researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Cryptology
Home
Index
Info
Issue
Volume
25
, Issue
3
383
--
433
Carmit Hazay
,
Kobbi Nissim
.
Efficient Set Operations in the Presence of Malicious Adversaries
434
--
463
Oriol Farràs
,
Jaume Martí-Farré
,
Carles Padró
.
Ideal Multipartite Secret Sharing Schemes
464
--
483
Stanislav Smyshlyaev
.
Perfectly Balanced Boolean Functions and Golić Conjecture
484
--
527
Dennis Hofheinz
,
Eike Kiltz
.
Programmable Hash Functions and Their Applications
528
--
555
Akinori Kawachi
,
Takeshi Koshiba
,
Harumichi Nishimura
,
Tomoyuki Yamakami
.
Computational Indistinguishability Between Quantum States and Its Cryptographic Application