Pages that link to "Item:Q3623030"
From MaRDI portal
The following pages link to Topics in Cryptology – CT-RSA 2009 (Q3623030):
Displaying 30 items.
- Adaptive-ID Secure Revocable Identity-Based Encryption (Q3623031) (← links)
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations (Q3623032) (← links)
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption (Q3623033) (← links)
- Attacks on the DECT Authentication Mechanisms (Q3623034) (← links)
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 (Q3623036) (← links)
- Key Insulation and Intrusion Resilience over a Public Channel (Q3623037) (← links)
- Statistically Hiding Sets (Q3623038) (← links)
- Adaptively Secure Two-Party Computation with Erasures (Q3623039) (← links)
- Short Redactable Signatures Using Random Trees (Q3623041) (← links)
- Divisible On-Line/Off-Line Signatures (Q3623042) (← links)
- Speeding up Collision Search for Byte-Oriented Hash Functions (Q3623043) (← links)
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security (Q3623044) (← links)
- A Statistical Saturation Attack against the Block Cipher PRESENT (Q3623045) (← links)
- Practical Attacks on Masked Hardware (Q3623046) (← links)
- Cryptanalysis of CTC2 (Q3623047) (← links)
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model (Q3623048) (← links)
- Square, a New Multivariate Encryption Scheme (Q3623049) (← links)
- Communication-Efficient Private Protocols for Longest Common Subsequence (Q3623051) (← links)
- Key-Private Proxy Re-encryption (Q3623052) (← links)
- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems (Q3623053) (← links)
- Practical Short Signature Batch Verification (Q3623054) (← links)
- Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity (Q3623056) (← links)
- Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients (Q3623057) (← links)
- Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values (Q3623058) (← links)
- Local Sequentiality Does Not Help for Concurrent Composition (Q3623059) (← links)
- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening (Q3623060) (← links)
- Strengthening Security of RSA-OAEP (Q3623061) (← links)
- Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable (Q3623063) (← links)
- Fault Analysis Attack against an AES Prototype Chip Using RSL (Q3623065) (← links)
- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation (Q3623066) (← links)