Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 26 results in range #1 to #26.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Black-Box Reductions and Separations in Cryptography: Label: en
  2. Stream Ciphers, a Perspective: Label: en
  3. Round-Optimal Black-Box Statistically Binding Selective-Opening Secure Commitments: Label: en
  4. Size-Hiding in Private Set Intersection: Existential Results and Constructions: Label: en
  5. Optimal First-Order Masking with Linear and Non-linear Bijections: Label: en
  6. Improved Fixed-Base Comb Method for Fast Scalar Multiplication: Label: en
  7. SHA-3 on ARM11 Processors: Label: en
  8. The GLUON Family: A Lightweight Hash Function Family Based on FCSRs: Label: en
  9. Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein: Label: en
  10. SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks: Label: en
  11. The Collision Security of MDC-4: Label: en
  12. Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption: Label: en
  13. A New Attack on RSA and CRT-RSA: Label: en
  14. A Complementary Analysis of the (s)YZ and DIKE Protocols: Label: en
  15. Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important: Label: en
  16. Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices: Label: en
  17. Differential Cryptanalysis of Reduced-Round ICEBERG: Label: en
  18. Three-Subset Meet-in-the-Middle Attack on Reduced XTEA: Label: en
  19. Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT: Label: en
  20. Improving the Performance of the SYND Stream Cipher: Label: en
  21. Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary: Label: en
  22. Fuzzy Vault for Multiple Users: Label: en
  23. Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator: Label: en
  24. Sanitizable Signatures with Several Signers and Sanitizers: Label: en
  25. Extended Security Arguments for Signature Schemes: Label: en
  26. Batch Verification of ECDSA Signatures: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)