Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Publication Date of Publication Type A generic security API for symmetric key management on cryptographic devices 2014-10-20 Paper https://portal.mardi4nfdi...
    10 bytes (16 words) - 04:11, 25 September 2023
  • hoc routing protocols 2014-10-20 Paper A generic security API for symmetric key management on cryptographic devices 2014-10-20 Paper Electronic Voting: How...
    10 bytes (17 words) - 11:46, 6 October 2023
  • 2023-03-21 Paper Post-quantum online voting scheme 2022-06-01 Paper Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy 2020-08-05 Paper...
    10 bytes (16 words) - 23:37, 12 December 2023
  • Block Cipher under 192 Key Bits 2011-05-19 Paper Quadratic compact knapsack public-key cryptosystem 2010-06-28 Paper New related-key rectangle attacks on...
    10 bytes (17 words) - 13:36, 28 January 2024
  • Signature Schemes Against Related-Key Attacks in the Random Oracle Model 2017-05-19 Paper A semantically secure public key cryptoscheme using bit-pair shadows...
    10 bytes (17 words) - 11:53, 11 December 2023
  • Authenticated Key Agreement with Key Re-Use in the Short Authenticated Strings Model 2014-01-03 Paper Highly-Scalable Searchable Symmetric Encryption with...
    10 bytes (16 words) - 20:20, 6 October 2023
  • Square Key Matrix Management Scheme in Wireless Sensor Networks 2018-11-29 Paper Saint-Venant torsion of a two-phase circumferentially symmetric compound...
    10 bytes (18 words) - 21:46, 24 September 2023
  • INVERSE MEAN CURVATURE FLOW IN RANK ONE SYMMETRIC SPACES OF NON-COMPACT TYPE 2015-12-11 Paper Dynamic Threshold Public-Key Encryption with Decryption Consistency...
    10 bytes (16 words) - 02:34, 25 September 2023
  • Privacy-Preserving Prescription Drug Management Using Fully Homomorphic Encryption 2022-11-02 Paper Oblivious key-value stores and amplification for private...
    10 bytes (16 words) - 09:14, 24 September 2023
  • random fault attacks on certain CAESAR stream ciphers 2020-07-08 Paper A new key escrow cryptosystem 2019-10-10 Paper How to fairly reconstruct a shared secret...
    10 bytes (17 words) - 15:19, 10 December 2023
  • BASED ON HENON CHAOTIC KEY ALGORITHM 2020-09-14 Paper Learning to Optimize: Training Deep Neural Networks for Interference Management 2019-02-12 Paper Inexact...
    10 bytes (16 words) - 00:51, 28 December 2023
  • mardi4nfdi.de/entity/Q5260059 2015-06-29 Paper Efficient and dynamic key management for multiple identities in identity-based systems 2014-08-01 Paper fficient...
    10 bytes (16 words) - 14:05, 24 September 2023
  • Two-Party Protocols Based on Homomorphic Encryption 2014-05-27 Paper Secure Key Management in the Cloud 2014-01-17 Paper Unconditionally Secure and Universally...
    10 bytes (19 words) - 01:13, 10 December 2023
  • IDENTITY BASED AUTHENTICATED KEY AGREEMENT FROM PAIRINGS 2006-02-06 Paper MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES 2005-12-12 Paper...
    10 bytes (18 words) - 09:32, 6 October 2023
  • fundamental form 2016-03-08 Paper Minimizing center key storage in hybrid one-way function based group key management with communication constraints 2009-08-27 Paper...
    10 bytes (16 words) - 02:55, 7 October 2023
  • Puzzles 2013-04-19 Paper Property Preserving Symmetric Encryption 2012-06-29 Paper Incremental Deterministic Public-Key Encryption 2012-06-29 Paper Publicly Verifiable...
    10 bytes (16 words) - 18:37, 24 September 2023
  • successive fuzzy evaluation model: a case study 2010-08-13 Paper Efficient key management scheme based on CPK for mobile Ad Hoc networks 2009-11-22 Paper EQUATION...
    10 bytes (17 words) - 00:26, 10 December 2023
  • optimizations for BKW 2023-08-25 Paper A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding 2023-08-21 Paper...
    10 bytes (16 words) - 07:10, 7 October 2023
  • unifying view that exploits the matrix profile 2019-05-03 Paper Value management of diagnostic equipment with cancelation, no‐show, and emergency patients...
    10 bytes (16 words) - 23:41, 9 December 2023
  • 2017-02-07 Paper Detection of dendritic spines using wavelet-based conditional symmetric analysis and regularized morphological shared-weight neural networks 2016-08-31...
    10 bytes (17 words) - 15:51, 9 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)