Entity usage
From MaRDI portal
This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.
Showing below up to 50 results in range #1 to #50.
- A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators: Label: en
- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data: Label: en
- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy: Label: en
- Related Key Secure PKE from Hash Proof Systems: Label: en
- Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty: Label: en
- Characterization of EME with Linear Mixing: Label: en
- Improved Linear Cryptanalysis of Reduced-Round MIBS: Label: en
- On the Security Proof of an Authentication Protocol from Eurocrypt 2011: Label: en
- Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics: Label: en
- A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering: Label: en
- DPA Resilience of Rotation-Symmetric S-boxes: Label: en
- Deterministic Hard Fault Attack on Trivium: Label: en
- How to Effectively Decrease the Resource Requirement in Template Attack?: Label: en
- More Constructions of Re-splittable Threshold Public Key Encryption: Label: en
- Secure Multi-Party Computation for Elliptic Curves: Label: en
- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field: Label: en
- Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication: Label: en
- Generic Construction of GUC Secure Commitment in the KRK Model: Label: en
- Efficient Secure Primitive for Privacy Preserving Distributed Computations: Label: en
- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security: Label: en
- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher: Label: en
- Annihilators of Fast Discrete Fourier Spectra Attacks: Label: en
- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function: Label: en
- Boomerang Distinguishers for Full HAS-160 Compression Function: Label: en
- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI: Label: en
- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability: Label: en
- Structured Encryption for Conceptual Graphs: Label: en
- Compact Stateful Encryption Schemes with Ciphertext Verifiability: Label: en
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary: Label: en
- Very Short Critical Path Implementation of AES with Direct Logic Gates: Label: en
- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU: Label: en
- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography: Label: en
- Tamper-Tolerant Software: Modeling and Implementation: Label: en
- Reducing Complexity Assumptions for Oblivious Transfer: Label: en
- Universal Designated Verifier Signatures with Threshold-Signers: Label: en
- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers: Label: en
- A Generic Construction of Timed-Release Encryption with Pre-open Capability: Label: en
- Improved Distinguishing Attacks on HC-256: Label: en
- Impossible Boomerang Attack for Block Cipher Structures: Label: en
- Bit-Free Collision: Application to APOP Attack: Label: en
- The Future of Cryptographic Algorithms: Label: en
- A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol: Label: en
- Batch Pairing Delegation: Label: en
- Experiments on the Linear Algebra Step in the Number Field Sieve: Label: en
- Reduction Optimal Trinomials for Efficient Software Implementation of the η T Pairing: Label: en
- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption: Label: en
- Game-Theoretic Security for Bit Commitment: Label: en
- Attacks to the Proxy Re-Encryption Schemes from IWSEC2011: Label: en
- One-Round Authenticated Key Exchange without Implementation Trick: Label: en
- On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary: Label: en