O Algoritmo usado no programa de criptografia PASME
Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)
Oblivious RAM Simulation with Efficient Worst-Case Access Overhead
Oblivious Storage with Low I/O Overhead
Oblivious Transfer based on Key Exchange
Oblivious Transfer using Elliptic Curves
Oblivious-Transfer Amplification
Octopus: A Secure and Anonymous DHT Lookup
On $2k$-Variable Symmetric Boolean Functions with Maximum Algebraic Immunity $k$
On an authentication scheme based on the Root Problem in the braid group
On Bounding Problems of Quantitative Information Flow
On Communication Protocols that Compute Almost Privately
On Compression of Cryptographic Keys
On Concurrent and Resettable Zero-Knowledge Proofs for NP
On formal verification of arithmetic-based cryptographic primitives
On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
On improving security of GPT cryptosystems
On non-abelian homomorphic public-key cryptosystems
On Optimal Secure Message Transmission by Public Discussion
On Sampling, Anonymization, and Differential Privacy: Or, k-Anonymization Meets Differential Privacy