Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 35 results in range #1 to #35.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups: Miscellaneous (e.g. aliases, entity existence)
  2. Sieving Using Bucket Sort: Miscellaneous (e.g. aliases, entity existence)
  3. On the Generalized Linear Equivalence of Functions Over Finite Fields: Miscellaneous (e.g. aliases, entity existence)
  4. Stream Ciphers: Dead or Alive?: Miscellaneous (e.g. aliases, entity existence)
  5. OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding: Miscellaneous (e.g. aliases, entity existence)
  6. Towards Plaintext-Aware Public-Key Encryption Without Random Oracles: Miscellaneous (e.g. aliases, entity existence)
  7. Improved Setup Assumptions for 3-Round Resettable Zero Knowledge: Miscellaneous (e.g. aliases, entity existence)
  8. Strong Conditional Oblivious Transfer and Computing on Intervals: Miscellaneous (e.g. aliases, entity existence)
  9. On Provably Secure Time-Stamping Schemes: Miscellaneous (e.g. aliases, entity existence)
  10. Cryptanalysis of Bluetooth Keystream Generator Two-Level E0: Miscellaneous (e.g. aliases, entity existence)
  11. Time-Memory Trade-Off Attacks on Multiplications and T-Functions: Miscellaneous (e.g. aliases, entity existence)
  12. The Davies-Murphy Power Attack: Miscellaneous (e.g. aliases, entity existence)
  13. How Far Can We Go Beyond Linear Cryptanalysis?: Miscellaneous (e.g. aliases, entity existence)
  14. Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes: Miscellaneous (e.g. aliases, entity existence)
  15. Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice: Miscellaneous (e.g. aliases, entity existence)
  16. On the Security of MOR Public Key Cryptosystem: Miscellaneous (e.g. aliases, entity existence)
  17. Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings: Miscellaneous (e.g. aliases, entity existence)
  18. Generic Homomorphic Undeniable Signatures: Miscellaneous (e.g. aliases, entity existence)
  19. Comparison Between XL and Gröbner Basis Algorithms: Miscellaneous (e.g. aliases, entity existence)
  20. The XL-Algorithm and a Conjecture from Commutative Algebra: Miscellaneous (e.g. aliases, entity existence)
  21. k-Times Anonymous Authentication (Extended Abstract): Miscellaneous (e.g. aliases, entity existence)
  22. Secret Handshakes from CA-Oblivious Encryption: Miscellaneous (e.g. aliases, entity existence)
  23. Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices: Miscellaneous (e.g. aliases, entity existence)
  24. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC: Miscellaneous (e.g. aliases, entity existence)
  25. A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates: Miscellaneous (e.g. aliases, entity existence)
  26. Constant-Round Authenticated Group Key Exchange for Dynamic Groups: Miscellaneous (e.g. aliases, entity existence)
  27. New Approaches to Password Authenticated Key Exchange Based on RSA: Miscellaneous (e.g. aliases, entity existence)
  28. The MD2 Hash Function Is Not One-Way: Miscellaneous (e.g. aliases, entity existence)
  29. Higher Order Universal One-Way Hash Functions: Miscellaneous (e.g. aliases, entity existence)
  30. Masking Based Domain Extenders for UOWHFs: Bounds and Constructions: Miscellaneous (e.g. aliases, entity existence)
  31. Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes: Miscellaneous (e.g. aliases, entity existence)
  32. Asynchronous Proactive Cryptosystems Without Agreement: Miscellaneous (e.g. aliases, entity existence)
  33. Privacy in Non-private Environments: Miscellaneous (e.g. aliases, entity existence)
  34. Practical Two-Party Computation Based on the Conditional Gate: Miscellaneous (e.g. aliases, entity existence)
  35. On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds: Miscellaneous (e.g. aliases, entity existence)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)