Entity usage
From MaRDI portal
This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.
Showing below up to 42 results in range #1 to #42.
- From Selective to Full Security: Semi-generic Transformations in the Standard Model: Label: en
- Variants of Waters’ Dual System Primitives Using Asymmetric Pairings: Label: en
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices: Label: en
- Public Key Encryption against Related Key Attacks: Label: en
- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication: Label: en
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts: Label: en
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model: Label: en
- Public-Key Cryptography from New Multivariate Quadratic Assumptions: Label: en
- Public-Key Identification Schemes Based on Multivariate Cubic Polynomials: Label: en
- Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited: Label: en
- Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes: Label: en
- The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles: Label: en
- Space Efficient Signature Schemes from the RSA Assumption: Label: en
- Strong Security from Probabilistic Signature Schemes: Label: en
- Waters Signatures with Optimal Security Reduction: Label: en
- On Homomorphic Encryption and Chosen-Ciphertext Security: Label: en
- Ring-LWE in Polynomial Rings: Label: en
- Polly Cracker, Revisited, Revisited: Label: en
- Better Bootstrapping in Fully Homomorphic Encryption: Label: en
- On the Security of Dynamic Group Signatures: Preventing Signature Hijacking: Label: en
- Improved Security for Linearly Homomorphic Signatures: A Generic Framework: Label: en
- Efficient Network Coding Signatures in the Standard Model: Label: en
- Security of Blind Signatures Revisited: Label: en
- DDH-Like Assumptions Based on Extension Rings: Label: en
- Extended-DDH and Lossy Trapdoor Functions: Label: en
- Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods: Label: en
- Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve: Label: en
- Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms: Label: en
- Correlated Product Security from Any One-Way Function: Label: en
- New Definitions and Separations for Circular Security: Label: en
- On Definitions of Selective Opening Security: Label: en
- Multi-location Leakage Resilient Cryptography: Label: en
- Relatively-Sound NIZKs and Password-Based Key-Exchange: Label: en
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices: Label: en
- Efficient Password Authenticated Key Exchange via Oblivious Transfer: Label: en
- Efficiently Shuffling in Public: Label: en
- Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies: Label: en
- Constant-Round Multi-party Private Set Union Using Reversed Laurent Series: Label: en
- Password-Based Authenticated Key Exchange: Label: en
- Generating Provable Primes Efficiently on Embedded Devices: Label: en
- NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model: Label: en
- Circular and KDM Security for Identity-Based Encryption: Label: en