Ernest F. Brickell
Ernest F. Brickell
Abhranil Maiti; Patrick Schaumont
Abhranil Maiti; Patrick Schaumont
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions [0.03%]
关于无设置假设下通用可组合两方计算的局限性
Ran Canetti; Eyal Kushilevitz; Yehuda Lindell
Ran Canetti; Eyal Kushilevitz; Yehuda Lindell
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches [0.03%]
存在毛刺情况下的非线性函数安全硬件实现
Svetla Nikova; Vincent Rijmen; Martin Schläffer
Svetla Nikova; Vincent Rijmen; Martin Schläffer
New bounds and constructions for authentication/secrecy codes with splitting [0.03%]
具有分裂功能的身份认证/保密码的新界和构造
Marijke Soete
Marijke Soete
Mathieu Baudet; David Lubicz; Julien Micolod; André Tassiaux
Mathieu Baudet; David Lubicz; Julien Micolod; André Tassiaux
Oded Goldreich; Yehuda Lindell
Oded Goldreich; Yehuda Lindell
Benjamin Smith
Benjamin Smith
H. Zbinden; N. Gisin; B. Huttner; A. Muller; W. Tittel
H. Zbinden; N. Gisin; B. Huttner; A. Muller; W. Tittel
How to Protect DES Against Exhaustive Key Search (an Analysis of DESX) [0.03%]
如何防范DES遭受穷举密钥搜索攻击(DESX分析)
Joe Kilian; Phillip Rogaway
Joe Kilian; Phillip Rogaway