Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Distributions 2017-05-02 Paper Secret Key Agreement: General Capacity and Second-Order Asymptotics 2017-04-28 Paper Converses For Secret Key Agreement and Secure...
    10 bytes (16 words) - 14:57, 22 September 2023
  • 2018-06-27 Paper On the Optimality of Secret Key Agreement via Omniscience 2018-06-27 Paper Multiterminal Secret Key Agreement 2017-05-16 Paper Successive...
    10 bytes (16 words) - 16:41, 6 October 2023
  • Communication and Authentication With Anonymity Constraints 2020-01-28 Paper Secret-Key Generation in Many-to-One Networks: An Integrated Game-Theoretic and ...
    10 bytes (18 words) - 09:01, 7 October 2023
  • Implementations 2013-07-09 Paper Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems 2012-06-08 Paper Public Key Perturbation of Randomized...
    10 bytes (18 words) - 16:30, 6 October 2023
  • Date of Publication Type Secret Key Generation for a Pairwise Independent Network Model 2017-07-27 Paper Secret Key and Private Key Constructions for Simple...
    10 bytes (16 words) - 11:51, 7 October 2023
  • Noisy Channels 2012-06-08 Paper Secret Keys from Channel Noise 2011-05-27 Paper Common Randomness and Secret Key Capacities of Two-Way Channels 2011-05-19 Paper...
    10 bytes (15 words) - 05:44, 7 October 2023
  • Implementations 2013-07-09 Paper Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems 2012-06-08 Paper Public Key Perturbation of Randomized...
    10 bytes (16 words) - 00:27, 25 September 2023
  • the Secret Pseudo-random Index j in RC4 Key Scheduling 2010-01-14 Paper On biases of permutation and keystream bytes of RC4 towards the secret key 2009-10-26...
    10 bytes (17 words) - 12:40, 28 January 2024
  • on secret-key functional encryption 2022-06-08 Paper CCA security and trapdoor functions via key-dependent-message security 2022-04-04 Paper Secret sharing...
    10 bytes (16 words) - 06:35, 7 October 2023
  • A Tool Kit for Partial Key Exposure Attacks on RSA 2017-04-12 Paper Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise 2017-04-12...
    10 bytes (16 words) - 03:08, 7 October 2023
  • Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys 2011-02-11 Paper Ephemeral Key Leakage Resilient and Efficient...
    10 bytes (17 words) - 13:54, 6 October 2023
  • Authenticated Key Exchange Resilient to Leakage of Secret Keys 2012-11-01 Paper Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange...
    10 bytes (16 words) - 13:54, 6 October 2023
  • Conditional Oblivious Transfer 2009-10-20 Paper Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes 2009-03-10 Paper Efficient Oblivious...
    10 bytes (16 words) - 20:20, 6 October 2023
  • multi-party quantum key agreement protocol with single particles 2020-06-16 Paper A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private...
    10 bytes (17 words) - 22:08, 10 December 2023
  • proof 2016-06-16 Paper On secret set schemes 2016-06-16 Paper Visual cryptography for grey level images 2016-06-16 Paper On secret sharing schemes 2016-06-09...
    10 bytes (19 words) - 18:57, 9 December 2023
  • continuous-variable quantum key distribution via mean-restricted unary linear regression 2024-04-15 Paper Decentralized continuous-variable quantum secret sharing 2023-10-13...
    10 bytes (16 words) - 23:24, 9 December 2023
  • for grey level images 2016-06-16 Paper On secret sharing schemes 2016-06-09 Paper Lower bounds for robust secret sharing schemes 2016-05-26 Paper Trade-offs...
    10 bytes (17 words) - 18:56, 9 December 2023
  • Practical Public Key Cryptosystems 2010-02-09 Paper Public Verifiability from Pairings in Secret Sharing Schemes 2009-11-03 Paper On proper secrets, \((t,k)\)-bases...
    10 bytes (19 words) - 22:41, 8 December 2023
  • quantum key distribution scheme based on optical quantum state fusion and fission 2019-05-03 Paper Practical aspects of terahertz wireless quantum key distribution...
    10 bytes (17 words) - 20:02, 12 December 2023
  • hierarchical key-insulation in the standard model 2019-05-17 Paper CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance...
    10 bytes (16 words) - 04:08, 13 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)