Linked e-resources

Details

Encryption
A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test
Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search
More Efficient Verifiable Functional Encryption
Subverting Deniability
Epoch Confidentiality in Updatable Encryption
Lattice Based Cryptography
Simplified Server-Aided Revocable Identity-Based Encryption from Lattices
Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask
Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems
Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices
Information Security
Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks
Construction of a New UAV Management System based on UMIA Technology
FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning
Practical Federated Learning for Samples with Different IDs
Blockchain
Reinforcement-Mining: Protecting Reward in Selfish Mining
FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks
Secure Collaboration between Consortiums in Permissioned Blockchains
Foundations
(Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge
Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model
Cryptographic Role-Based Access Control, Reconsidered.

Browse Subjects

Show more subjects...

Statistics

from
to
Export