Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
38
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,715
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Advances in Cryptology – ASIACRYPT 2009
other
Editor(s):
Mitsuru Matsui
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Brain Science Advances
Author and book information
Book
ISBN (Print):
978-3-642-10365-0
ISBN (Electronic):
978-3-642-10366-7
Publication date (Print):
2009
DOI:
10.1007/978-3-642-10366-7
SO-VID:
a21b965a-3a4d-4bbb-b606-2543a408150a
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Related-Key Cryptanalysis of the Full AES-192 and AES-256
pp. 542
Improved Cryptanalysis of Skein
pp. 37
Cascade Encryption Revisited
pp. 126
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
pp. 179
Group Encryption: Non-interactive Realization in the Standard Model
pp. 232
Hedged Public-Key Encryption: How to Protect against Bad Randomness
pp. 319
Proofs of Storage from Homomorphic Identification Protocols
pp. 334
Simple Adaptive Oblivious Transfer without Random Oracle
pp. 505
Security Notions and Generic Constructions for Client Puzzles
pp. 524
Foundations of Non-malleable Hash and One-Way Functions
pp. 617
Efficient Public Key Encryption Based on Ideal Lattices
pp. 636
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
pp. 685
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
pp. 703
Signature Schemes with Bounded Leakage Resilience
Similar content
1,715
Advances in Cryptology – ASIACRYPT 2016
Authors:
Jung Cheon
,
Tsuyoshi Takagi
Advances in Cryptology — Asiacrypt'91
Authors:
T. ITOH
Advances in Cryptology – ASIACRYPT.
Authors:
D. Hofheinz
,
T JÄGER
,
E. Kiltz
…
See all similar
Cited by
2
Smaller Decoding Exponents: Ball-Collision Decoding
Authors:
Daniel J. Bernstein
,
Tanja Lange
,
Christiane Peters
Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions
Authors:
Sergij Goncharov
See all cited by