The following pages link to (Q4035708):
Displaying 16 items.
- Attacks on quantum key distribution protocols that employ non-ITS authentication (Q265393) (← links)
- Using quantum key distribution for cryptographic purposes: a survey (Q477173) (← links)
- Direct proof of security of Wegman-Carter authentication with partially known key (Q479440) (← links)
- Sharp lower bounds on the extractable randomness from non-uniform sources (Q719242) (← links)
- Combinatorial techniques for universal hashing (Q1329163) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- Perennial secure multi-party computation of universal Turing machine (Q1737594) (← links)
- Revisiting construction of online cipher in hash-ECB-hash structure (Q2057180) (← links)
- Verifiable quantum key exchange with authentication (Q2241007) (← links)
- Key-leakage evaluation of authentication in quantum key distribution with finite resources (Q2454246) (← links)
- Authenticating ad hoc networks by comparison of short digests (Q2482445) (← links)
- On Privacy-Preserving Biometric Authentication (Q2980853) (← links)
- Коды аутентификации с секретностью (обзор) (Q3381884) (← links)
- Universal Hashing and Multiple Authentication (Q3452336) (← links)
- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography (Q3600371) (← links)
- Об одном семействе универсальных функций хеширования (Q5152401) (← links)