Encyclopedia of cryptography and security.
DOI10.1007/978-1-4419-5906-5zbMATH Open1226.94001OpenAlexW2170334586WikidataQ130535452 ScholiaQ130535452MaRDI QIDQ3095372FDOQ3095372
Author name not available (Why is that?)
Publication date: 31 October 2011
Full work available at URL: https://doi.org/10.1007/978-1-4419-5906-5
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Factorization (11Y05) Authentication, digital signatures and secret sharing (94A62) Primality (11Y11) General reference works (handbooks, dictionaries, bibliographies, etc.) pertaining to information and communication theory (94-00)
Cited In (22)
- BOX-COUNTING DIMENSION COMPUTED BY α-DENSE CURVES
- Traceable PRFs: Full Collusion Resistance and Active Security
- More Results on Shortest Linear Programs
- Quantum secret sharing with identity authentication based on Bell states
- TVES: threshold verifiably encrypted signature and its applications
- Uncertainty in runtime verification: a survey
- Efficient key-dependent dynamic S-boxes based on permutated elliptic curves
- Improved truncated differential distinguishers of AES with concrete S-box
- One round threshold ECDSA without roll call
- Hashing Garbled Circuits for Free
- Security Analysis of PRINCE
- Quantum algorithm for solving hyperelliptic curve discrete logarithm problem
- Encyclopedia of Cryptography and Security
- Offsetting inventory replenishment cycles
- Design and implementation of a system that preserves the confidentiality of stream cipher in non-linear flow coding
- Light-weighted cryptographic algorithms for energy efficient applications
- On the properties that characterize privacy
- Distinguisher on full-round compression function of GOST R
- Reflection ciphers
- Ensuring privacy with constrained additive noise by minimizing Fisher information
- Differentially private reinforcement learning
- How real is incomputability in physics?
This page was built for publication: Encyclopedia of cryptography and security.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3095372)