4

Hiding secrets in software

Year:
2016
Language:
english
File:
PDF, 549 KB
english, 2016
5

A Forward-Secure Public-Key Encryption Scheme

Year:
2007
Language:
english
File:
PDF, 355 KB
english, 2007
6

Lichenoid drug eruptions

Year:
1993
Language:
english
File:
PDF, 865 KB
english, 1993
12

A Forward-Secure Public-Key Encryption Scheme*

Year:
2008
Language:
english
File:
PDF, 313 KB
english, 2008
17

Chosen‐Ciphertext Security from Identity‐Based Encryption

Year:
2007
Language:
english
File:
PDF, 293 KB
english, 2007
19

Maintaining Authenticated Communication in the Presence of Break-Ins

Year:
2000
Language:
english
File:
PDF, 260 KB
english, 2000
22

Smooth Projective Hashing and Two-Message Oblivious Transfer

Year:
2012
Language:
english
File:
PDF, 513 KB
english, 2012
25

Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver

Year:
1999
Language:
english
File:
PDF, 128 KB
english, 1999
26

Direct triggers for ulceration in patients with venous insufficiency

Year:
2005
Language:
english
File:
PDF, 76 KB
english, 2005
29

Public-key cryptography and password protocols

Year:
1999
Language:
english
File:
PDF, 269 KB
english, 1999
38

The random oracle methodology, revisited

Year:
2004
Language:
english
File:
PDF, 327 KB
english, 2004