Pages that link to "Item:Q4910220"
From MaRDI portal
The following pages link to Topics in Cryptology – CT-RSA 2013 (Q4910220):
Displayed 25 items.
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations (Q4910221) (← links)
- Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL (Q4910223) (← links)
- Fair Exchange of Short Signatures without Trusted Third Party (Q4910224) (← links)
- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures (Q4910225) (← links)
- A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption (Q4910226) (← links)
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks (Q4910227) (← links)
- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes (Q4910228) (← links)
- Randomized Partial Checking Revisited (Q4910229) (← links)
- Randomly Failed! The State of Randomness in Current Java Implementations (Q4910232) (← links)
- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl (Q4910237) (← links)
- Collisions for the WIDEA-8 Compression Function (Q4910238) (← links)
- Finding Collisions for Round-Reduced SM3 (Q4910239) (← links)
- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures (Q4910240) (← links)
- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag (Q4910241) (← links)
- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness (Q4910242) (← links)
- Cryptanalytic Attacks on MIFARE Classic Protocol (Q4910243) (← links)
- Asynchronous Computational VSS with Reduced Communication Complexity (Q4910244) (← links)
- Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 (Q4910245) (← links)
- Solving BDD by Enumeration: An Update (Q4910246) (← links)
- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions (Q4910247) (← links)
- Accountable Authority Identity-Based Encryption with Public Traceability (Q4910248) (← links)
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption (Q4910249) (← links)
- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users (Q4910250) (← links)
- A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy (Q4910252) (← links)
- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis (Q4910253) (← links)