Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite

Linked e-resources

Details

Key Exchange
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles
Theory
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption
Financially Backed Covert Security
Lifting Standard Model Reductions to Common Setup Assumptions
Encryption
Efficient Lattice-Based Inner-Product Functional Encryption
The Direction of Updatable Encryption Does Matter
Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices
Encapsulated Search Index : Public-Key, Sub-linear, Distributed, and Delegatable
KDM Security for the Fujisaki-Okamoto Transformations in the QROM
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Signatures
Lattice-based Signatures with Tight Adaptive Corruptions and More
Count Me In! Extendablity for Threshold Ring Signatures
A Note on the Post-Quantum Security of (Ring) Signatures
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.

Browse Subjects

Show more subjects...

Statistics

from
to
Export