Article
Publicly Available
Masthead
Published/Copyright:
April 3, 2012
Published Online: 2012-04-03
Published in Print: 2012-04
©2012 by Walter de Gruyter GmbH & Co.
Articles in the same Issue
- Masthead
- Computing endomorphism rings of elliptic curves under the GRH
- Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation
- Cryptanalysis of three matrix-based key establishment protocols
- Security of blind signatures under aborts and applications to adaptive oblivious transfer
Articles in the same Issue
- Masthead
- Computing endomorphism rings of elliptic curves under the GRH
- Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation
- Cryptanalysis of three matrix-based key establishment protocols
- Security of blind signatures under aborts and applications to adaptive oblivious transfer