Search results

From MaRDI portal
  • \textsf{Light-OCB}: parallel lightweight authenticated cipher with full security 2022-07-13 Paper \(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public...
    10 bytes (13 words) - 23:53, 10 April 2026
  • notion for decentralized multi-client functional encryption 2023-11-10 Paper Multi-client functional encryption with fine-grained access control 2023-08-25...
    10 bytes (15 words) - 01:31, 11 April 2026
  • Efficient attribute-based proxy re-encryption with constant size ciphertexts 2022-07-06 Paper Efficiently obfuscating re-encryption program under DDH assumption...
    10 bytes (17 words) - 17:41, 10 April 2026
  • Identity-Based Threshold Key-Insulated Encryption without Random Oracles 2008-04-24 Paper Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security...
    10 bytes (13 words) - 04:39, 11 April 2026
  • provably-secure certificate-based encryption against malicious CA attacks 2020-09-09 Paper New Certificateless Public Key Encryption Secure Against Malicious KGC...
    10 bytes (13 words) - 23:18, 10 April 2026
  • 2007-11-29 Paper Identity Based Encryption Without Redundancy 2007-09-24 Paper Parallel Key-Insulated Public Key Encryption Without Random Oracles 2007-09-04...
    10 bytes (13 words) - 21:12, 10 April 2026
  • 2023-01-02 Paper New Practical Public-Key Deniable Encryption 2022-12-21 Paper Attribute based broadcast encryption with short ciphertext and decryption key 2022-08-19...
    10 bytes (13 words) - 21:03, 10 April 2026
  • lattice points 2005-11-07 Paper Euro-Par 2004 Parallel Processing 2005-08-23 Paper Image and video encryption. From digital rights management to secured personal...
    10 bytes (13 words) - 17:43, 10 April 2026
  • 2008-12-22 Paper Bounded CCA2-Secure Encryption 2008-05-15 Paper Relations Among Notions of Non-malleability for Encryption 2008-05-15 Paper Precise Concurrent...
    10 bytes (14 words) - 23:16, 10 April 2026
  • de/entity/Q6107254 2023-07-03 Paper How to build a trapdoor function from an encryption scheme 2023-05-12 Paper Oblivious transfer from trapdoor permutations...
    10 bytes (15 words) - 16:57, 10 April 2026
  • sequential, parallel, and systolic 2017-11-20 Paper Optimal adaptive pattern-matching using finite state automata 2014-06-03 Paper Parallel modular exponentiation...
    10 bytes (13 words) - 02:53, 11 April 2026
  • symmetric key broadcast encryption 2015-08-24 Paper A course on cooperative game theory 2014-11-20 Paper Modes of operations for encryption and authentication...
    10 bytes (15 words) - 21:13, 10 April 2026
  • Strongly full-hiding inner product encryption 2017-02-22 Paper Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation...
    10 bytes (14 words) - 07:26, 11 April 2026
  • A Versatile Pipelined Hardware Implementation for Encryption and Decryption Using Advanced Encryption Standard 2009-01-20 Paper Towards minimal addition...
    10 bytes (17 words) - 01:24, 12 April 2026
  • sharing with steganography and authentication 2017-07-11 Paper Authenticated encryption schemes with linkage between message blocks 2016-06-01 Paper A simple...
    10 bytes (17 words) - 20:23, 10 April 2026
  • Paper An image encryption algorithm based on new chaos and diffusion values of a truth table 2024-01-10 Paper A privacy image encryption algorithm based...
    10 bytes (13 words) - 20:51, 10 April 2026
  • and Secrecy Codes 2018-05-17 Paper Reproducible circularly secure bit encryption: applications and realizations 2018-02-15 Paper Resource-bounded continuity...
    10 bytes (15 words) - 19:48, 10 April 2026
  • construction of non-malleable encryption from semantically secure encryption 2018-04-26 Paper Improved, black-box, non-malleable encryption from semantic security...
    10 bytes (15 words) - 21:01, 11 April 2026
  • 2016-10-28 Paper Offline witness encryption 2016-10-04 Paper On the complexity of \textsf{scrypt} and proofs of space in the parallel random oracle model 2016-07-15...
    10 bytes (14 words) - 23:16, 10 April 2026
  • https://portal.mardi4nfdi.de/entity/Q5875759 2023-02-03 Paper Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations...
    10 bytes (15 words) - 18:23, 10 April 2026