Pages that link to "Item:Q5458928"
From MaRDI portal
The following pages link to Topics in Cryptology – CT-RSA 2008 (Q5458928):
Displaying 27 items.
- Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack (Q5458929) (← links)
- Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes (Q5458930) (← links)
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks (Q5458931) (← links)
- Efficient Fully-Simulatable Oblivious Transfer (Q5458932) (← links)
- Separation Results on the “One-More” Computational Problems (Q5458933) (← links)
- An Efficient Protocol for Fair Secure Two-Party Computation (Q5458934) (← links)
- Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles (Q5458935) (← links)
- Legally-Enforceable Fairness in Secure Two-Party Computation (Q5458936) (← links)
- Security of NMAC and HMAC Based on Non-malleability (Q5458937) (← links)
- Aggregate Message Authentication Codes (Q5458938) (← links)
- Boosting AES Performance on a Tiny Processor Core (Q5458939) (← links)
- A Fast and Cache-Timing Resistant Implementation of the AES (Q5458940) (← links)
- Identity-Based Threshold Key-Insulated Encryption without Random Oracles (Q5458941) (← links)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption (Q5458942) (← links)
- Public-Key Encryption with Non-interactive Opening (Q5458943) (← links)
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL (Q5458944) (← links)
- Fault Analysis Study of IDEA (Q5458945) (← links)
- Susceptibility of UHF RFID Tags to Electromagnetic Analysis (Q5458946) (← links)
- Online/Offline Signature Schemes for Devices with Limited Computing Capabilities (Q5458947) (← links)
- RFID Security: Tradeoffs between Security and Efficiency (Q5458948) (← links)
- Program Obfuscation and One-Time Programs (Q5458949) (← links)
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework (Q5458950) (← links)
- Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange (Q5458951) (← links)
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 (Q5458952) (← links)
- Small Secret Key Attack on a Variant of RSA (Due to Takagi) (Q5458953) (← links)
- Super-Efficient Verification of Dynamic Outsourced Databases (Q5458954) (← links)
- A Latency-Free Election Scheme (Q5458955) (← links)