Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Searchable Encryption
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control
Improved Security Model for Public-key Authenticated Encryption with Keyword Search
Public Key Encryption with Fuzzy Matching
Partitioned Searchable Encryption
Key Exchange & Zero Knowledge Proof
Key Exposure Resistant Group Key Agreement Protocol
NIKE from Affine Determinant Programs
OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss
Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model
Post Quantum Cryptography
Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ
On the (M)iNTRU assumption in the integer case
Functional Encryption
Verifiable Functional Encryption using Intel SGX
Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys
Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges
Digital Signature
A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model
Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme
Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies
Linearly Homomorphic Signatures with Designated Combiner
Efficient Attribute-Based Signature for monotone predicates
Practical Security Protocols
Spatial Steganalysis Based on Gradient-Based Neural Architecture Search
Turn-Based Communication Channels.

Browse Subjects

Show more subjects...

Statistics

from
to
Export