Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 30 results in range #1 to #30.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Securing RSA against Fault Analysis by Double Addition Chain Exponentiation: Label: en
  2. Fault Analysis Attack against an AES Prototype Chip Using RSL: Label: en
  3. Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable: Label: en
  4. Strengthening Security of RSA-OAEP: Label: en
  5. Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening: Label: en
  6. Local Sequentiality Does Not Help for Concurrent Composition: Label: en
  7. Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values: Label: en
  8. Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients: Label: en
  9. Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity: Label: en
  10. Practical Short Signature Batch Verification: Label: en
  11. Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems: Label: en
  12. Key-Private Proxy Re-encryption: Label: en
  13. Communication-Efficient Private Protocols for Longest Common Subsequence: Label: en
  14. Square, a New Multivariate Encryption Scheme: Label: en
  15. A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model: Label: en
  16. Cryptanalysis of CTC2: Label: en
  17. Practical Attacks on Masked Hardware: Label: en
  18. A Statistical Saturation Attack against the Block Cipher PRESENT: Label: en
  19. Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security: Label: en
  20. Speeding up Collision Search for Byte-Oriented Hash Functions: Label: en
  21. Divisible On-Line/Off-Line Signatures: Label: en
  22. Short Redactable Signatures Using Random Trees: Label: en
  23. Adaptively Secure Two-Party Computation with Erasures: Label: en
  24. Statistically Hiding Sets: Label: en
  25. Key Insulation and Intrusion Resilience over a Public Channel: Label: en
  26. Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1: Label: en
  27. Attacks on the DECT Authentication Mechanisms: Label: en
  28. Universally Anonymous IBE Based on the Quadratic Residuosity Assumption: Label: en
  29. An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations: Label: en
  30. Adaptive-ID Secure Revocable Identity-Based Encryption: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)