researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Issue
Volume
15
, Issue
2
75
--
96
Victor Shoup
,
Rosario Gennaro
.
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
97
--
102
Moni Naor
,
Omer Reingold
.
Constructing Pseudo-Random Permutations with a Prescribed Structure
103
--
127
MartÃn Abadi
,
Phillip Rogaway
.
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
129
--
138
Steven D. Galbraith
.
Elliptic Curve Paillier Schemes
139
--
148
Anna M. Johnston
,
Peter Gemmell
.
Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack