Pages that link to "Item:Q244654"
From MaRDI portal
The following pages link to International Journal of Applied Cryptography (Q244654):
Displaying 24 items.
- Delegation-based conversion from CPA to CCA-secure predicate encryption (Q2019836) (← links)
- Dynamic MDS diffusion layers with efficient software implementation (Q2019838) (← links)
- Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level (Q2019841) (← links)
- A tapestry of identity-based encryption: practical frameworks compared (Q2379112) (← links)
- Homomorphic encryption and secure comparison (Q2379113) (← links)
- Practical key-recovery attack against APOP, an MD5-based challenge-response authentication (Q2379114) (← links)
- Delayed password disclosure (Q2379116) (← links)
- The power of identification schemes (Q2379117) (← links)
- An optimistic fair exchange protocol and its security in the universal composability framework (Q2379119) (← links)
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol (Q2430140) (← links)
- On message recognition protocols: recoverability and explicit confirmation (Q2430141) (← links)
- Theoretical and practical aspects of mutual information-based side channel analysis (Q2430142) (← links)
- Fair threshold decryption with semi-trusted third parties (Q2430144) (← links)
- On reusing ephemeral keys in Diffie-Hellman key agreement protocols (Q2430145) (← links)
- Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality (Q2430146) (← links)
- Achieving high security and efficiency in RFID-tagged supply chains (Q5962407) (← links)
- Designing attacks on SIP call set-up (Q5962408) (← links)
- Defending against the pirate evolution attack (Q5962409) (← links)
- Strongly unforgeable ID-based signatures without random oracles (Q5962410) (← links)
- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length (Q5962411) (← links)
- Some results on cryptanalysis of SMS4 block cipher (Q5962412) (← links)
- A reduction-based proof for authentication and session key security in three-party Kerberos (Q6096687) (← links)
- End-to-end verifiable cumulative voting without tallying authorities (Q6096689) (← links)
- Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem (Q6096692) (← links)