Katz, Jonathan; Shin, Ji Sun; Smith, Adam Parallel and concurrent security of the HB and \(HB^{+}\) protocols. (English) Zbl 1201.94090 J. Cryptology 23, No. 3, 402-421 (2010). Reviewer: Jörg Desel (Hagen) MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{J. Katz} et al., J. Cryptology 23, No. 3, 402--421 (2010; Zbl 1201.94090) Full Text: DOI
Aggarwal, Gagan; Mishra, Nina; Pinkas, Benny Secure computation of the median (and other elements of specified ranks). (English) Zbl 1195.94047 J. Cryptology 23, No. 3, 373-401 (2010). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{G. Aggarwal} et al., J. Cryptology 23, No. 3, 373--401 (2010; Zbl 1195.94047) Full Text: DOI
Cheon, Jung Hee Discrete logarithm problems with auxiliary inputs. (English) Zbl 1195.94052 J. Cryptology 23, No. 3, 457-476 (2010). MSC: 94A60 11T71 11Y16 PDF BibTeX XML Cite \textit{J. H. Cheon}, J. Cryptology 23, No. 3, 457--476 (2010; Zbl 1195.94052) Full Text: DOI
Konstantinou, Elisavet; Kontogeorgis, Aristides; Stamatiou, Yannis C; Zaroliagis, Christos On the efficient generation of prime-order elliptic curves. (English) Zbl 1195.94063 J. Cryptology 23, No. 3, 477-503 (2010). MSC: 94A60 11T71 14H52 PDF BibTeX XML Cite \textit{E. Konstantinou} et al., J. Cryptology 23, No. 3, 477--503 (2010; Zbl 1195.94063) Full Text: DOI
Hazay, Carmit; Lindell, Yehuda Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. (English) Zbl 1195.94058 J. Cryptology 23, No. 3, 422-456 (2010). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{C. Hazay} and \textit{Y. Lindell}, J. Cryptology 23, No. 3, 422--456 (2010; Zbl 1195.94058) Full Text: DOI