Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #51 to #100.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. On the (Non-)Equivalence of UC Security Notions: Label: en
  2. Deterministic Random Oracles: Label: en
  3. Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices: Label: en
  4. Combined Public-Key Schemes: The Case of ABE and ABS: Label: en
  5. ID Based Signcryption Scheme in Standard Model: Label: en
  6. Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature: Label: en
  7. One-Move Convertible Nominative Signature in the Standard Model: Label: en
  8. Tools over Bilinear Groups for Modular Design of Cryptographic Tasks: Label: en
  9. Fully Secure Threshold Unsigncryption: Label: en
  10. Identity Based Public Verifiable Signcryption Scheme: Label: en
  11. Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption: Label: en
  12. Efficient Broadcast Encryption with Personalized Messages: Label: en
  13. A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication: Label: en
  14. Cryptographic Protocols from Lattices: Label: en
  15. An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation: Label: en
  16. A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract): Label: en
  17. Distinguishing Distributions Using Chernoff Information: Label: en
  18. Formal and Precise Analysis of Soundness of Several Shuffling Schemes: Label: en
  19. Interpreting Hash Function Security Proofs: Label: en
  20. Collision Resistant Double-Length Hashing: Label: en
  21. Efficient Confirmer Signatures from the “Signature of a Commitment” Paradigm: Label: en
  22. A Framework for Constructing Convertible Undeniable Signatures: Label: en
  23. Automating Computational Proofs for Public-Key-Based Key Exchange: Label: en
  24. A Calculus for Game-Based Security Proofs: Label: en
  25. Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks: Label: en
  26. Improved Zero-Knowledge Identification with Lattices: Label: en
  27. Self-enforcing Private Inference Control: Label: en
  28. GUC-Secure Set-Intersection Computation: Label: en
  29. Oracle Separation in the Non-uniform Model: Label: en
  30. Server-Controlled Identity-Based Authenticated Key Exchange: Label: en
  31. Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge: Label: en
  32. Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols: Label: en
  33. Password Authenticated Key Exchange Based on RSA in the Three-Party Settings: Label: en
  34. An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles: Label: en
  35. Anonymous Signatures Revisited: Label: en
  36. Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?: Label: en
  37. On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions: Label: en
  38. Twin Signature Schemes, Revisited: Label: en
  39. How to Prove Security of a Signature with a Tighter Security Reduction: Label: en
  40. Identity-Based Verifiably Encrypted Signatures without Random Oracles: Label: en
  41. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme: Label: en
  42. Anonymous Conditional Proxy Re-encryption without Random Oracle: Label: en
  43. Chosen-Ciphertext Secure RSA-Type Cryptosystems: Label: en
  44. Spatial Encryption under Simpler Assumption: Label: en
  45. Efficient Non-interactive Universally Composable String-Commitment Schemes: Label: en
  46. Decryptable Searchable Encryption: Label: en
  47. Formal Security Treatments for Signatures from Identity-Based Encryption: Label: en
  48. Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature: Label: en
  49. Practical Threshold Signatures Without Random Oracles: Label: en
  50. On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers: Label: en

View ( | ) (20 | 50 | 100 | 250 | 500)