„68P25“
Suchergebnisse
1.000+ Treffer
-
Signcryption schemes with insider security in an ideal permutation model
-
New methods of construction of cartesian authentication codes from geometries over finite commutative rings
-
(In) Security of Ring-LWE Under Partial Key Exposure
-
On the optimality of non-linear computations for symmetric key primitives
-
A fundamental flaw in the ++AE authenticated encryption mode
-
Towards a Ring Analogue of the Leftover Hash Lemma
-
Efficiently Processing Complex-Valued Data in Homomorphic Encryption
-
New approach to practical leakage-resilient public-key cryptography
-
Rigorous upper bounds on data complexities of block cipher cryptanalysis
-
Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis
-
Security analysis of Modified Rivest Scheme
-
Another look at normal approximations in cryptanalysis
-
A secure anonymous proxy signcryption scheme
-
Dynamic-FROST: Schnorr threshold signatures with a flexible committee
-
A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble
-
New probabilistic public-key encryption based on the RSA cryptosystem
-
Differential experiments using parallel alternative operations
-
mR LWE -CP-ABE: A revocable CP-ABE for post-quantum cryptography
-
Provable security against generic attacks on stream ciphers
-
A construction of encryption protocols over some semidirect products