Pages that link to "Item:Q2794489"
From MaRDI portal
The following pages link to Applied Cryptography and Network Security (Q2794489):
Displaying 50 items.
- Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing (Q2822697) (← links)
- Parallel Implementation of BDD Enumeration for LWE (Q2822698) (← links)
- From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting (Q2873640) (← links)
- Private Database Queries Using Somewhat Homomorphic Encryption (Q2873641) (← links)
- BLAKE2: Simpler, Smaller, Fast as MD5 (Q2873644) (← links)
- Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (Q2873645) (← links)
- Generic Attacks for the Xor of k Random Permutations (Q2873646) (← links)
- Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist (Q2873647) (← links)
- Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles (Q2873648) (← links)
- Sequential Aggregate Signatures Made Shorter (Q2873649) (← links)
- How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE (Q2873651) (← links)
- Toward Practical Group Encryption (Q2873652) (← links)
- Public Key Exchange Using Semidirect Product of (Semi)Groups (Q2873653) (← links)
- Leakage Resilient IBE and IPE under the DLIN Assumption (Q2873654) (← links)
- Batch Proofs of Partial Knowledge (Q2873655) (← links)
- Efficient Signatures of Knowledge and DAA in the Standard Model (Q2873656) (← links)
- Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes (Q2873657) (← links)
- Primeless Factoring-Based Cryptography (Q2873658) (← links)
- Security Analysis of a Multi-factor Authenticated Key Exchange Protocol (Q2907513) (← links)
- RIKE: Using Revocable Identities to Support Key Escrow in PKIs (Q2907514) (← links)
- Authenticated Encryption: How Reordering Can Impact Performance (Q2907516) (← links)
- Length-Doubling Ciphers and Tweakable Ciphers (Q2907517) (← links)
- Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers (Q2907518) (← links)
- Identity-Based Extractable Hash Proofs and Their Applications (Q2907519) (← links)
- Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security (Q3011304) (← links)
- Private Discovery of Common Social Contacts (Q3011305) (← links)
- Generic Fully Simulatable Adaptive Oblivious Transfer (Q3011306) (← links)
- Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary (Q3011307) (← links)
- LBlock: A Lightweight Block Cipher (Q3011308) (← links)
- On Hiding a Plaintext Length by Preencryption (Q3011309) (← links)
- Fighting Pirates 2.0 (Q3011310) (← links)
- Security Notions for Broadcast Encryption (Q3011311) (← links)
- Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks (Q3011312) (← links)
- Linear Analysis of Reduced-Round CubeHash (Q3011313) (← links)
- On the Indifferentiability of Fugue and Luffa (Q3011314) (← links)
- Analysis of Message Injection in Stream Cipher-Based Hash Functions (Q3011315) (← links)
- Secure Authenticated Comparisons (Q3011317) (← links)
- Public-Key Encryption with Delegated Search (Q3011319) (← links)
- Generic Constructions of Stateful Public Key Encryption and Their Applications (Q3506403) (← links)
- Traceable and Retrievable Identity-Based Encryption (Q3506404) (← links)
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures (Q3506405) (← links)
- Attacking Reduced Round SHA-256 (Q3506406) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? (Q3506408) (← links)
- Generic Security-Amplifying Methods of Ordinary Digital Signatures (Q3506409) (← links)
- New Differential-Algebraic Attacks and Reparametrization of Rainbow (Q3506411) (← links)
- Trapdoor Sanitizable Signatures and Their Application to Content Protection (Q3506413) (← links)
- A Very Compact “Perfectly Masked” S-Box for AES (Q3506414) (← links)
- Traceable Privacy of Recent Provably-Secure RFID Protocols (Q3506416) (← links)
- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption (Q3575032) (← links)