The following pages link to New directions in cryptography (Q3875826):
Displaying 50 items.
- Lossy trapdoor functions from homomorphic reproducible encryption (Q456129) (← links)
- Synchronization of chaotic systems using feedback controller: an application to Diffie-Hellman key exchange protocol and elgamal public key cryptosystem (Q467057) (← links)
- Sequential aggregate signatures with lazy verification from trapdoor permutations (Q476200) (← links)
- A general construction for monoid-based knapsack protocols (Q476358) (← links)
- Using quantum key distribution for cryptographic purposes: a survey (Q477173) (← links)
- Timed encryption with application to deniable key exchange (Q477191) (← links)
- Novel multiparty quantum key agreement protocol with GHZ states (Q485357) (← links)
- Protocols of quantum key agreement solely using Bell states and Bell measurement (Q488182) (← links)
- Semi-automated verification of security proofs of quantum cryptographic protocols (Q491263) (← links)
- Modeling energy-efficient secure communications in multi-mode wireless mobile devices (Q494039) (← links)
- Provably secure three party encrypted key exchange scheme with explicit authentication (Q497145) (← links)
- A rational framework for secure communication (Q497644) (← links)
- Linear decomposition method in analyzing hidden information protocols on algebraic platforms (Q498303) (← links)
- Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques (Q503609) (← links)
- Undeniable signature scheme based over group ring (Q505668) (← links)
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols (Q507654) (← links)
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions (Q508905) (← links)
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (Q511946) (← links)
- Permutation polynomials and a new public-key encryption (Q516791) (← links)
- A quantum multi-proxy weak blind signature scheme based on entanglement swapping (Q517602) (← links)
- Automated proofs for asymmetric encryption (Q540682) (← links)
- Self-generated-certificate public key encryption without pairing and its application (Q545362) (← links)
- Practical electronic auction scheme with strong anonymity and bidding privacy (Q545374) (← links)
- Hierarchical management scheme by local fields (Q546281) (← links)
- Quantum computing without entanglement (Q596121) (← links)
- An identity-based encryption scheme with compact ciphertexts (Q615206) (← links)
- Efficient proxy signcryption scheme with provable CCA and CMA security (Q623106) (← links)
- Star reduction among minimal length addition chains (Q644852) (← links)
- Fault-based attack on Montgomery's ladder algorithm (Q656523) (← links)
- The square root Diffie-Hellman problem (Q663482) (← links)
- Security risk during the transient in a key exchange protocol using random signals and feedback (Q665300) (← links)
- Enhancing data security in ad hoc networks based on multipath routing (Q666058) (← links)
- Two-party quantum key agreement over a collective noisy channel (Q669976) (← links)
- New quantum key agreement protocols based on cluster states (Q669982) (← links)
- An attack on the Needham-Schroeder public-key authentication protocol (Q672251) (← links)
- On the security of the Lucas function (Q673987) (← links)
- On Schnorr's preprocessing for digital signature schemes (Q676822) (← links)
- Backtracking-assisted multiplication (Q680916) (← links)
- The \(l\)-th power Diffie-Hellman problem and the \(l\)-th root Diffie-Hellman problem (Q683912) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- The generalization of public key cryptosystem FAPKC4 (Q701620) (← links)
- Anonymous message communications with user hierarchy in a multicast system (Q702584) (← links)
- Multi-party authenticated key agreement protocols from multi-linear forms (Q702645) (← links)
- Authenticated key agreement in dynamic peer groups (Q703558) (← links)
- On the linear complexity of the Naor-Reingold sequence with elliptic curves (Q708437) (← links)
- Chaotic map based key agreement with/out clock synchronization (Q712006) (← links)
- Provably convertible multi-authenticated encryption scheme for generalized group communications (Q712686) (← links)
- Provably secure and efficient identification and key agreement protocol with user anonymity (Q716313) (← links)
- Novel multi-party quantum key agreement protocol with G-like states and Bell states (Q726056) (← links)
- Symmetric threshold multipath (STM): an online symmetric key management scheme (Q726168) (← links)