Pages that link to "Item:Q5404742"
From MaRDI portal
The following pages link to Topics in Cryptology – CT-RSA 2014 (Q5404742):
Displayed 25 items.
- Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves (Q5404743) (← links)
- An Improved Compression Technique for Signatures Based on Learning with Errors (Q5404744) (← links)
- A Generic View on Trace-and-Revoke Broadcast Encryption Schemes (Q5404745) (← links)
- Broadcast Steganography (Q5404746) (← links)
- Practical Dual-Receiver Encryption (Q5404747) (← links)
- Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation (Q5404748) (← links)
- On Increasing the Throughput of Stream Ciphers (Q5404749) (← links)
- On Double Exponentiation for Securing RSA against Fault Analysis (Q5404750) (← links)
- On the Practical Security of a Leakage Resilient Masking Scheme (Q5404751) (← links)
- The Myth of Generic DPA…and the Magic of Learning (Q5404752) (← links)
- Hardware Implementation and Side-Channel Analysis of Lapin (Q5404753) (← links)
- Automatic Search for Differential Trails in ARX Ciphers (Q5404754) (← links)
- CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions (Q5404755) (← links)
- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation (Q5404756) (← links)
- Group Signatures with Message-Dependent Opening in the Standard Model (Q5404757) (← links)
- Practical Distributed Signatures in the Standard Model (Q5404758) (← links)
- Decentralized Traceable Attribute-Based Signatures (Q5404759) (← links)
- Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions (Q5404761) (← links)
- P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures (Q5404762) (← links)
- 2-Pass Key Exchange Protocols from CPA-Secure KEM (Q5404763) (← links)
- Analysis of BLAKE2 (Q5404764) (← links)
- An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl (Q5404765) (← links)
- Practical Collision Attack on 40-Step RIPEMD-128 (Q5404766) (← links)
- KDM Security in the Hybrid Framework (Q5404767) (← links)
- Key Wrapping with a Fixed Permutation (Q5404768) (← links)