Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 38 results in range #1 to #38.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. On the Security of the Pre-shared Key Ciphersuites of TLS: Label: en
  2. Cross-Domain Secure Computation: Label: en
  3. Fine-Tuning Groth-Sahai Proofs: Label: en
  4. Practical Covert Authentication: Label: en
  5. Traceable Group Encryption: Label: en
  6. On Minimal Assumptions for Sender-Deniable Public Key Encryption: Label: en
  7. General Impossibility of Group Homomorphic Encryption in the Quantum World: Label: en
  8. Generalizing Homomorphic MACs for Arithmetic Circuits: Label: en
  9. Policy-Based Signatures: Label: en
  10. Functional Signatures and Pseudorandom Functions: Label: en
  11. Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks: Label: en
  12. Related Randomness Attacks for Public Key Encryption: Label: en
  13. Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions: Label: en
  14. Lazy Modulus Switching for the BKW Algorithm on LWE: Label: en
  15. Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice: Label: en
  16. Solving Random Subset Sum Problem by l p -norm SVP Oracle: Label: en
  17. On the Lossiness of the Rabin Trapdoor Function: Label: en
  18. Leakage-Resilient Signatures with Graceful Degradation: Label: en
  19. Lattice-Based Group Signature Scheme with Verifier-Local Revocation: Label: en
  20. Enhanced Chosen-Ciphertext Security and Applications: Label: en
  21. Scale-Invariant Fully Homomorphic Encryption over the Integers: Label: en
  22. Online/Offline Attribute-Based Encryption: Label: en
  23. A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption: Label: en
  24. Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts: Label: en
  25. Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications: Label: en
  26. Discrete Logarithm in GF(2809) with FFS: Label: en
  27. Elliptic and Hyperelliptic Curves: A Practical Security Analysis: Label: en
  28. Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences: Label: en
  29. Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting: Label: en
  30. Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing: Label: en
  31. Verifiable Oblivious Storage: Label: en
  32. Verifiable Set Operations over Outsourced Databases: Label: en
  33. Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices: Label: en
  34. Proxy Re-encryption from Lattices: Label: en
  35. Chosen Ciphertext Security via UCE: Label: en
  36. A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme: Label: en
  37. Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing: Label: en
  38. Simple Chosen-Ciphertext Security from Low-Noise LPN: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)