-
1Published in Springer eBooks (2013)Table of Contents: “... Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
2Published in Springer eBooks (2015)Table of Contents: “... -- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks -- A Fast Phase...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
3Published in Springer eBooks (2013)Table of Contents: “... Leakage Chosen Ciphertext Attacks -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
4Published in Springer eBooks (2015)Table of Contents: “... Implementation of Masked AES for ARM NEON -- Chosen Ciphertext Attacks in Theory and Practice Completeness...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
5