|
|
(2 intermediate revisions by 2 users not shown) |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/s11432-007-0037-2 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W2145819439 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Survey of information security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of SP Networks with Partial Non-Linear Layers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: PRESENT: An Ultra-Lightweight Block Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: LBlock: A Lightweight Block Cipher / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Block Ciphers – Focus on the Linear Layer (feat. PRIDE) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Simplified Representation of AES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptography with Streaming Algorithms / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A survey on fast correlation attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An overview of distinguishing attacks on stream ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: High order differential attacks on stream ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Applying cube attacks to stream ciphers in realistic scenarios / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Further Results on the Decomposition of an NFSR Into the Cascade Connection of an NFSR Into an LFSR / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Further results on the distinctness of modulo 2 reductions of primitive sequences over \(\mathbb{Z}/(2^{32}-1)\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Collision Search Attacks on SHA-0 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Finding Collisions in the Full SHA-1 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of the Hash Functions MD4 and RIPEMD / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Break MD5 and Other Hash Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Updates on Generic Attacks against HMAC and NMAC / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of HMAC/NMAC-Whirlpool / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Generic Attacks against Hash-Based MACs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Generic Related-Key Attacks for HMAC / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Homomorphic MACs for Arithmetic Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: ALE: AES-Based Lightweight Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Robust Authenticated-Encryption AEZ and the Problem That It Solves / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: KDM-CCA Security from RKA Secure Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Securely Release Unverified Plaintext in Authenticated Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of FIDES / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Identity-Based Encryption from the Weil Pairing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Hierarchical Identity Based Encryption with Constant Size Ciphertext / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Identity-Based Encryption over NTRU Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: (Hierarchical) Identity-Based Encryption from Affine Message Authentication / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Low Overhead Broadcast Encryption from Multilinear Maps / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fuzzy Identity-Based Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Improved Dual System ABE in Prime-Order Groups via Predicate Encodings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Witness encryption and its applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Witness Encryption from Instance Independent Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption: Origins and Recent Developments / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Semantic Security of Functional Encryption Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Optimal Non-perfect Uniform Secret Sharing Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Function Secret Sharing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The knowledge complexity of interactive proof-systems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3789104 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Concurrent knowledge extraction in public-key models / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Constant-Round Concurrent Zero Knowledge in the Bounded Player Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Quasi-Adaptive NIZK for Linear Subspaces Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Bitcoin Backbone Protocol: Analysis and Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Round-Efficient Black-Box Construction of Composable Multi-Party Computation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure Multi-Party Computation with Identifiable Abort / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Non-Interactive Secure Multiparty Computation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Side channel cryptanalysis of product ciphers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Chinese remaindering based cryptosystems in the presence of faults / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941869 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4797801 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Side-Channel Analysis of Multiplications in GF(2128) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Behind the Scene of Side Channel Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Noisy Leakage Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simulatable Leakage: Analysis, Pitfalls, and New Constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Tolerant Computation with Input-Independent Preprocessing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4413867 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of the Xiao – Lai White-Box AES Implementation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Symmetric-key cryptosystem with DNA technology / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Asymmetric encryption and signature method with DNA technology / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Quantum cryptography using any two nonorthogonal states / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the (im)possibility of obfuscating programs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Signatures from Standard Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$ / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Bonsai trees, or how to delegate a lattice basis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical aspects of measurement-device-independent quantum key distribution / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully homomorphic encryption using ideal lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice Signatures without Trapdoors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice Signatures and Bimodal Gaussians / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Authenticated Key Exchange from Ideal Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: SWIFFT: A Modest Proposal for FFT Hashing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: (Leveled) Fully Homomorphic Encryption without Bootstrapping / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Bootstrapping in Quasilinear Time / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Faster Bootstrapping with Polynomial Error / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to use indistinguishability obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2721147 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Differential Privacy / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Full text retrieval based on syntactic similarities / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Information-theoretic analysis of information hiding / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Implementation of real-time constrained linear discriminant analysis to remote sensing image classification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4794246 / rank |
| | Normal rank |