Search results

From MaRDI portal
  • Authenticated Encryption and Its Hardware Implementation 2017-05-16 Paper INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes 2016-04-08...
    10 bytes (13 words) - 08:14, 24 September 2023
  • \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security 2022-07-13 Paper \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public...
    10 bytes (13 words) - 01:01, 7 October 2023
  • Public-key anamorphism in (CCA-secure) public-key encryption and beyond 2024-12-04 Paper Sender-anamorphic encryption reformulated: achieving robust and generic...
    10 bytes (15 words) - 09:21, 8 December 2023
  • Paper An image encryption algorithm based on new chaos and diffusion values of a truth table 2024-01-10 Paper A privacy image encryption algorithm based...
    10 bytes (13 words) - 21:13, 10 December 2023
  • provably-secure certificate-based encryption against malicious CA attacks 2020-09-09 Paper New Certificateless Public Key Encryption Secure Against Malicious KGC...
    10 bytes (13 words) - 04:37, 7 October 2023
  • for public key encryption 2016-03-02 Paper Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption 2016-03-02 Paper...
    10 bytes (15 words) - 01:34, 25 September 2023
  • and agreement 2023-11-02 Paper Oblivious parallel tight compaction 2023-11-02 Paper Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions...
    10 bytes (13 words) - 16:47, 24 September 2023
  • 2016-10-28 Paper Offline witness encryption 2016-10-04 Paper On the complexity of \textsf{scrypt} and proofs of space in the parallel random oracle model 2016-07-15...
    10 bytes (14 words) - 03:07, 7 October 2023
  • 2022-05-18 Paper Non-malleable codes for bounded parallel-time tampering 2022-04-22 Paper Secure massively parallel computation for dishonest majority 2022-03-23...
    10 bytes (13 words) - 08:55, 6 October 2023
  • Paper (Leveled) fully homomorphic encryption without bootstrapping 2016-10-07 Paper Multi-input Functional Encryption in the Private-Key Setting: Stronger...
    10 bytes (13 words) - 03:01, 7 October 2023
  • notion for decentralized multi-client functional encryption 2023-11-10 Paper Multi-client functional encryption with fine-grained access control 2023-08-25...
    10 bytes (15 words) - 16:04, 11 December 2023
  • 2016-04-25 Paper Cryptography for parallel RAM from indistinguishability obfuscation 2016-04-15 Paper Oblivious parallel RAM and applications 2016-04-08...
    10 bytes (15 words) - 16:47, 24 September 2023
  • 2007-11-29 Paper Identity Based Encryption Without Redundancy 2007-09-24 Paper Parallel Key-Insulated Public Key Encryption Without Random Oracles 2007-09-04...
    10 bytes (13 words) - 18:27, 6 October 2023
  • 2024-11-12 Paper Multi-hop fine-grained proxy re-encryption 2024-11-12 Paper Fine-grained proxy re-encryption: definitions and constructions from LWE 2024-09-13...
    10 bytes (13 words) - 09:24, 6 October 2023
  • 2009-03-10 Paper Timed-Release Encryption Revisited 2009-01-27 Paper General Certificateless Encryption and Timed-Release Encryption 2008-11-20 Paper Proxy Re-signatures...
    10 bytes (17 words) - 18:03, 24 September 2023
  • 2010-12-07 Paper Parallel and concurrent security of the HB and \(HB^{+}\) protocols 2010-09-21 Paper Lower bounds on the efficiency of encryption and digital...
    10 bytes (16 words) - 16:09, 11 December 2023
  • Efficient attribute-based proxy re-encryption with constant size ciphertexts 2022-07-06 Paper Efficiently obfuscating re-encryption program under DDH assumption...
    10 bytes (17 words) - 19:52, 24 September 2023
  • searchable symmetric encryption 2014-05-27 Paper Bounded-collusion identity-based encryption from semantically-secure public-key encryption: generic constructions...
    10 bytes (13 words) - 17:20, 6 October 2023
  • Paper Three-level quantum image encryption based on Arnold transform and logistic map 2023-02-16 Paper Quantum image encryption algorithm based on bit-plane...
    10 bytes (13 words) - 02:07, 25 September 2023
  • for public key encryption 2016-03-02 Paper Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption 2016-03-02 Paper...
    10 bytes (13 words) - 05:01, 7 October 2023