Pages that link to "Item:Q5307273"
From MaRDI portal
The following pages link to Advances in Cryptology - EUROCRYPT 2004 (Q5307273):
Displaying 50 items.
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy (Q335718) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- Robustly reusable fuzzy extractor with imperfect randomness (Q831183) (← links)
- Two-message statistically sender-private OT from LWE (Q1631337) (← links)
- LWE without modular reduction and improved side-channel attacks against BLISS (Q1633471) (← links)
- On the leakage-resilient key exchange (Q1684049) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Robustly reusable fuzzy extractor from standard assumptions (Q1710686) (← links)
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption (Q1791666) (← links)
- A generic construction of CCA-secure deterministic encryption (Q2011031) (← links)
- Multiparty reusable non-interactive secure computation from LWE (Q2056764) (← links)
- On selective-opening security of deterministic primitives (Q2061952) (← links)
- BETA: biometric-enabled threshold authentication (Q2061958) (← links)
- Wildcarded identity-based encryption from lattices (Q2067630) (← links)
- Analysis and protection of the two-metric helper data scheme (Q2145311) (← links)
- A generic construction of fuzzy signature (Q2151284) (← links)
- Incompressible cryptography (Q2170026) (← links)
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems (Q2175905) (← links)
- Pseudorandom functions in NC class from the standard LWE assumption (Q2243895) (← links)
- Novel updatable identity-based hash proof system and its applications (Q2283028) (← links)
- Identity-based encryption with leakage-amplified chosen-ciphertext attacks security (Q2290636) (← links)
- Leakage-resilient biometric-based remote user authentication with fuzzy extractors (Q2304568) (← links)
- A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion (Q2318177) (← links)
- Continuous leakage-resilient identity-based encryption with leakage amplification (Q2324786) (← links)
- Efficient cryptosystems from \(2^k\)-th power residue symbols (Q2397448) (← links)
- The generic construction of continuous leakage-resilient identity-based cryptosystems (Q2632014) (← links)
- Public-key encryption scheme with optimal continuous leakage resilience (Q2680220) (← links)
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security (Q2690521) (← links)
- Circular security is complete for KDM security (Q2692344) (← links)
- Fuzzy asymmetric password-authenticated key exchange (Q2692404) (← links)
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy (Q2697881) (← links)
- Direct computation of branching programs and its applications to more efficient lattice-based cryptography (Q2698337) (← links)
- A Signature Scheme with a Fuzzy Private Key (Q2794497) (← links)
- mrPUF: A Novel Memristive Device Based Physical Unclonable Function (Q2794521) (← links)
- Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks (Q2807195) (← links)
- FHE Circuit Privacy Almost for Free (Q2829211) (← links)
- The Chain Rule for HILL Pseudoentropy, Revisited (Q2946442) (← links)
- Security Analysis of PRINCE (Q2946873) (← links)
- Information Theoretic Security for Encryption Based on Conditional Rényi Entropies (Q2948257) (← links)
- Detecting Algebraic Manipulation in Leaky Storage Systems (Q2953813) (← links)
- Bounded-Retrieval Model with Keys Derived from Private Data (Q2980861) (← links)
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation (Q2980862) (← links)
- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA (Q2988331) (← links)
- Lossy Key Encapsulation Mechanism and Its Applications (Q2988341) (← links)
- Quantitative Information Flow and Applications to Differential Privacy (Q3092184) (← links)
- Efficient Threshold Encryption from Lossy Trapdoor Functions (Q3102790) (← links)
- Pseudoentropy: Lower-Bounds for Chain Rules and Transformations (Q3179357) (← links)
- Deniable Attribute Based Encryption for Branching Programs from LWE (Q3181031) (← links)
- A PUF and Software Collaborative Key Protection Scheme (Q3297509) (← links)
- Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting (Q3297618) (← links)