On some connections between statistics and cryptology (Q2437860): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: PrivateLR / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.jspi.2013.05.008 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2085166198 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential cryptanalysis of DES-like cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Spectral domain analysis of correlation immune and resilient Boolean functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4039943 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differential privacy and robust statistics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: An overview of distinguishing attacks on stream ciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434866 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4398780 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A universal statistical test for random bit generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Statistical Analysis of Second Order Differential Power Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias / rank
 
Normal rank
Property / cites work
 
Property / cites work: A spectral characterization of correlation-immune combining functions / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 10:54, 7 July 2024

scientific article
Language Label Description Also known as
English
On some connections between statistics and cryptology
scientific article

    Statements

    On some connections between statistics and cryptology (English)
    0 references
    0 references
    13 March 2014
    0 references
    cryptology
    0 references
    statistics
    0 references
    cryptanalysis
    0 references
    randomised response
    0 references
    differential privacy
    0 references
    public key encryption
    0 references
    linear cryptanalysis
    0 references
    differential cryptanalysis
    0 references
    side channel attacks
    0 references

    Identifiers