Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 25 results in range #1 to #25.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis: Label: en
  2. A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy: Label: en
  3. The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users: Label: en
  4. Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption: Label: en
  5. Accountable Authority Identity-Based Encryption with Public Traceability: Label: en
  6. The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions: Label: en
  7. Solving BDD by Enumeration: An Update: Label: en
  8. Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012: Label: en
  9. Asynchronous Computational VSS with Reduced Communication Complexity: Label: en
  10. Cryptanalytic Attacks on MIFARE Classic Protocol: Label: en
  11. Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness: Label: en
  12. Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag: Label: en
  13. Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures: Label: en
  14. Finding Collisions for Round-Reduced SM3: Label: en
  15. Collisions for the WIDEA-8 Compression Function: Label: en
  16. Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl: Label: en
  17. Randomly Failed! The State of Randomness in Current Java Implementations: Label: en
  18. Randomized Partial Checking Revisited: Label: en
  19. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes: Label: en
  20. Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks: Label: en
  21. A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption: Label: en
  22. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures: Label: en
  23. Fair Exchange of Short Signatures without Trusted Third Party: Label: en
  24. Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL: Label: en
  25. Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)