Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

197 Publications


2006 | Conference Paper | IST-REx-ID: 3214
U. Maurer, Y. Oswald, K. Z. Pietrzak, and J. Sjödin, “Luby Rackoff ciphers from weak round functions ,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, 2006, vol. 4004, pp. 391–408.
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3215
Y. Dodis, K. Z. Pietrzak, and B. Przydatek, “Separating sources for encryption and secret sharing,” presented at the TCC: Theory of Cryptography Conference, 2006, vol. 3876, pp. 601–616.
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3216
K. Z. Pietrzak, “A tight bound for EMAC,” presented at the ICALP: Automata, Languages and Programming, 2006, vol. 4052, pp. 168–179.
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3217
K. Z. Pietrzak, “Composition implies adaptive security in minicrypt,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, 2006, vol. 4004, pp. 328–338.
View | DOI
 

2006 | Book Chapter | IST-REx-ID: 3404
H. L. Janovjak, R. Sawhney, M. Stark, and D. Mueller, “Atomic force microscopy,” in Techniques in Microscopy for Biomedical Applications, vol. 2, World Scientific Publishing, 2006, pp. 213–284.
View
 

Filters and Search Terms

year=2006

Search

Filter Publications