Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #1 to #50.

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

  1. Quantum Homomorphic Encryption for Polynomial-Sized Circuits: Label: en
  2. Another View of the Division Property: Label: en
  3. Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices: Label: en
  4. New Insights on AES-Like SPN Ciphers: Label: en
  5. Efficient Algorithms for Supersingular Isogeny Diffie-Hellman: Label: en
  6. Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case: Label: en
  7. Breaking the Circuit Size Barrier for Secure Computation Under DDH: Label: en
  8. The Magic of ELFs: Label: en
  9. Cryptanalysis of the FLIP Family of Stream Ciphers: Label: en
  10. A 2^{70} Attack on the Full MISTY1: Label: en
  11. Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results: Label: en
  12. Big-Key Symmetric Encryption: Resisting Key Exfiltration: Label: en
  13. Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines: Label: en
  14. Encryption Switching Protocols: Label: en
  15. A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case: Label: en
  16. The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3: Label: en
  17. Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN: Label: en
  18. Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts: Label: en
  19. A Practical Cryptanalysis of the Algebraic Eraser: Label: en
  20. A Subfield Lattice Attack on Overstretched NTRU Assumptions: Label: en
  21. EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC: Label: en
  22. Indifferentiability of 8-Round Feistel Networks: Label: en
  23. XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees: Label: en
  24. Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers: Label: en
  25. Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security: Label: en
  26. Two-Message, Oblivious Evaluation of Cryptographic Functionalities: Label: en
  27. Bounded Indistinguishability and the Complexity of Recovering Secrets: Label: en
  28. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption: Label: en
  29. Fine-Grained Cryptography: Label: en
  30. Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials: Label: en
  31. How to Prove Knowledge of Small Secrets: Label: en
  32. On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings: Label: en
  33. Linicrypt: A Model for Practical Cryptography: Label: en
  34. Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming: Label: en
  35. Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security: Label: en
  36. Fully Secure Functional Encryption for Inner Products, from Standard Assumptions: Label: en
  37. Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes: Label: en
  38. Concurrent Non-Malleable Commitments (and More) in 3 Rounds: Label: en
  39. Probabilistic Termination and Composability of Cryptographic Protocols: Label: en
  40. UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens: Label: en
  41. Rate-1, Linear Time and Additively Homomorphic UC Commitments: Label: en
  42. Adaptively Secure Garbled Circuits from One-Way Functions: Label: en
  43. Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems: Label: en
  44. Spooky Encryption and Its Applications: Label: en
  45. Semantic Security and Indistinguishability in the Quantum World: Label: en
  46. Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications: Label: en
  47. Circular Security Separations for Arbitrary Length Cycles from LWE: Label: en
  48. Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE: Label: en
  49. Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13: Label: en
  50. Cryptanalysis of GGH15 Multilinear Maps: Label: en

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)