Search results for: Shai Halevi
Algorithmica > 2017 > 79 > 4 > 1353-1373
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2004 > Mode of Operations > 292-304
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2003 > Public Key Encryption > 255-271
Lecture Notes in Computer Science > Selected Areas in Cryptography > Miscellaneous Techniques > 53-70
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2008 > Public-Key Crypto I > 108-125
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Secure Distributed Computation and Applications > 112-130
Lecture Notes in Computer Science > Theory of Cryptography > Hardness Amplification and Error Correction > 17-33
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Leakage Resilient Cryptography > 722-739
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Stream Ciphers and Boolean Functions > 515-532
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Modes of Operation > 315-327
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Identity-Based Encryption > 207-222
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Outsourcing and Delegating Computation > 132-150