The following pages link to (Q5310362):
Displaying 50 items.
- Convolutional block codes with cryptographic properties over the semi-direct product \(\mathbb {Z}/N \mathbb {Z} \rtimes \mathbb {Z}/M \mathbb {Z}\) (Q310249) (← links)
- Secret sharing based on quantum Fourier transform (Q356899) (← links)
- A comparison of cryptanalytic tradeoff algorithms (Q380959) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Outsourcing computation: the minimal refereed mechanism (Q777972) (← links)
- Computer algebra tales on Goppa codes and McEliece cryptography (Q782704) (← links)
- Constant-round adaptive zero-knowledge proofs for NP (Q903613) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Secret, verifiable auctions from elections (Q1749541) (← links)
- Publicly verifiable searchable symmetric encryption based on efficient cryptographic components (Q1755999) (← links)
- (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes (Q2055644) (← links)
- Blockchain-based efficient public integrity auditing for cloud storage against malicious auditors (Q2057147) (← links)
- Chosen ciphertext security from injective trapdoor functions (Q2096512) (← links)
- A new post-quantum voting protocol based on physical laws (Q2101594) (← links)
- SE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter (Q2130242) (← links)
- A brief and understandable guide to pseudo-random number generators and specific models for security (Q2137825) (← links)
- Multi-instance publicly verifiable time-lock puzzle and its applications (Q2147261) (← links)
- Reusing nonces in Schnorr signatures (and keeping it secure...) (Q2167718) (← links)
- Improved signature schemes for secure multi-party computation with certified inputs (Q2167761) (← links)
- Modification tolerant signature schemes: location and correction (Q2179378) (← links)
- Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms (Q2306022) (← links)
- Verification of quantum computation: an overview of existing approaches (Q2311888) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Anonymous protocols: notions and equivalence (Q2345446) (← links)
- Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system (Q2353784) (← links)
- Computing minimum length representations of sets of words of uniform length (Q2355702) (← links)
- Private set intersection: new generic constructions and feasibility results (Q2408281) (← links)
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (Q2413618) (← links)
- (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens (Q2423844) (← links)
- Lattice-based completely non-malleable public-key encryption in the standard model (Q2448075) (← links)
- Feistel-inspired scrambling improves the quality of linear congruential generators (Q2628127) (← links)
- Secure and efficient outsourcing computation on large-scale linear regressions (Q2663473) (← links)
- Semi-quantum money (Q2668217) (← links)
- (Q2754890) (← links)
- Foundations of Reconfigurable PUFs (Q2794518) (← links)
- Computing Minimum Length Representations of Sets of Words of Uniform Length (Q2946043) (← links)
- Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy (Q3297522) (← links)
- (Q3413440) (← links)
- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems (Q3600386) (← links)
- Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers (Q4596841) (← links)
- Pattern occurrence statistics and applications to the Ramsey theory of unavoidable patterns (Q4626557) (← links)
- Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression (Q4639486) (← links)
- Provably secure Rabin-p cryptosystem in hybrid setting (Q4989188) (← links)
- Pseudorandom Functions: Three Decades Later (Q5021131) (← links)
- Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More (Q5041173) (← links)
- Format-preserving encryption: a survey (Q5042277) (← links)
- A new distribution version of Boneh-Goh-Nissim cryptosystem : Security and performance analysis (Q5043923) (← links)
- Extending Feistel structure to DNA Cryptography (Q5069709) (← links)
- A digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codes (Q5071487) (← links)
- (Q5150468) (← links)