Pages that link to "Item:Q2867142"
From MaRDI portal
The following pages link to Advances in Cryptology - ASIACRYPT 2013 (Q2867142):
Displaying 50 items.
- New Generic Attacks against Hash-Based MACs (Q2867143) (← links)
- Cryptanalysis of HMAC/NMAC-Whirlpool (Q2867144) (← links)
- Lattice-Based Group Signatures with Logarithmic Signature Size (Q2867145) (← links)
- The Fiat–Shamir Transformation in a Quantum World (Q2867146) (← links)
- On the Security of One-Witness Blind Signature Schemes (Q2867147) (← links)
- Unconditionally Secure and Universally Composable Commitments from Physical Assumptions (Q2867148) (← links)
- Functional Encryption from (Small) Hardware Tokens (Q2867149) (← links)
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier (Q2867150) (← links)
- Tamper Resilient Circuits: The Adversary at the Gates (Q2867151) (← links)
- Efficient General-Adversary Multi-Party Computation (Q2867152) (← links)
- Fair and Efficient Secure Multiparty Computation with Reputation Systems (Q2867153) (← links)
- Between a Rock and a Hard Place: Interpolating between MPC and FHE (Q2867155) (← links)
- Building Lossy Trapdoor Functions from Lossy Encryption (Q2867156) (← links)
- Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters (Q2867157) (← links)
- Constrained Pseudorandom Functions and Their Applications (Q2867158) (← links)
- Fully Homomorphic Message Authenticators (Q2867159) (← links)
- Non-uniform Cracks in the Concrete: The Power of Free Precomputation (Q2867160) (← links)
- Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild (Q2867164) (← links)
- Naturally Rehearsing Passwords (Q2867165) (← links)
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter (Q2867166) (← links)
- On Continual Leakage of Discrete Log Representations (Q2867167) (← links)
- Hiding the Input-Size in Secure Two-Party Computation (Q2867168) (← links)
- Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique (Q2867169) (← links)
- A Heuristic for Finding Compatible Differential Paths with Application to HAS-160 (Q2867170) (← links)
- Improved Cryptanalysis of Reduced RIPEMD-160 (Q2867171) (← links)
- Limited-Birthday Distinguishers for Hash Functions (Q2867172) (← links)
- On Diamond Structures and Trojan Message Attacks (Q2867173) (← links)
- Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces (Q2867208) (← links)
- Constant-Round Concurrent Zero Knowledge in the Bounded Player Model (Q2867209) (← links)
- Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes (Q2867210) (← links)
- Families of Fast Elliptic Curves from ℚ-curves (Q2867211) (← links)
- Four-Dimensional GLV via the Weil Restriction (Q2867212) (← links)
- Discrete Gaussian Leftover Hash Lemma over Infinite Domains (Q2867213) (← links)
- New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography (Q2867214) (← links)
- Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited (Q2867215) (← links)
- Reset Indifferentiability and Its Consequences (Q2867217) (← links)
- Computational Fuzzy Extractors (Q2867218) (← links)
- Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization (Q2867219) (← links)
- SPHF-Friendly Non-interactive Commitments (Q2867220) (← links)
- Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency (Q2867221) (← links)
- Function-Private Subspace-Membership Encryption and Its Applications (Q2867222) (← links)
- Random Projections, Graph Sparsification, and Differential Privacy (Q2867223) (← links)
- Notions of Black-Box Reductions, Revisited (Q2867224) (← links)
- Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments (Q2867225) (← links)
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 (Q2867226) (← links)
- Key Difference Invariant Bias in Block Ciphers (Q2867228) (← links)
- Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE (Q2867230) (← links)
- A Modular Framework for Building Variable-Input-Length Tweakable Ciphers (Q2867232) (← links)
- Parallelizable and Authenticated Online Ciphers (Q2867233) (← links)
- How to Construct an Ideal Cipher from a Small Set of Public Permutations (Q2867234) (← links)