Pages that link to "Item:Q3084336"
From MaRDI portal
The following pages link to Public Key Cryptography – PKC 2011 (Q3084336):
Displaying 29 items.
- Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures (Q3084337) (← links)
- Homomorphic Network Coding Signatures in the Standard Model (Q3084338) (← links)
- Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model (Q3084339) (← links)
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization (Q3084340) (← links)
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption (Q3084341) (← links)
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts (Q3084342) (← links)
- Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three (Q3084343) (← links)
- On the Correct Use of the Negation Map in the Pollard rho Method (Q3084344) (← links)
- Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 (Q3084345) (← links)
- (If) Size Matters: Size-Hiding Private Set Intersection (Q3084346) (← links)
- Sub-linear, Secure Comparison with Two Non-colluding Parties (Q3084347) (← links)
- Oblivious Transfer with Hidden Access Control Policies (Q3084348) (← links)
- Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited (Q3084349) (← links)
- Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security (Q3084350) (← links)
- Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks (Q3084351) (← links)
- Secure Blind Decryption (Q3084352) (← links)
- New Developments in Leakage-Resilient Cryptography (Q3084353) (← links)
- On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 (Q3084354) (← links)
- Fully Secure Accountable-Authority Identity-Based Encryption (Q3084355) (← links)
- One-Pass HMQV and Asymmetric Key-Wrapping (Q3084356) (← links)
- Linear Recurring Sequences for the UOV Key Generation (Q3084357) (← links)
- On the Impossibility of Instantiating PSS in the Standard Model (Q3084358) (← links)
- On-line Non-transferable Signatures Revisited (Q3084359) (← links)
- Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra (Q3084360) (← links)
- Signatures on Randomizable Ciphertexts (Q3084361) (← links)
- Revocation for Delegatable Anonymous Credentials (Q3084362) (← links)
- Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants (Q3084363) (← links)
- Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials (Q3084364) (← links)
- Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem (Q3084365) (← links)