID Secure Revocable Identity-Based Encryption

230. Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods

Catalog

Books, media, physical & digital resources