Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 33 results in range #1 to #33.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Deniable Encryption with Negligible Detection Probability: An Interactive Construction: Label: en
  2. Threshold and Revocation Cryptosystems via Extractable Hash Proofs: Label: en
  3. Decentralizing Attribute-Based Encryption: Label: en
  4. Unbounded HIBE and Attribute-Based Encryption: Label: en
  5. Key-Dependent Message Security: Generic Amplification and Completeness: Label: en
  6. Efficient Circuit-Size Independent Public Key Encryption with KDM Security: Label: en
  7. Careful with Composition: Limitations of the Indifferentiability Framework: Label: en
  8. Concurrent Composition in the Bounded Quantum Storage Model: Label: en
  9. Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption: Label: en
  10. Towards a Game Theoretic View of Secure Computation: Label: en
  11. Efficient Non-interactive Secure Computation: Label: en
  12. Two-Output Secure Computation with Malicious Adversaries: Label: en
  13. Improved Generic Algorithms for Hard Knapsacks: Label: en
  14. Statistical Attack on RC4: Label: en
  15. Domain Extension for MACs Beyond the Birthday Barrier: Label: en
  16. On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN: Label: en
  17. Almost Optimum t-Cheater Identifiable Secret Sharing Schemes: Label: en
  18. Secret Keys from Channel Noise: Label: en
  19. Secure Authentication from a Weak Key, without Leaking Information: Label: en
  20. Commuting Signatures and Verifiable Encryption: Label: en
  21. Adaptive Pseudo-free Groups and Applications: Label: en
  22. Tight Proofs for Signature Schemes without Random Oracles: Label: en
  23. Semi-homomorphic Encryption and Multiparty Computation: Label: en
  24. Homomorphic Signatures for Polynomial Functions: Label: en
  25. Implementing Gentry’s Fully-Homomorphic Encryption Scheme: Label: en
  26. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices: Label: en
  27. Fully Leakage-Resilient Signatures: Label: en
  28. Pushing the Limits: A Very Compact and a Threshold Implementation of AES: Label: en
  29. Faster Explicit Formulas for Computing Pairings over Ordinary Curves: Label: en
  30. Making NTRU as Secure as Worst-Case Problems over Ideal Lattices: Label: en
  31. Efficient Authentication from Hard Learning Problems: Label: en
  32. Lattice Reduction Algorithms: Theory and Practice: Label: en
  33. The Arithmetic Codex: Theory and Applications: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)