Pages that link to "Item:Q2801766"
From MaRDI portal
The following pages link to Information and Communications Security (Q2801766):
Displaying 50 items.
- Characterization of the Third Descent Points for the k-error Linear Complexity of $$2^n$$-periodic Binary Sequences (Q2801767) (← links)
- QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations (Q2801768) (← links)
- Strategy of Relations Collection in Factoring RSA Modulus (Q2801769) (← links)
- Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance (Q2801770) (← links)
- Multi-input Functional Encryption and Its Application in Outsourcing Computation (Q2801771) (← links)
- A Multivariate Encryption Scheme with Rainbow (Q2801772) (← links)
- Efficient and Secure Many-to-One Signature Delegation (Q2801773) (← links)
- Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups (Q2801775) (← links)
- A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) Mobility (Q2801776) (← links)
- An Entropy Based Encrypted Traffic Classifier (Q2801779) (← links)
- A Solution of Code Authentication on Android (Q2801780) (← links)
- Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model (Q2920969) (← links)
- Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model (Q2920970) (← links)
- Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure (Q2920971) (← links)
- EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods (Q2920974) (← links)
- Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes (Q2920975) (← links)
- Attacking and Fixing the CS Mode (Q2920976) (← links)
- Integral Attacks on Reduced-Round PRESENT (Q2920977) (← links)
- Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext (Q2920978) (← links)
- Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure (Q2920980) (← links)
- Toward Generic Method for Server-Aided Cryptography (Q2920981) (← links)
- Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One (Q2920982) (← links)
- Threshold Secret Image Sharing (Q2920983) (← links)
- Manger’s Attack Revisited (Q3063953) (← links)
- Horizontal Correlation Analysis on Exponentiation (Q3063954) (← links)
- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts (Q3063955) (← links)
- Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Q3297470) (← links)
- An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test (Q3297472) (← links)
- FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure (Q3297474) (← links)
- SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS (Q3297477) (← links)
- The Reductions for the Approximating Covering Radius Problem (Q3297478) (← links)
- Solving Discrete Logarithm Problem in an Interval Using Periodic Iterates (Q3297479) (← links)
- Distributed Pseudorandom Functions for General Access Structures in NP (Q3297480) (← links)
- Reducing Randomness Complexity of Mask Refreshing Algorithm (Q3297482) (← links)
- A Plausibly Deniable Encryption Scheme Utilizing PUF’s Thermo-Sensitivity (Q3297484) (← links)
- Two Efficient Tag-Based Encryption Schemes on Lattices (Q3297485) (← links)
- Compact (Targeted Homomorphic) Inner Product Encryption from LWE (Q3297486) (← links)
- Compact Inner Product Encryption from LWE (Q3297487) (← links)
- Towards Tightly Secure Deterministic Public Key Encryption (Q3297488) (← links)
- Efficient Inner Product Encryption with Simulation-Based Security (Q3297490) (← links)
- Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation (Q3297492) (← links)
- Practical Large Universe Attribute-Set Based Encryption in the Standard Model (Q3297495) (← links)
- Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption (Q3297496) (← links)
- Identity-Based Group Encryption Revisited (Q3297498) (← links)
- Compact Hierarchical IBE from Lattices in the Standard Model (Q3297499) (← links)
- Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks (Q3297502) (← links)
- New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model (Q3297503) (← links)
- A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys (Q3297504) (← links)
- Practical Range Proof for Cryptocurrency Monero with Provable Security (Q3297505) (← links)
- Modeling Key Infection in Large-Scale Sensor Networks (Q3297507) (← links)