The following pages link to Jacob C. N. Schuldt (Q278729):
Displayed 29 items.
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency (Q278732) (← links)
- Token-based multi-input functional encryption (Q1616650) (← links)
- Related randomness security for public key encryption, revisited (Q1749285) (← links)
- Statistical attacks on cookie masking for RC4 (Q1749793) (← links)
- Item:Q278729 (redirect page) (← links)
- Secure multi-party computation using polarizing cards (Q1800599) (← links)
- Efficient two-party exponentiation from quotient transfer (Q2096636) (← links)
- Field extension in secret-shared form and its applications to efficient secure computation (Q2183935) (← links)
- Wildcarded identity-based encryption (Q2429713) (← links)
- Maliciously circuit-private multi-key FHE and MPC based on LWE (Q2701482) (← links)
- On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks (Q2806759) (← links)
- Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results (Q2835595) (← links)
- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication (Q2900221) (← links)
- On the Security of Dynamic Group Signatures: Preventing Signature Hijacking (Q2900254) (← links)
- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups (Q2914302) (← links)
- Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper) (Q2938856) (← links)
- Plaintext Recovery Attacks Against WPA/TKIP (Q2946917) (← links)
- Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks (Q3011312) (← links)
- On-line Non-transferable Signatures Revisited (Q3084359) (← links)
- On the Joint Security of Encryption and Signature, Revisited (Q3102184) (← links)
- Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions (Q3194590) (← links)
- Security Against Related Randomness Attacks via Reconstructive Extractors (Q3460096) (← links)
- Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards (Q3467159) (← links)
- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards (Q3608925) (← links)
- Efficient Constructions of Signcryption Schemes and Signcryption Composability (Q3652329) (← links)
- Related Randomness Attacks for Public Key Encryption (Q5402988) (← links)
- Proxy Signatures Secure Against Proxy Key Exposure (Q5445451) (← links)
- Efficient Identity-Based Signatures Secure in the Standard Model (Q5757700) (← links)
- Forward-secure public key encryption without key update from proof-of-stake blockchain (Q6157602) (← links)