Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 31 results in range #1 to #31.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Efficient Pseudorandom Generators Based on the DDH Assumption: Label: en
  2. Fast Batch Verification of Multiple Signatures: Label: en
  3. A Survey of Single-Database Private Information Retrieval: Techniques and Applications: Label: en
  4. Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol: Label: en
  5. Identity-Based Traitor Tracing: Label: en
  6. Verifiable Shuffle of Large Size Ciphertexts: Label: en
  7. Practical and Secure Solutions for Integer Comparison: Label: en
  8. Parallel Key-Insulated Public Key Encryption Without Random Oracles: Label: en
  9. Multi-bit Cryptosystems Based on Lattice Problems: Label: en
  10. Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman: Label: en
  11. ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography: Label: en
  12. High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems: Label: en
  13. Cryptanalysis of HFE with Internal Perturbation: Label: en
  14. Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles: Label: en
  15. Improved On-Line/Off-Line Threshold Signatures: Label: en
  16. Efficient Ring Signatures Without Random Oracles: Label: en
  17. Traceable Ring Signature: Label: en
  18. Knowledge-Binding Commitments with Applications in Time-Stamping: Label: en
  19. Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures: Label: en
  20. Optimistic Fair Exchange in a Multi-user Setting: Label: en
  21. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol: Label: en
  22. New Chosen-Ciphertext Attacks on NTRU: Label: en
  23. Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003: Label: en
  24. Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions: Label: en
  25. Anonymous Signatures Made Easy: Label: en
  26. On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures: Label: en
  27. Full-Domain Subgroup Hiding and Constant-Size Group Signatures: Label: en
  28. A Direct Anonymous Attestation Scheme for Embedded Devices: Label: en
  29. A Closer Look at PKI: Security and Efficiency: Label: en
  30. Self-Generated-Certificate Public Key Encryption Without Pairing: Label: en
  31. Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)