Lecture Notes in Computer Science

Results: 278



#Item
1A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:38
2An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:55
3An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
4A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
5Consent to Publish  123 Lecture Notes in Computer Science

Consent to Publish 123 Lecture Notes in Computer Science

Add to Reading List

Source URL: www.lsis.org

Language: English - Date: 2016-01-07 15:27:50
    6123  Consent to Publish Lecture Notes in Computer Science  Title of the Book or Conference Name: New

    123 Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: New

    Add to Reading List

    Source URL: www.biplab.unisa.it

    Language: English - Date: 2017-07-10 02:39:18
      7Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volume Editor(s

      Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volume Editor(s

      Add to Reading List

      Source URL: www.miccai2018.org

      Language: English - Date: 2018-02-28 09:31:26
        8Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volume Editor(s

        Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Volume Editor(s

        Add to Reading List

        Source URL: www.raid2018.org

        Language: English - Date: 2018-08-09 05:10:21
          9Published in P. Y. A. Ryan, D. Naccache, and J.-J. Quisquater, Eds., The New Codebreakers (Kahn Festschrift), volof Lecture Notes in Computer Science, pp, Springer, 2016. Secure ElGamal-type Cryptosystems

          Published in P. Y. A. Ryan, D. Naccache, and J.-J. Quisquater, Eds., The New Codebreakers (Kahn Festschrift), volof Lecture Notes in Computer Science, pp, Springer, 2016. Secure ElGamal-type Cryptosystems

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2016-03-24 12:20:23
            10123  Consent to Publish Lecture Notes in Computer Science  Title of the Book or Conference Name: Advances

            123 Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: Advances

            Add to Reading List

            Source URL: www.ecir2018.org

            Language: English - Date: 2017-12-13 09:29:41