Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #1 to #50.

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

  1. Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer: Label: en
  2. An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure: Label: en
  3. Constrained Verifiable Random Functions from Indistinguishability Obfuscation: Label: en
  4. From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions: Label: en
  5. On Privacy for RFID: Label: en
  6. Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach: Label: en
  7. PPAE: Practical Parazoa Authenticated Encryption Family: Label: en
  8. Efficient Key Authentication Service for Secure End-to-End Communications: Label: en
  9. Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher: Label: en
  10. Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction: Label: en
  11. Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards: Label: en
  12. Sound Proof of Proximity of Knowledge: Label: en
  13. Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem: Label: en
  14. Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks: Label: en
  15. A Tamper-Evident Voting Machine Resistant to Covert Channels: Label: en
  16. Round Optimal Universally Composable Oblivious Transfer Protocols: Label: en
  17. Universally Composable Security Analysis of TLS: Label: en
  18. Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library: Label: en
  19. A Universally Composable Framework for the Analysis of Browser-Based Security Protocols: Label: en
  20. Relationship of Three Cryptographic Channels in the UC Framework: Label: en
  21. Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?: Label: en
  22. How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions: Label: en
  23. Leaky Random Oracle (Extended Abstract): Label: en
  24. The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version: Label: en
  25. On the Equivalence of Generic Group Models: Label: en
  26. Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups: Label: en
  27. Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005: Label: en
  28. On Proofs of Security for DAA Schemes: Label: en
  29. Server-Aided Verification Signatures: Definitions and New Constructions: Label: en
  30. Secure Proxy Multi-signature Scheme in the Standard Model: Label: en
  31. Round-Optimal Blind Signatures from Waters Signatures: Label: en
  32. Optimal Online/Offline Signature: How to Sign a Message without Online Computation: Label: en
  33. Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps: Label: en
  34. A CCA Secure Hybrid Damgård’s ElGamal Encryption: Label: en
  35. Efficient and Provably Secure Certificateless Multi-receiver Signcryption: Label: en
  36. Timed-Release Encryption Revisited: Label: en
  37. Tweakable Pseudorandom Permutation from Generalized Feistel Structure: Label: en
  38. Codes Based Tracing and Revoking Scheme with Constant Ciphertext: Label: en
  39. Revisiting a Secret Sharing Approach to Network Codes: Label: en
  40. On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties: Label: en
  41. Authenticated Key Exchange with Entities from Different Settings and Varied Groups: Label: en
  42. Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles: Label: en
  43. Fully Secure Doubly-Spatial Encryption under Simple Assumptions: Label: en
  44. Secure Keyword Search Using Bloom Filter with Specified Character Positions: Label: en
  45. Symmetric Inner-Product Predicate Encryption Based on Three Groups: Label: en
  46. Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures: Label: en
  47. Perfect Keyword Privacy in PEKS Systems: Label: en
  48. Efficient Escrow-Free Identity-Based Signature: Label: en
  49. Anonymous Identity-Based Hash Proof System and Its Applications: Label: en
  50. LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation: Label: en

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)