Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

197 Publications


2006 | Conference Paper | IST-REx-ID: 3214
Luby Rackoff ciphers from weak round functions
U. Maurer, Y. Oswald, K.Z. Pietrzak, J. Sjödin, in:, Springer, 2006, pp. 391–408.
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3215
Separating sources for encryption and secret sharing
Y. Dodis, K.Z. Pietrzak, B. Przydatek, in:, Springer, 2006, pp. 601–616.
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3216
A tight bound for EMAC
K.Z. Pietrzak, in:, Springer, 2006, pp. 168–179.
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3217
Composition implies adaptive security in minicrypt
K.Z. Pietrzak, in:, Springer, 2006, pp. 328–338.
View | DOI
 

2006 | Book Chapter | IST-REx-ID: 3404
Atomic force microscopy
H.L. Janovjak, R. Sawhney, M. Stark, D. Mueller, in:, Techniques in Microscopy for Biomedical Applications, World Scientific Publishing, 2006, pp. 213–284.
View
 

Filters and Search Terms

year=2006

Search

Filter Publications