Pages that link to "Item:Q5465805"
From MaRDI portal
The following pages link to Advances in Cryptology - ASIACRYPT 2004 (Q5465805):
Displaying 35 items.
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds (Q5465806) (← links)
- Practical Two-Party Computation Based on the Conditional Gate (Q5465807) (← links)
- Privacy in Non-private Environments (Q5465808) (← links)
- Asynchronous Proactive Cryptosystems Without Agreement (Q5465809) (← links)
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes (Q5465810) (← links)
- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions (Q5465811) (← links)
- Higher Order Universal One-Way Hash Functions (Q5465812) (← links)
- The MD2 Hash Function Is Not One-Way (Q5465813) (← links)
- New Approaches to Password Authenticated Key Exchange Based on RSA (Q5465814) (← links)
- Constant-Round Authenticated Group Key Exchange for Dynamic Groups (Q5465815) (← links)
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates (Q5465816) (← links)
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC (Q5465817) (← links)
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices (Q5465818) (← links)
- Secret Handshakes from CA-Oblivious Encryption (Q5465819) (← links)
- k-Times Anonymous Authentication (Extended Abstract) (Q5465820) (← links)
- The XL-Algorithm and a Conjecture from Commutative Algebra (Q5465821) (← links)
- Comparison Between XL and Gröbner Basis Algorithms (Q5465822) (← links)
- Generic Homomorphic Undeniable Signatures (Q5465823) (← links)
- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings (Q5465824) (← links)
- On the Security of MOR Public Key Cryptosystem (Q5465826) (← links)
- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice (Q5465827) (← links)
- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes (Q5465828) (← links)
- How Far Can We Go Beyond Linear Cryptanalysis? (Q5465830) (← links)
- The Davies-Murphy Power Attack (Q5465831) (← links)
- Time-Memory Trade-Off Attacks on Multiplications and T-Functions (Q5465832) (← links)
- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 (Q5465833) (← links)
- On Provably Secure Time-Stamping Schemes (Q5465834) (← links)
- Strong Conditional Oblivious Transfer and Computing on Intervals (Q5465835) (← links)
- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge (Q5465836) (← links)
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles (Q5465837) (← links)
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding (Q5465838) (← links)
- Stream Ciphers: Dead or Alive? (Q5465839) (← links)
- On the Generalized Linear Equivalence of Functions Over Finite Fields (Q5465840) (← links)
- Sieving Using Bucket Sort (Q5465841) (← links)
- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups (Q5465842) (← links)