Pages that link to "Item:Q5458581"
From MaRDI portal
The following pages link to Advances in Cryptology – EUROCRYPT 2008 (Q5458581):
Displayed 31 items.
- A Practical Attack on KeeLoq (Q5458582) (← links)
- Key Recovery on Hidden Monomial Multivariate Schemes (Q5458583) (← links)
- Predicting Lattice Reduction (Q5458584) (← links)
- Efficient Sequential Aggregate Signed Data (Q5458585) (← links)
- Proving Tight Security for Rabin-Williams Signatures (Q5458586) (← links)
- Threshold RSA for Dynamic and Ad-Hoc Groups (Q5458587) (← links)
- Towards Key-Dependent Message Security in the Standard Model (Q5458588) (← links)
- The Twin Diffie-Hellman Problem and Applications (Q5458589) (← links)
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products (Q5458590) (← links)
- Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves (Q5458591) (← links)
- On the Indifferentiability of the Sponge Construction (Q5458592) (← links)
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs (Q5458593) (← links)
- Security/Efficiency Tradeoffs for Permutation-Based Hashing (Q5458594) (← links)
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 (Q5458595) (← links)
- Collisions for the LPS Expander Graph Hash Function (Q5458596) (← links)
- Second Preimage Attacks on Dithered Hash Functions (Q5458597) (← links)
- Efficient Two Party and Multi Party Computation Against Covert Adversaries (Q5458598) (← links)
- Almost-Everywhere Secure Computation (Q5458599) (← links)
- Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme (Q5458600) (← links)
- Protocols and Lower Bounds for Failure Localization in the Internet (Q5458601) (← links)
- : Increasing the Security and Efficiency of (Q5458602) (← links)
- Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle (Q5458603) (← links)
- Precise Concurrent Zero Knowledge (Q5458604) (← links)
- Efficient Non-interactive Proof Systems for Bilinear Groups (Q5458605) (← links)
- Zero-Knowledge Sets with Short Proofs (Q5458606) (← links)
- Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves (Q5458608) (← links)
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors (Q5458609) (← links)
- Obfuscating Point Functions with Multibit Output (Q5458610) (← links)
- Isolated Proofs of Knowledge and Isolated Zero Knowledge (Q5458611) (← links)
- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware (Q5458612) (← links)
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware (Q5458613) (← links)