Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #1 to #50.

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

  1. WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP: Label: en
  2. BackRef: Accountability in Anonymous Communication Networks: Label: en
  3. MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks: Label: en
  4. Improving Intrusion Detection Systems for Wireless Sensor Networks: Label: en
  5. Detecting Hidden Leakages: Label: en
  6. Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro: Label: en
  7. Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function: Label: en
  8. On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers: Label: en
  9. Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications: Label: en
  10. Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions: Label: en
  11. Sakura: A Flexible Coding for Tree Hashing: Label: en
  12. Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange: Label: en
  13. All-but-One Dual Projective Hashing and Its Applications: Label: en
  14. Bit-Flip Faults on Elliptic Curve Base Fields, Revisited: Label: en
  15. New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents: Label: en
  16. Partial Key Exposure Attacks on Takagi’s Variant of RSA: Label: en
  17. Private Message Transmission Using Disjoint Paths: Label: en
  18. Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited: Label: en
  19. Verifiable Multi-server Private Information Retrieval: Label: en
  20. Improved Constructions of PRFs Secure Against Related-Key Attacks: Label: en
  21. A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols: Label: en
  22. Password-Based Authenticated Key Exchange without Centralized Trusted Setup: Label: en
  23. New Modular Compilers for Authenticated Key Exchange: Label: en
  24. Automatic Protocol Selection in Secure Two-Party Computations: Label: en
  25. Delegating a Pairing Can Be Both Secure and Efficient: Label: en
  26. Fragmentation Considered Leaking: Port Inference for DNS Poisoning: Label: en
  27. Polymorphism as a Defense for Automated Attack of Websites: Label: en
  28. Practical Signatures from the Partial Fourier Recovery Problem: Label: en
  29. On Updatable Redactable Signatures: Label: en
  30. Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials: Label: en
  31. A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List: Label: en
  32. Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography: Label: en
  33. How to Compare Profiled Side-Channel Attacks?: Label: en
  34. A Timing Attack on Blakley’s Modular Multiplication Algorithm, and Applications to DSA: Label: en
  35. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack: Label: en
  36. Cryptanalysis of the TRMC-4 Public Key Cryptosystem: Label: en
  37. Analyzing an Electronic Cash Protocol Using Applied Pi Calculus: Label: en
  38. An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme: Label: en
  39. Midpoints Versus Endpoints: From Protocols to Firewalls: Label: en
  40. Merkle Signatures with Virtually Unlimited Signature Capacity: Label: en
  41. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure: Label: en
  42. Generic Transformation to Strongly Unforgeable Signatures: Label: en
  43. Gradually Convertible Undeniable Signatures: Label: en
  44. Security Mediated Certificateless Signatures: Label: en
  45. Efficient Certificateless Signature Schemes: Label: en
  46. Sliding Window Method for NTRU: Label: en
  47. Compressed XTR: Label: en
  48. BAP: Broadcast Authentication Using Cryptographic Puzzles: Label: en
  49. Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains: Label: en
  50. An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks: Label: en

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)