共 50 条
- [11] New results on unconditionally secure distributed oblivious transfer (Extended abstract) SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 291 - 309
- [13] TWISTER - A Framework for Secure and Fast Hash Functions INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 257 - +
- [14] One-Round Secure Multiparty Computation of Arithmetic Streams and Functions (Extended Abstract) CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2018, 2018, 10879 : 255 - 273
- [16] On forward-secure storage - Extended abstract ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 251 - 270
- [17] Visualization for Secure Coding in C Extended Abstract ITICSE'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2017, : 372 - 372
- [18] Secure multiparty computation of approximations - (Extended abstract) AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 927 - 938
- [19] Multicollisions in iterated hash functions. Application to cascaded constructions ADVANCS IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 306 - 316
- [20] A secure user authentication scheme using hash functions Operating Systems Review (ACM), 2004, 38 (02): : 62 - 68