Pages that link to "Item:Q2900204"
From MaRDI portal
The following pages link to Public Key Cryptography – PKC 2012 (Q2900204):
Displaying 42 items.
- Better Bootstrapping in Fully Homomorphic Encryption (Q2900205) (← links)
- Polly Cracker, Revisited, Revisited (Q2900206) (← links)
- Ring-LWE in Polynomial Rings (Q2900207) (← links)
- On Homomorphic Encryption and Chosen-Ciphertext Security (Q2900208) (← links)
- Waters Signatures with Optimal Security Reduction (Q2900209) (← links)
- Strong Security from Probabilistic Signature Schemes (Q2900210) (← links)
- Space Efficient Signature Schemes from the RSA Assumption (Q2900211) (← links)
- The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles (Q2900212) (← links)
- Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes (Q2900213) (← links)
- Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited (Q2900215) (← links)
- Public-Key Identification Schemes Based on Multivariate Cubic Polynomials (Q2900217) (← links)
- Public-Key Cryptography from New Multivariate Quadratic Assumptions (Q2900218) (← links)
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model (Q2900219) (← links)
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts (Q2900220) (← links)
- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication (Q2900221) (← links)
- Public Key Encryption against Related Key Attacks (Q2900222) (← links)
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices (Q2900223) (← links)
- Variants of Waters’ Dual System Primitives Using Asymmetric Pairings (Q2900224) (← links)
- From Selective to Full Security: Semi-generic Transformations in the Standard Model (Q2900225) (← links)
- Circular and KDM Security for Identity-Based Encryption (Q2900226) (← links)
- NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model (Q2900227) (← links)
- Generating Provable Primes Efficiently on Embedded Devices (Q2900229) (← links)
- Password-Based Authenticated Key Exchange (Q2900230) (← links)
- Constant-Round Multi-party Private Set Union Using Reversed Laurent Series (Q2900231) (← links)
- Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies (Q2900233) (← links)
- Efficiently Shuffling in Public (Q2900234) (← links)
- Efficient Password Authenticated Key Exchange via Oblivious Transfer (Q2900235) (← links)
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices (Q2900236) (← links)
- Relatively-Sound NIZKs and Password-Based Key-Exchange (Q2900237) (← links)
- Multi-location Leakage Resilient Cryptography (Q2900239) (← links)
- On Definitions of Selective Opening Security (Q2900240) (← links)
- New Definitions and Separations for Circular Security (Q2900241) (← links)
- Correlated Product Security from Any One-Way Function (Q2900242) (← links)
- Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms (Q2900243) (← links)
- Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve (Q2900246) (← links)
- Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods (Q2900247) (← links)
- Extended-DDH and Lossy Trapdoor Functions (Q2900248) (← links)
- DDH-Like Assumptions Based on Extension Rings (Q2900250) (← links)
- Security of Blind Signatures Revisited (Q2900251) (← links)
- Efficient Network Coding Signatures in the Standard Model (Q2900252) (← links)
- Improved Security for Linearly Homomorphic Signatures: A Generic Framework (Q2900253) (← links)
- On the Security of Dynamic Group Signatures: Preventing Signature Hijacking (Q2900254) (← links)