Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 25 results in range #1 to #25.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. ECC2K-130 on Cell CPUs: Label: en
  2. Avoiding Full Extension Field Arithmetic in Pairing Computations: Label: en
  3. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience: Label: en
  4. Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes: Label: en
  5. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes: Label: en
  6. Optimistic Fair Priced Oblivious Transfer: Label: en
  7. Batch Range Proof for Practical Small Ranges: Label: en
  8. Proofs of Restricted Shuffles: Label: en
  9. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512: Label: en
  10. Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits: Label: en
  11. Improved Linear Differential Attacks on CubeHash: Label: en
  12. Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over $\mathbb{F}_2$: Label: en
  13. Parallelizing the Camellia and SMS4 Block Ciphers: Label: en
  14. Parallel Shortest Lattice Vector Enumeration on Graphics Cards: Label: en
  15. Quantum Readout of Physical Unclonable Functions: Label: en
  16. Fair Partially Blind Signatures: Label: en
  17. Fair Blind Signatures without Random Oracles: Label: en
  18. Flexible Group Key Exchange with On-demand Computation of Subgroup Keys: Label: en
  19. A New RSA-Based Signature Scheme: Label: en
  20. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions: Label: en
  21. Efficient Unidirectional Proxy Re-Encryption: Label: en
  22. Strong Cryptography from Weak Secrets: Label: en
  23. Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices: Label: en
  24. Differential Fault Analysis of HC-128: Label: en
  25. Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)