The following pages link to (Q4940698):
Displayed 23 items.
- Programmable hash functions and their applications (Q434345) (← links)
- Unintended features of APIs: cryptanalysis of incremental HMAC (Q832351) (← links)
- Reasoning about XML update constraints (Q923878) (← links)
- Synthesizers and their application to the parallel construction of pseudo-random functions (Q1288205) (← links)
- Coding for locality in reconstructing permutations (Q1696052) (← links)
- Analysis and improvement of an authentication scheme in incremental cryptography (Q1726662) (← links)
- Incremental deterministic public-key encryption (Q1747660) (← links)
- Identity-based quotable ring signature (Q1750014) (← links)
- Updatable signatures and message authentication codes (Q2061942) (← links)
- Incremental cryptography revisited: PRFs, nonces and modular design (Q2152052) (← links)
- Computing on authenticated data (Q2344052) (← links)
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data (Q2807224) (← links)
- Short Transitive Signatures for Directed Trees (Q2889993) (← links)
- A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation (Q3193251) (← links)
- The Hash Function Family LAKE (Q3525660) (← links)
- Programmable Hash Functions and Their Applications (Q3600211) (← links)
- Short Redactable Signatures Using Random Trees (Q3623041) (← links)
- Rate-Limited Secure Function Evaluation: Definitions and Constructions (Q4916025) (← links)
- Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software (Q5270360) (← links)
- Fast Interactive Coding against Adversarial Noise (Q5501938) (← links)
- Cryptography with Updates (Q5738983) (← links)
- Sanitizable Signatures (Q5862665) (← links)
- IQRA: Incremental Quadratic Re-keying friendly Authentication scheme (Q5871457) (← links)