Pages that link to "Item:Q2851310"
From MaRDI portal
The following pages link to Information Security Practice and Experience (Q2851310):
Displaying 50 items.
- Accountable Trapdoor Sanitizable Signatures (Q2851311) (← links)
- A Pre-computable Signature Scheme with Efficient Verification for RFID (Q2894338) (← links)
- Redactable Signatures for Independent Removal of Structure and Content (Q2894340) (← links)
- Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring (Q2894341) (← links)
- Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack (Q2894342) (← links)
- Computational Soundness of Indistinguishability Properties without Computable Parsing (Q2894343) (← links)
- New Impossible Differential Attacks on Camellia (Q2894345) (← links)
- Impossible Differential Attacks on Reduced-Round LBlock (Q2894347) (← links)
- New Truncated Differential Cryptanalysis on 3D Block Cipher (Q2894349) (← links)
- T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings (Q2894351) (← links)
- A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions (Q2894354) (← links)
- Towards Fine-Grained Access Control on Browser Extensions (Q2894355) (← links)
- Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family (Q2894356) (← links)
- High-Entropy Visual Identification for Touch Screen Devices (Q2894358) (← links)
- A Framework for Security Analysis of Key Derivation Functions (Q2894360) (← links)
- On the Equivalence of Two Definitions of Visual Cryptography Scheme (Q2894362) (← links)
- Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing (Q2894363) (← links)
- Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks (Q2894365) (← links)
- iPIN and mTAN for Secure eID Applications (Q2894366) (← links)
- Secure Distributed Computation of the Square Root and Applications (Q2894368) (← links)
- Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization (Q2894372) (← links)
- Structure-Based RSA Fault Attacks (Q2894374) (← links)
- Fault Analysis of the KATAN Family of Block Ciphers (Q2894377) (← links)
- Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher (Q2894378) (← links)
- On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers (Q2894379) (← links)
- Partial Key Exposure on RSA with Private Exponents Larger Than N (Q2894380) (← links)
- Linear Cryptanalysis of Reduced-Round ICEBERG (Q2894381) (← links)
- Overcoming Significant Noise: Correlation-Template-Induction Attack (Q2894383) (← links)
- Public-Key Encryptions Tolerating Adaptive and Composable Adversaries (Q3001858) (← links)
- Encryption Simulatability Reconsidered (Q3001860) (← links)
- Fully Secure Cipertext-Policy Hiding CP-ABE (Q3001861) (← links)
- Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes (Q3001862) (← links)
- New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts (Q3001863) (← links)
- Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems (Q3001865) (← links)
- Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing (Q3001866) (← links)
- Privacy Enhanced Access Control by Means of Policy Blinding (Q3001868) (← links)
- Policy-Based Authentication for Mobile Agents (Q3001869) (← links)
- Lightweight Delegated Subset Test with Privacy Protection (Q3001870) (← links)
- Improving BDD Cryptosystems in General Lattices (Q3001871) (← links)
- Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme (Q3001873) (← links)
- A Novel Group Signature Scheme Based on MPKC (Q3001875) (← links)
- How to Characterize Side-Channel Leakages More Accurately? (Q3001878) (← links)
- New Impossible Differential and Known-Key Distinguishers for the 3D Cipher (Q3001879) (← links)
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits (Q3001880) (← links)
- BCBC: A More Efficient MAC Algorithm (Q3001881) (← links)
- On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs (Q3001882) (← links)
- Short Convertible Undeniable Signature in the Standard Model (Q3001883) (← links)
- A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme (Q3001884) (← links)
- An Efficient Group-Based Secret Sharing Scheme (Q3001887) (← links)
- Traitor Tracing against Public Collaboration (Q3001888) (← links)