The following pages link to (Q3191615):
Displayed 31 items.
- On the complexity of the herding attack and some related attacks on hash functions (Q420639) (← links)
- A geometric protocol for cryptography with cards (Q488255) (← links)
- Undeniable signature scheme based over group ring (Q505668) (← links)
- Searchable symmetric encryption over multiple servers (Q680933) (← links)
- On the gold standard for security of universal steganography (Q1648780) (← links)
- Random oracles and non-uniformity (Q1648794) (← links)
- Isolated elliptic curves and the MOV attack (Q1676235) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? (Q2018816) (← links)
- Distinguishing attack on the NTRUCipher encryption scheme (Q2103761) (← links)
- Tightness subtleties for multi-user PKE notions (Q2149787) (← links)
- High throughput secure MPC over small population in hybrid networks (extended abstract) (Q2152069) (← links)
- Private computation of polynomials over networks (Q2169792) (← links)
- An improved parallel block Lanczos algorithm over GF(2) for integer factorization (Q2292923) (← links)
- Cryptography and algorithmic randomness (Q2354584) (← links)
- Efficient cryptosystems from \(2^k\)-th power residue symbols (Q2397448) (← links)
- LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication (Q2630799) (← links)
- Memory Erasability Amplification (Q2827713) (← links)
- How to Prove Knowledge of Small Secrets (Q2829957) (← links)
- Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing (Q2953856) (← links)
- Multi-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -Based (Q2980857) (← links)
- Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions (Q3008350) (← links)
- Reconstructing Generalized Staircase Polygons with Uniform Step Length (Q4625103) (← links)
- Verifiable Range Query Processing for Cloud Computing (Q5056027) (← links)
- An asymmetric dynamic multiparty quantum secret sharing against active attacks (Q5114383) (← links)
- Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited (Q5267415) (← links)
- Access Control Encryption for Equality, Comparison, and More (Q5738753) (← links)
- Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack (Q5738887) (← links)
- Magic Adversaries Versus Individual Reduction: Science Wins Either Way (Q5738980) (← links)
- Multiparty generation of an RSA modulus (Q5970801) (← links)
- Categorical composable cryptography: extended version (Q6178713) (← links)