Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 26 results in range #1 to #26.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. On Fast Verification of Hash Chains: Label: en
  2. The Sum of CBC MACs Is a Secure PRF: Label: en
  3. Rebound Attacks on the Reduced Grøstl Hash Function: Label: en
  4. Practical Key Recovery Attack against Secret-IV Edon- $\mathcal R$: Label: en
  5. Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited: Label: en
  6. Linear Cryptanalysis of Reduced-Round PRESENT: Label: en
  7. Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness: Label: en
  8. Hash Function Combiners in TLS and SSL: Label: en
  9. Usable Optimistic Fair Exchange: Label: en
  10. Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs: Label: en
  11. Revisiting Higher-Order DPA Attacks:: Label: en
  12. Fault Attacks Against emv Signatures: Label: en
  13. Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks: Label: en
  14. On Extended Sanitizable Signature Schemes: Label: en
  15. Making the Diffie-Hellman Protocol Identity-Based: Label: en
  16. Anonymity from Asymmetry: New Constructions for Anonymous HIBE: Label: en
  17. Efficient CCA-Secure PKE from Identity-Based Techniques: Label: en
  18. Probabilistic Public Key Encryption with Equality Test: Label: en
  19. Refinement of Miller’s Algorithm Over Edwards Curves: Label: en
  20. High-Speed Parallel Software Implementation of the η T Pairing: Label: en
  21. Speed Records for NTRU: Label: en
  22. Plaintext-Awareness of Hybrid Encryption: Label: en
  23. Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine: Label: en
  24. Efficient CRT-RSA Decryption for Small Encryption Exponents: Label: en
  25. Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries: Label: en
  26. The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)