Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 29 results in range #1 to #29.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem: Label: en
  2. Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials: Label: en
  3. Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants: Label: en
  4. Revocation for Delegatable Anonymous Credentials: Label: en
  5. Signatures on Randomizable Ciphertexts: Label: en
  6. Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra: Label: en
  7. On-line Non-transferable Signatures Revisited: Label: en
  8. On the Impossibility of Instantiating PSS in the Standard Model: Label: en
  9. Linear Recurring Sequences for the UOV Key Generation: Label: en
  10. One-Pass HMQV and Asymmetric Key-Wrapping: Label: en
  11. Fully Secure Accountable-Authority Identity-Based Encryption: Label: en
  12. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010: Label: en
  13. New Developments in Leakage-Resilient Cryptography: Label: en
  14. Secure Blind Decryption: Label: en
  15. Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks: Label: en
  16. Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security: Label: en
  17. Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited: Label: en
  18. Oblivious Transfer with Hidden Access Control Policies: Label: en
  19. Sub-linear, Secure Comparison with Two Non-colluding Parties: Label: en
  20. (If) Size Matters: Size-Hiding Private Set Intersection: Label: en
  21. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005: Label: en
  22. On the Correct Use of the Negation Map in the Pollard rho Method: Label: en
  23. Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three: Label: en
  24. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts: Label: en
  25. Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption: Label: en
  26. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization: Label: en
  27. Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model: Label: en
  28. Homomorphic Network Coding Signatures in the Standard Model: Label: en
  29. Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)