共 50 条
- [21] Intrusion-resilient secure channels (Extended abstract) APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 238 - 253
- [22] New constructions for secure hash functions (Extended abstract) FAST SOFTWARE ENCRYPTION, 1998, 1372 : 150 - 167
- [23] Side-channel issues for designing secure hardware implementations 11TH IEEE INTERNATIONAL ON-LINE TESTING SYMPOSIUM, 2005, : 118 - 121
- [25] Simulating Noisy Channel Interaction [Extended Abstract] PROCEEDINGS OF THE 6TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE (ITCS'15), 2015, : 21 - 30
- [26] One-round secure computation and secure autonomous mobile agents (Extended abstract) AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 512 - 523
- [27] Efficient secure multi-party computation - (Extended abstract) ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 143 - 161
- [28] Protocols for collusion-secure asymmetric fingerprinting (extended abstract) STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 399 - 412
- [29] Extended abstract: Forward-secure sequential aggregate authentication 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 86 - +
- [30] Secure multiparty computations using the 15 puzzle (Extended abstract) COMBINATORIAL OPTIMIZATION AND APPLICATIONS, PROCEEDINGS, 2007, 4616 : 255 - +