Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 36 results in range #151 to #186.

View ( | next 50) (20 | 50 | 100 | 250 | 500)

  1. On the Stability of m-Sequences: Label: en
  2. Generalised Complementary Arrays: Label: en
  3. Ensuring Message Embedding in Wet Paper Steganography: Label: en
  4. A Note on the Dual Codes of Module Skew Codes: Label: en
  5. On Constructing Homomorphic Encryption Schemes from Coding Theory: Label: en
  6. Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity: Label: en
  7. Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting: Label: en
  8. Improved Key Generation for Gentry’s Fully Homomorphic Encryption Scheme: Label: en
  9. Can a Program Reverse-Engineer Itself?: Label: en
  10. Enhanced Count of Balanced Symmetric Functions and Balanced Alternating Functions: Label: en
  11. The Symbiosis between Collision and Preimage Resistance: Label: en
  12. Self-correctors for Cryptographic Modules: Label: en
  13. Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction: Label: en
  14. A Secure and Efficient Proof of Integer in an Interval Range: Label: en
  15. On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2 i  + 1, 2 j  + 1}: Label: en
  16. Binary Kloosterman Sums with Value 4: Label: en
  17. Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings: Label: en
  18. Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption: Label: en
  19. Sub-linear Blind Ring Signatures without Random Oracles: Label: en
  20. Estimating Key Sizes for High Dimensional Lattice-Based Systems: Label: en
  21. Secure Key Management in the Cloud: Label: en
  22. Security Amplification against Meet-in-the-Middle Attacks Using Whitening: Label: en
  23. Indifferentiability of Double Length Compression Functions: Label: en
  24. Hashing Mode Using a Lightweight Blockcipher: Label: en
  25. High-order Masking by Using Coding Theory and Its Application to AES: Label: en
  26. A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme: Label: en
  27. Recovering Private Keys Generated with Weak PRNGs: Label: en
  28. Differential Cryptanalysis of Keccak Variants: Label: en
  29. Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis: Label: en
  30. A Code-Based Undeniable Signature Scheme: Label: en
  31. On Minimal and Quasi-minimal Linear Codes: Label: en
  32. On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption: Label: en
  33. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme: Label: en
  34. On the Homomorphic Computation of Symmetric Cryptographic Primitives: Label: en
  35. Efficient Generation of Elementary Sequences: Label: en
  36. Semi-bent Functions from Oval Polynomials: Label: en

View ( | next 50) (20 | 50 | 100 | 250 | 500)