Entity usage
From MaRDI portal
This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.
Showing below up to 42 results in range #1 to #42.
- McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks: Label: en
- Smaller Decoding Exponents: Ball-Collision Decoding: Label: en
- Inverting HFE Systems Is Quasi-Polynomial for All Fields: Label: en
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials: Label: en
- Constant-Rate Oblivious Transfer from Noisy Channels: Label: en
- Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups: Label: en
- Round Optimal Blind Signatures: Label: en
- Authenticated and Misuse-Resistant Encryption of Key-Dependent Data: Label: en
- A New Variant of PMAC: Beyond the Birthday Bound: Label: en
- Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions: Label: en
- The Collision Security of Tandem-DM in the Ideal Cipher Model: Label: en
- Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting: Label: en
- Bi-Deniable Public-Key Encryption: Label: en
- Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages: Label: en
- Fully Homomorphic Encryption over the Integers with Shorter Public Keys: Label: en
- Tor and Circumvention: Lessons Learned: Label: en
- Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions: Label: en
- Analyzing Blockwise Lattice Algorithms Using Dynamical Systems: Label: en
- Position-Based Quantum Cryptography: Impossibility and Constructions: Label: en
- Classical Cryptographic Protocols in a Quantum World: Label: en
- Merkle Puzzles in a Quantum World: Label: en
- Cryptography with Tamperable and Leaky Memory: Label: en
- Generic Side-Channel Distinguishers: Improvements and Limitations: Label: en
- Key-Evolution Schemes Resilient to Space-Bounded Leakage: Label: en
- A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework: Label: en
- Leakage-Resilient Zero Knowledge: Label: en
- 1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds: Label: en
- The IPS Compiler: Optimizations, Variants and Concrete Efficiency: Label: en
- Perfectly-Secure Multiplication for Any t < n/3: Label: en
- The PHOTON Family of Lightweight Hash Functions: Label: en
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack: Label: en
- How to Improve Rebound Attacks: Label: en
- Automatic Search of Attacks on Round-Reduced AES and Applications: Label: en
- Memory Delegation: Label: en
- Secure Computation on the Web: Computing without Simultaneous Interaction: Label: en
- Verifiable Delegation of Computation over Large Datasets: Label: en
- Optimal Verification of Operations on Dynamic Sets: Label: en
- Computer-Aided Security Proofs for the Working Cryptographer: Label: en
- Physically Uncloneable Functions in the Universal Composition Framework: Label: en
- Time-Lock Puzzles in the Random Oracle Model: Label: en
- Random Oracle Reducibility: Label: en
- Leftover Hash Lemma, Revisited: Label: en