Search results

From MaRDI portal
  • separations among injective one-way functions 2011-05-19 Paper Parallel decryption queries in bounded chosen ciphertext attacks 2011-03-15 Paper On-line...
    10 bytes (13 words) - 04:16, 11 April 2026
  • separations among injective one-way functions 2011-05-19 Paper Parallel decryption queries in bounded chosen ciphertext attacks 2011-03-15 Paper Efficient...
    10 bytes (13 words) - 03:31, 11 April 2026
  • 2007-03-07 Paper https://portal.mardi4nfdi.de/entity/Q3416079 2007-01-19 Paper A parallel residue-to-binary conversion algorithm without trial division 2007-01-09...
    10 bytes (17 words) - 20:23, 10 April 2026
  • 2020-11-25 Paper Anonymous certificate-based broadcast encryption with constant decryption cost 2020-09-08 Paper The distribution of unobserved heterogeneity in...
    10 bytes (13 words) - 20:15, 10 April 2026
  • the Beasts -- the hard cases in LLL reduction 2018-10-24 Paper Efficient decryption algorithms for extension field cancellation type encryption schemes 2018-09-26...
    10 bytes (13 words) - 23:22, 24 September 2023
  • experimental study of a complex fluid-conveying pipeline system with series and parallel structures 2022-12-21 Paper https://portal.mardi4nfdi.de/entity/Q5047818...
    10 bytes (13 words) - 02:51, 11 April 2026
  • of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency 2016-05-02 Paper Attribute-based signatures for circuits from...
    10 bytes (15 words) - 20:00, 10 April 2026
  • with locally bounded mean curvature 2003-09-01 Paper Organization of parallel query processing in multiprocessor database machines with hierarchical architecture...
    10 bytes (12 words) - 20:28, 12 April 2026
  • Paper Towards multi-user searchable encryption supporting Boolean query and fast decryption 2018-11-07 Paper A secure cloud backup system with deduplication...
    10 bytes (12 words) - 23:39, 13 April 2026
  • https://doi.org/10.1007/978-3-540-76900-2_31 Recommendations Parallel decryption queries in bounded chosen ciphertext attacks Bit Encryption Is Complete...
    15 bytes (417 words) - 23:46, 4 February 2024
  • https://doi.org/10.1007/978-3-540-70936-7_24 Recommendations Parallel decryption queries in bounded chosen ciphertext attacks Cryptography and Coding A...
    15 bytes (396 words) - 04:32, 5 February 2024
  • cryptographic protocols On the security of a public-key cryptosystem Parallel decryption queries in bounded chosen ciphertext attacks This page was built for publication:...
    15 bytes (242 words) - 04:03, 7 March 2024
  • Networks On IND-CCA security modeling in cryptographic protocols Parallel decryption queries in bounded chosen ciphertext attacks Subtleties in security definitions...
    15 bytes (527 words) - 19:36, 1 February 2024
  • 1007/978-3-642-29011-4_39 Recommendations Advances in Cryptology - CRYPTO 2003 Parallel decryption queries in bounded chosen ciphertext attacks Combiners for chosen-ciphertext...
    15 bytes (216 words) - 20:33, 3 February 2024
  • evaluation against side-channel cube attack with key enumeration Parallel decryption queries in bounded chosen ciphertext attacks Fast and memory-efficient...
    15 bytes (371 words) - 18:09, 3 February 2024
  • counting and enumerating keys post side-channel attacks revisited Parallel decryption queries in bounded chosen ciphertext attacks A tight bound for exhaustive...
    15 bytes (464 words) - 21:20, 3 February 2024
  • homomorphic encryption Fully secure threshold unsigncryption Parallel decryption queries in bounded chosen ciphertext attacks Proxy-invisible CCA-secure...
    15 bytes (785 words) - 03:46, 9 February 2024
  • Hierocrypt-L1 Practical cryptanalysis of \(k\)-ary \(C^\ast\) Parallel decryption queries in bounded chosen ciphertext attacks Higher order differentiation...
    15 bytes (264 words) - 23:18, 10 April 2026
  • d\) Hill in \(O(d 13^d)\) This page was built for publication: Parallel decryption queries in bounded chosen ciphertext attacks Report a bug (only for logged...
    15 bytes (226 words) - 22:48, 3 February 2024
  • Ciphertext verification security of symmetric encryption schemes Parallel decryption queries in bounded chosen ciphertext attacks Strong Adaptive Chosen-Ciphertext...
    15 bytes (177 words) - 20:23, 3 February 2024