Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 25 results in range #1 to #25.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Sub-linear Size Traceable Ring Signatures without Random Oracles: Label: en
  2. Attribute-Based Signatures: Label: en
  3. A Variant of the F4 Algorithm: Label: en
  4. Binary Huff Curves: Label: en
  5. Better Key Sizes (and Attacks) for LWE-Based Encryption: Label: en
  6. On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes: Label: en
  7. Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols: Label: en
  8. Expedient Non-malleability Notions for Hash Functions: Label: en
  9. Meet-in-the-Middle Attacks on Reduced-Round XTEA: Label: en
  10. Online Ciphers from Tweakable Blockciphers: Label: en
  11. MJH: A Faster Alternative to MDC-2: Label: en
  12. (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach: Label: en
  13. Beyond Provable Security Verifiable IND-CCA Security of OAEP: Label: en
  14. Ideal Key Derivation and Encryption in Simulation-Based Security: Label: en
  15. Contributory Password-Authenticated Group Key Exchange with Join Capability: Label: en
  16. Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys: Label: en
  17. NSA’s Role in the Development of DES: Label: en
  18. Improving Differential Power Analysis by Elastic Alignment: Label: en
  19. Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns: Label: en
  20. Defeating RSA Multiply-Always and Message Blinding Countermeasures: Label: en
  21. Communication-Efficient 2-Round Group Key Establishment from Pairings: Label: en
  22. Non-interactive Confirmer Signatures: Label: en
  23. A General, Flexible and Efficient Proof of Inclusion and Exclusion: Label: en
  24. Efficient Secure Two-Party Exponentiation: Label: en
  25. Secure Set Intersection with Untrusted Hardware Tokens: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)