Pages that link to "Item:Q5756519"
From MaRDI portal
The following pages link to Public Key Cryptography – PKC 2007 (Q5756519):
Displaying 31 items.
- A Direct Anonymous Attestation Scheme for Embedded Devices (Q5756520) (← links)
- Full-Domain Subgroup Hiding and Constant-Size Group Signatures (Q5756521) (← links)
- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures (Q5756522) (← links)
- Anonymous Signatures Made Easy (Q5756523) (← links)
- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions (Q5756524) (← links)
- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 (Q5756525) (← links)
- New Chosen-Ciphertext Attacks on NTRU (Q5756526) (← links)
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol (Q5756527) (← links)
- Optimistic Fair Exchange in a Multi-user Setting (Q5756528) (← links)
- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures (Q5756529) (← links)
- Knowledge-Binding Commitments with Applications in Time-Stamping (Q5756530) (← links)
- Traceable Ring Signature (Q5756531) (← links)
- Efficient Ring Signatures Without Random Oracles (Q5756532) (← links)
- Improved On-Line/Off-Line Threshold Signatures (Q5756533) (← links)
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles (Q5756535) (← links)
- Cryptanalysis of HFE with Internal Perturbation (Q5756536) (← links)
- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems (Q5756537) (← links)
- ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography (Q5756538) (← links)
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman (Q5756539) (← links)
- Multi-bit Cryptosystems Based on Lattice Problems (Q5756540) (← links)
- Parallel Key-Insulated Public Key Encryption Without Random Oracles (Q5756541) (← links)
- Practical and Secure Solutions for Integer Comparison (Q5756542) (← links)
- Verifiable Shuffle of Large Size Ciphertexts (Q5756543) (← links)
- Identity-Based Traitor Tracing (Q5756544) (← links)
- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol (Q5756545) (← links)
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications (Q5756546) (← links)
- Fast Batch Verification of Multiple Signatures (Q5756547) (← links)
- Efficient Pseudorandom Generators Based on the DDH Assumption (Q5756548) (← links)
- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA (Q5756549) (← links)
- Self-Generated-Certificate Public Key Encryption Without Pairing (Q5756550) (← links)
- A Closer Look at PKI: Security and Efficiency (Q5756551) (← links)