Pages that link to "Item:Q2799002"
From MaRDI portal
The following pages link to Topics in Cryptology - CT-RSA 2016 (Q2799002):
Displaying 26 items.
- Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions (Q2799003) (← links)
- Strongly Leakage-Resilient Authenticated Key Exchange (Q2799004) (← links)
- INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes (Q2799005) (← links)
- From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS (Q2799006) (← links)
- Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption (Q2799007) (← links)
- Private Large-Scale Databases with Distributed Searchable Symmetric Encryption (Q2799008) (← links)
- Short Randomizable Signatures (Q2799009) (← links)
- Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability (Q2799010) (← links)
- Hybrid Publicly Verifiable Computation (Q2799011) (← links)
- Efficient Concurrent Covert Computation of String Equality and Set Intersection (Q2799012) (← links)
- Secure Audit Logs with Verifiable Excerpts (Q2799013) (← links)
- Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles (Q2799014) (← links)
- ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs (Q2799015) (← links)
- Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones (Q2799017) (← links)
- Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability (Q2799018) (← links)
- Towards a Unified Security Model for Physically Unclonable Functions (Q2799019) (← links)
- Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014 (Q2799020) (← links)
- Short Structure-Preserving Signatures (Q2799021) (← links)
- Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? (Q2799023) (← links)
- NFLlib: NTT-Based Fast Lattice Library (Q2799029) (← links)
- Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling (Q2799030) (← links)
- New Observations on Piccolo Block Cipher (Q2799031) (← links)
- Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$ (Q2799032) (← links)
- Constrained PRFs for Unbounded Inputs (Q2799033) (← links)
- Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes (Q2799035) (← links)
- Factoring $$N=p^rq^s$$ for Large r and s (Q2799036) (← links)