Pages that link to "Item:Q2794489"
From MaRDI portal
The following pages link to Applied Cryptography and Network Security (Q2794489):
Displaying 50 items.
- Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems (Q2794490) (← links)
- Communication-Optimal Proactive Secret Sharing for Dynamic Groups (Q2794492) (← links)
- Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model (Q2794493) (← links)
- Generic Construction of UC-Secure Oblivious Transfer (Q2794494) (← links)
- Non-malleability Under Selective Opening Attacks: Implication and Separation (Q2794495) (← links)
- A Signature Scheme with a Fuzzy Private Key (Q2794497) (← links)
- Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe (Q2794498) (← links)
- Zero-Knowledge Authenticated Order Queries and Order Statistics on a List (Q2794500) (← links)
- Private Database Access with HE-over-ORAM Architecture (Q2794501) (← links)
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures (Q2794502) (← links)
- LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data (Q2794503) (← links)
- Post-Quantum Forward-Secure Onion Routing (Q2794504) (← links)
- Scalable Divisible E-cash (Q2794505) (← links)
- Recovering Lost Device-Bound Credentials (Q2794506) (← links)
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA (Q2794507) (← links)
- Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU (Q2794508) (← links)
- Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher (Q2794511) (← links)
- Cryptographic Enforcement of Information Flow Policies Without Public Information (Q2794512) (← links)
- Optimal Proximity Proofs Revisited (Q2794513) (← links)
- Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents (Q2794514) (← links)
- Differential Power Analysis of a McEliece Cryptosystem (Q2794516) (← links)
- Arithmetic Addition over Boolean Masking (Q2794517) (← links)
- Foundations of Reconfigurable PUFs (Q2794518) (← links)
- mrPUF: A Novel Memristive Device Based Physical Unclonable Function (Q2794521) (← links)
- On the XOR of Multiple Random Permutations (Q2794522) (← links)
- Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks (Q2794524) (← links)
- Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice (Q2794525) (← links)
- Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources (Q2794527) (← links)
- Fuzzy Signatures: Relaxing Requirements and a New Construction (Q2822668) (← links)
- Foundations of Fully Dynamic Group Signatures (Q2822669) (← links)
- A Lattice-Based Group Signature Scheme with Message-Dependent Opening (Q2822670) (← links)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (Q2822671) (← links)
- Legally Fair Contract Signing Without Keystones (Q2822672) (← links)
- More Efficient Constructions for Inner-Product Encryption (Q2822673) (← links)
- Attribute Based Encryption with Direct Efficiency Tradeoff (Q2822674) (← links)
- Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions (Q2822675) (← links)
- Offline Witness Encryption (Q2822676) (← links)
- Deterministic Public-Key Encryption Under Continual Leakage (Q2822678) (← links)
- Better Preprocessing for Secure Multiparty Computation (Q2822679) (← links)
- Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation (Q2822680) (← links)
- Verifiable Multi-party Computation with Perfectly Private Audit Trail (Q2822682) (← links)
- Practical Fault-Tolerant Data Aggregation (Q2822685) (← links)
- Accelerating Homomorphic Computations on Rational Numbers (Q2822686) (← links)
- New Techniques for Non-interactive Shuffle and Range Arguments (Q2822687) (← links)
- Constrained PRFs for Unbounded Inputs with Short Keys (Q2822688) (← links)
- Wide Trail Design Strategy for Binary MixColumns (Q2822689) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- Square Attack on 7-Round Kiasu-BC (Q2822691) (← links)
- On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants (Q2822692) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)