Linked e-resources

Details

Fundamentals & Cryptographic Primitives
Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement
Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation
Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections
Cryptanalysis
Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs
Linear Cryptanalysis of Lightweight Block Cipher WARP
Linicrypt in the Ideal Cipher Model
Signature
SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC
Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications
A Certificateless Aggregate Signature Scheme with Better Security
Constant-size Group Signatures with Message-Dependent Opening from Lattices
Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions
Threshold Ring Signature Scheme from Cryptographic Group Action
Encryption
Homomorphic Witness Encryption from Indistinguishable Obfuscation
Identity-based Matchmaking Encryption Secure against Key Generation Center
Multi-Input Functional Encryption for Unbounded Inner Products
FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme
A New Revocable Attribute Based Encryption on Lattice
An efficient keyword-based ciphertext retrieval scheme
Privacy Preservation
Privacy Preserving Outsourced K-means Clustering using Kd-tree
Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency
A Privacy-Preserving Takeaway Delivery Service Scheme
Blockchain Security
CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest
simuBits: Pool Security Verification of Novel Mining Attacks.

Browse Subjects

Show more subjects...

Statistics

from
to
Export