Wyniki wyszukiwania dla: Rosario Gennaro
International Journal of Information Security > 2017 > 16 > 3 > 327-343
Lecture Notes in Computer Science > Automata, Languages and Programming > Zero-Knowledge and Signatures > 34-45
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2005 > Signature Schemes > 313-327
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Public-Key Cryptography > 361-381
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2003 > Key Exchange > 507-523
Lecture Notes in Computer Science > Selected Areas in Cryptography > Miscellaneous Techniques > 53-70
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’95 > Secret Sharing > 168-182
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2002 > Cryptanalysis I > 1-13
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Outsourcing and Delegating Computation > 111-131
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2010 > Computation Delegation and Obfuscation > 465-482