Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 24 results in range #1 to #24.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. An Improved Fault Based Attack of the Advanced Encryption Standard: Label: en
  2. On Modular Decomposition of Integers: Label: en
  3. Fast Elliptic-Curve Cryptography on the Cell Broadband Engine: Label: en
  4. Exponent Recoding and Regular Exponentiation Algorithms: Label: en
  5. Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions: Label: en
  6. Another Look at Extended Private Information Retrieval Protocols: Label: en
  7. Co-sound Zero-Knowledge with Public Keys: Label: en
  8. Unifying Zero-Knowledge Proofs of Knowledge: Label: en
  9. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness: Label: en
  10. Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps: Label: en
  11. Anonymity from Public Key Encryption to Undeniable Signatures: Label: en
  12. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems: Label: en
  13. Certified Encryption Revisited: Label: en
  14. Practical Threshold Signatures with Linear Secret Sharing Schemes: Label: en
  15. On the Theoretical Gap between Group Signatures with and without Unlinkability: Label: en
  16. A Schnorr-Like Lightweight Identity-Based Signature Scheme: Label: en
  17. New RSA-Based (Selectively) Convertible Undeniable Signature Schemes: Label: en
  18. Cryptanalysis of RSA Using the Ratio of the Primes: Label: en
  19. Reducing Key Length of the McEliece Cryptosystem: Label: en
  20. Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks: Label: en
  21. Generic Attacks on Feistel Networks with Internal Permutations: Label: en
  22. Two Passes of Tiger Are Not One-Way: Label: en
  23. Cryptanalysis of Vortex: Label: en
  24. Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)