Pages that link to "Item:Q2942821"
From MaRDI portal
The following pages link to Information Security and Cryptology - ICISC 2014 (Q2942821):
Displayed 24 items.
- General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA (Q2942822) (← links)
- On the Security of Distributed Multiprime RSA (Q2942824) (← links)
- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs (Q2942825) (← links)
- Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme (Q2942826) (← links)
- Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree $$1$$ (Q2942827) (← links)
- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks (Q2942828) (← links)
- A Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice Vectors (Q2942829) (← links)
- How Much Can Complexity of Linear Cryptanalysis Be Reduced? (Q2942831) (← links)
- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers (Q2942832) (← links)
- Bicliques with Minimal Data and Time Complexity for AES (Q2942833) (← links)
- Fault Analysis on SIMON Family of Lightweight Block Ciphers (Q2942835) (← links)
- A Clustering Approach for Privacy-Preserving in Social Networks (Q2942836) (← links)
- Securely Solving Classical Network Flow Problems (Q2942837) (← links)
- Remote IP Protection Using Timing Channels (Q2942840) (← links)
- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 (Q2942841) (← links)
- LSH: A New Fast Secure Hash Function Family (Q2942842) (← links)
- Lossless Data Hiding for Binary Document Images Using $$n$$-Pairs Pattern (Q2942844) (← links)
- Montgomery Modular Multiplication on ARM-NEON Revisited (Q2942845) (← links)
- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function (Q2942846) (← links)
- Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols (Q2942847) (← links)
- Compact and Efficient UC Commitments Under Atomic-Exchanges (Q2942848) (← links)
- Issuer-Free Adaptive Oblivious Transfer with Access Policy (Q2942849) (← links)
- Memory Address Side-Channel Analysis on Exponentiation (Q2942850) (← links)
- Mutant Differential Fault Analysis of Trivium MDFA (Q2942851) (← links)