Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 26 results in range #1 to #26.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field: Label: en
  2. Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting: Label: en
  3. Triple-Base Number System for Scalar Multiplication: Label: en
  4. On the Expansion Length Of Triple-Base Number Systems: Label: en
  5. A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers: Label: en
  6. An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection: Label: en
  7. Sieving for Shortest Vectors in Ideal Lattices: Label: en
  8. Fast Software Encryption Attacks on AES: Label: en
  9. Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model: Label: en
  10. Studying a Range Proof Technique — Exception and Optimisation: Label: en
  11. Modification and Optimisation of an ElGamal-Based PVSS Scheme: Label: en
  12. An Attack on RSA Using LSBs of Multiples of the Prime Factors: Label: en
  13. Impact of Optimized Field Operations AB,AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve: Label: en
  14. Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority: Label: en
  15. Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design: Label: en
  16. New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4: Label: en
  17. Cryptanalysis of AES and Camellia with Related S-boxes: Label: en
  18. New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs: Label: en
  19. W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes: Label: en
  20. NaCl on 8-Bit AVR Microcontrollers: Label: en
  21. Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model: Label: en
  22. Attacking AES Using Bernstein’s Attack on Modern Processors: Label: en
  23. HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems: Label: en
  24. Brandt’s Fully Private Auction Protocol Revisited: Label: en
  25. Homomorphic Encryption with Access Policies: Characterization and New Constructions: Label: en
  26. On Constructions of Involutory MDS Matrices: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)