Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 35 results in range #1 to #35.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups: Label: en
  2. Sieving Using Bucket Sort: Label: en
  3. On the Generalized Linear Equivalence of Functions Over Finite Fields: Label: en
  4. Stream Ciphers: Dead or Alive?: Label: en
  5. OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding: Label: en
  6. Towards Plaintext-Aware Public-Key Encryption Without Random Oracles: Label: en
  7. Improved Setup Assumptions for 3-Round Resettable Zero Knowledge: Label: en
  8. Strong Conditional Oblivious Transfer and Computing on Intervals: Label: en
  9. On Provably Secure Time-Stamping Schemes: Label: en
  10. Cryptanalysis of Bluetooth Keystream Generator Two-Level E0: Label: en
  11. Time-Memory Trade-Off Attacks on Multiplications and T-Functions: Label: en
  12. The Davies-Murphy Power Attack: Label: en
  13. How Far Can We Go Beyond Linear Cryptanalysis?: Label: en
  14. Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes: Label: en
  15. Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice: Label: en
  16. On the Security of MOR Public Key Cryptosystem: Label: en
  17. Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings: Label: en
  18. Generic Homomorphic Undeniable Signatures: Label: en
  19. Comparison Between XL and Gröbner Basis Algorithms: Label: en
  20. The XL-Algorithm and a Conjecture from Commutative Algebra: Label: en
  21. k-Times Anonymous Authentication (Extended Abstract): Label: en
  22. Secret Handshakes from CA-Oblivious Encryption: Label: en
  23. Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices: Label: en
  24. Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC: Label: en
  25. A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates: Label: en
  26. Constant-Round Authenticated Group Key Exchange for Dynamic Groups: Label: en
  27. New Approaches to Password Authenticated Key Exchange Based on RSA: Label: en
  28. The MD2 Hash Function Is Not One-Way: Label: en
  29. Higher Order Universal One-Way Hash Functions: Label: en
  30. Masking Based Domain Extenders for UOWHFs: Bounds and Constructions: Label: en
  31. Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes: Label: en
  32. Asynchronous Proactive Cryptosystems Without Agreement: Label: en
  33. Privacy in Non-private Environments: Label: en
  34. Practical Two-Party Computation Based on the Conditional Gate: Label: en
  35. On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds: Label: en

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)