Pages that link to "Item:Q4924667"
From MaRDI portal
The following pages link to Progress in Cryptology – AFRICACRYPT 2013 (Q4924667):
Displaying 26 items.
- Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting (Q4924668) (← links)
- GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field (Q4924670) (← links)
- On Constructions of Involutory MDS Matrices (Q4924671) (← links)
- Homomorphic Encryption with Access Policies: Characterization and New Constructions (Q4924673) (← links)
- Brandt’s Fully Private Auction Protocol Revisited (Q4924674) (← links)
- HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems (Q4924675) (← links)
- Attacking AES Using Bernstein’s Attack on Modern Processors (Q4924677) (← links)
- Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model (Q4924678) (← links)
- NaCl on 8-Bit AVR Microcontrollers (Q4924679) (← links)
- W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes (Q4924680) (← links)
- New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs (Q4924681) (← links)
- Cryptanalysis of AES and Camellia with Related S-boxes (Q4924682) (← links)
- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 (Q4924684) (← links)
- Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design (Q4924686) (← links)
- Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority (Q4924688) (← links)
- Impact of Optimized Field Operations AB,AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve (Q4924689) (← links)
- An Attack on RSA Using LSBs of Multiples of the Prime Factors (Q4924690) (← links)
- Modification and Optimisation of an ElGamal-Based PVSS Scheme (Q4924691) (← links)
- Studying a Range Proof Technique — Exception and Optimisation (Q4924692) (← links)
- Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model (Q4924693) (← links)
- Fast Software Encryption Attacks on AES (Q4924695) (← links)
- Sieving for Shortest Vectors in Ideal Lattices (Q4924696) (← links)
- An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection (Q4924698) (← links)
- A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers (Q4924700) (← links)
- On the Expansion Length Of Triple-Base Number Systems (Q4924701) (← links)
- Triple-Base Number System for Scalar Multiplication (Q4924702) (← links)