Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #1 to #50.

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

  1. Server-aided revocable attribute-based encryption resilient to decryption key exposure: Label: en
  2. An efficient attribute-based authenticated key exchange protocol: Label: en
  3. (Finite) field work: choosing the best encoding of numbers for FHE computation: Label: en
  4. Computational aspects of ideal \((t, n)\)-threshold scheme of Chen, Laing, and Martin: Label: en
  5. A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model: Label: en
  6. Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures: Label: en
  7. Towards attribute-based credentials in the cloud: Label: en
  8. Multi-client predicate-only encryption for conjunctive equality tests: Label: en
  9. Subset predicate encryption and its applications: Label: en
  10. A new secure matrix multiplication from ring-LWE: Label: en
  11. On the security of frequency-hiding order-preserving encryption: Label: en
  12. Tightly-secure PAK(E): Label: en
  13. Forward-security under continual leakage: Label: en
  14. Efficient proofs of retrievability using expander codes: Label: en
  15. Anonymous random allocation and its applications: Label: en
  16. Provable security of HADES structure: Label: en
  17. Cryptanalysis of the multi-power RSA cryptosystem variant: Label: en
  18. (Augmented) broadcast encryption from identity based encryption with wildcard: Label: en
  19. Auditable asymmetric password authenticated public key establishment: Label: en
  20. Attribute-based anonymous credential: optimization for single-use and multi-use: Label: en
  21. \textsf{Through the looking-glass}: benchmarking secure multi-party computation comparisons for \textsf{ReLU}'s: Label: en
  22. Updatable NIZKs from non-interactive zaps: Label: en
  23. Efficient NIZK arguments with straight-line simulation and extraction: Label: en
  24. Hierarchical Attribute-Based Signatures: Label: en
  25. On the Efficiency of ZMAC-Type Modes: Label: en
  26. The Relation Between CENC and NEMO: Label: en
  27. $$\mathsf {HIKE}$$ : Walking the Privacy Trail: Label: en
  28. Faster Privacy-Preserving Location Proximity Schemes: Label: en
  29. Adaptive-Secure VRFs with Shorter Keys from Static Assumptions: Label: en
  30. Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption: Label: en
  31. Several MILP-Aided Attacks Against SNOW 2.0: Label: en
  32. Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation: Label: en
  33. Solving LWR via BDD Strategy: Modulus Switching Approach: Label: en
  34. Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project: Label: en
  35. Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes: Label: en
  36. SETLA: Signature and Encryption from Lattices: Label: en
  37. Code-Based Signature Schemes from Identification Protocols in the Rank Metric: Label: en
  38. Protean Signature Schemes: Label: en
  39. Enhanced Security of Attribute-Based Signatures: Label: en
  40. Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework: Label: en
  41. Secret Sharing Schemes for (k, n)-Consecutive Access Structures: Label: en
  42. Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes: Label: en
  43. Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups: Label: en
  44. Counting Method for Multi-party Computation over Non-abelian Groups: Label: en
  45. Cryptanalysis of EC-RAC, a RFID Identification Protocol: Label: en
  46. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks: Label: en
  47. On the Security of Online/Offline Signatures and Multisignatures from ACISP’06: Label: en
  48. An Efficient On-Line/Off-Line Signature Scheme without Random Oracles: Label: en
  49. Sanitizable Signatures Revisited: Label: en
  50. Efficient and Short Certificateless Signature: Label: en

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)