Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 35 results in range #1 to #35.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Rotational Rebound Attacks on Reduced Skein: Label: en
  2. Efficient Public-Key Cryptography in the Presence of Key Leakage: Label: en
  3. Leakage Resilient ElGamal Encryption: Label: en
  4. Structured Encryption and Controlled Disclosure: Label: en
  5. The Degree of Regularity of HFE Systems: Label: en
  6. The Semi-Generic Group Model and Applications to Pairing-Based Cryptography: Label: en
  7. Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures: Label: en
  8. A Closer Look at Anonymity and Robustness in Encryption Schemes: Label: en
  9. Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition: Label: en
  10. On Invertible Sampling and Adaptive Security: Label: en
  11. General Perfectly Secure Message Transmission Using Linear Codes: Label: en
  12. The Round Complexity of Verifiable Secret Sharing: The Statistical Case: Label: en
  13. Lattice-Based Blind Signatures: Label: en
  14. A Group Signature Scheme from Lattice Assumptions: Label: en
  15. Faster Fully Homomorphic Encryption: Label: en
  16. Optimistic Concurrent Zero Knowledge: Label: en
  17. Short Non-interactive Zero-Knowledge Proofs: Label: en
  18. Short Pairing-Based Non-interactive Zero-Knowledge Arguments: Label: en
  19. Random Oracles with(out) Programmability: Label: en
  20. On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields: Label: en
  21. Efficient String-Commitment from Weak Bit-Commitment: Label: en
  22. A Forward-Secure Symmetric-Key Derivation Protocol: Label: en
  23. Generic Compilers for Authenticated Key Exchange: Label: en
  24. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model: Label: en
  25. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries: Label: en
  26. Constant-Size Commitments to Polynomials and Their Applications: Label: en
  27. Improved Single-Key Attacks on 8-Round AES-192 and AES-256: Label: en
  28. A Byte-Based Guess and Determine Attack on SOSEMANUK: Label: en
  29. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems: Label: en
  30. The World Is Not Enough: Another Look on Second-Order DPA: Label: en
  31. Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions: Label: en
  32. Collision Attacks against the Knudsen-Preneel Compression Functions: Label: en
  33. Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2: Label: en
  34. Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl: Label: en
  35. Finding Second Preimages of Short Messages for Hamsi-256: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)