Pages that link to "Item:Q2988327"
From MaRDI portal
The following pages link to Information Security and Cryptology – ICISC 2016 (Q2988327):
Displaying 17 items.
- A Secure Group-Based AKA Protocol for Machine-Type Communications (Q2988328) (← links)
- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA (Q2988331) (← links)
- A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ (Q2988333) (← links)
- Analysis of Error Terms of Signatures Based on Learning with Errors (Q2988339) (← links)
- Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups (Q2988340) (← links)
- Lossy Key Encapsulation Mechanism and Its Applications (Q2988341) (← links)
- Expanded Framework for Dual System Encryption and Its Application (Q2988343) (← links)
- Adaptively Secure Broadcast Encryption with Dealership (Q2988344) (← links)
- A New Algorithm for Residue Multiplication Modulo $$2^{521}-1$$ (Q2988345) (← links)
- Enhancing Data Parallelism of Fully Homomorphic Encryption (Q2988346) (← links)
- An Improvement of Optimal Ate Pairing on KSS Curve with Pseudo 12-Sparse Multiplication (Q2988347) (← links)
- Revisiting the Cubic UOV Signature Scheme (Q2988348) (← links)
- Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model (Q2988350) (← links)
- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness (Q2988351) (← links)
- Improved Results on Cryptanalysis of Prime Power RSA (Q2988352) (← links)
- On Computing the Immunity of Boolean Power Functions Against Fast Algebraic Attacks (Q2988353) (← links)
- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round (Q2988354) (← links)