The following pages link to Information Security and Privacy (Q2817456):
Displayed 50 items.
- Pseudonymous Signature on eIDAS Token – Implementation Based Privacy Threats (Q2817829) (← links)
- Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning (Q2817832) (← links)
- A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems (Q2817833) (← links)
- Optimal Bounds for Multi-Prime Φ-Hiding Assumption (Q2907355) (← links)
- Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange (Q2907356) (← links)
- A Game-Theoretic Perspective on Oblivious Transfer (Q2907359) (← links)
- Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length (Q2907361) (← links)
- Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion (Q2907362) (← links)
- Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo (Q2907363) (← links)
- Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia (Q2907364) (← links)
- Low Data Complexity Attack on Reduced Camellia-256 (Q2907365) (← links)
- Cryptanalysis of RSA with a Small Parameter (Q2907366) (← links)
- An Algebraic Broadcast Attack against NTRU (Q2907367) (← links)
- Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers (Q2907368) (← links)
- Weimar-DM: A Highly Secure Double-Length Compression Function (Q2907369) (← links)
- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model (Q2907370) (← links)
- Zero-Knowledge Protocols for the McEliece Encryption (Q2907371) (← links)
- Effort-Release Public-Key Encryption from Cryptographic Puzzles (Q2907372) (← links)
- Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs (Q2907373) (← links)
- How to Fix Two RSA-Based PVSS Schemes—Exploration and Solution (Q2907374) (← links)
- Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions (Q2907375) (← links)
- Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes (Q2907376) (← links)
- A Short Non-delegatable Strong Designated Verifier Signature (Q2907377) (← links)
- Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures (Q2907378) (← links)
- Fully Leakage-Resilient Signatures with Auxiliary Inputs (Q2907379) (← links)
- Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts (Q2907380) (← links)
- A Generic Construction of Accountable Decryption and Its Applications (Q2907382) (← links)
- Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts (Q2907383) (← links)
- Fully Private Revocable Predicate Encryption (Q2907384) (← links)
- Anonymous ID-Based Proxy Re-Encryption (Q2907385) (← links)
- On the Optimality of Lattices for the Coppersmith Technique (Q2907386) (← links)
- Revocable Identity-Based Encryption from Lattices (Q2907387) (← links)
- On Area, Time, and the Right Trade-Off (Q2907388) (← links)
- Analysis of Xorrotation with Application to an HC-128 Variant (Q2907389) (← links)
- Private Fingerprint Matching (Q2907391) (← links)
- Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking (Q2907393) (← links)
- ICAF: A Context-Aware Framework for Access Control (Q2907395) (← links)
- Non-malleable Instance-Dependent Commitment in the Standard Model (Q2907396) (← links)
- On Known and New Differentially Uniform Functions (Q3012972) (← links)
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256 (Q3012973) (← links)
- Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks (Q3012974) (← links)
- Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation (Q3012975) (← links)
- Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis (Q3012976) (← links)
- State Convergence in the Initialisation of Stream Ciphers (Q3012978) (← links)
- On Maximum Differential Probability of Generalized Feistel (Q3012980) (← links)
- Double SP-Functions: Enhanced Generalized Feistel Networks (Q3012981) (← links)
- Algebraic Techniques in Differential Cryptanalysis Revisited (Q3012982) (← links)
- Faster and Smoother – VSH Revisited (Q3012984) (← links)
- Cryptanalysis of the Compression Function of SIMD (Q3012985) (← links)
- Electronic Cash with Anonymous User Suspension (Q3012986) (← links)