Linked e-resources

Details

Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography
Simple Security Definitions for and Constructions of 0-RTT Key Exchange
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
Secure and Efficient Pairing at 256-bit Security Level
Data Protection and Mobile Security No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices
Are You Lying: Validating the Time-Location of Outdoor Images
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks
A Pilot Study of Multiple Password Interference between Text and Map-based Passwords
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security
A Novel GPU-Based Implementation of the Cube Attack – Preliminary Results Against Trivium
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
An experimental study of the BDD approach for the search LWE problem
Efficiently Obfuscating Re-Encryption Program under DDH Assumption
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease
A Practical Chosen Message Power Analysis Approach against Ciphers with the Key Whitening Layers
Side-Channel Attacks meet Secure Network Protocols
Lattice-based DAPS and Generalizations: Self-Enforcement in Signature Schemes
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs
Bounds in Various Generalized Settings of the Discrete Logarithm Problem
An Enhanced Binary Characteristic Set Algorithm And Its Applications to Algebraic Cryptanalysis
Accountable Storage
Maliciously Secure Multi-Client ORAM
Legacy-Compliant Data Authentication for Industrial Control System Traffic
Multi-Client Oblivious RAM Secure Against Malicious Servers
Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols
Adaptive Proofs have Straightline Extractors (in the Random Oracle Model)
How to Achieve Bounded Key Dependent Message Security
Signature Schemes with Randomized Verification
SCRAPE: Scalable Randomness Attested by Public Entities
cMix : Mixing with Minimal Real-Time Asymmetric Cryptographic Operation
Almost Optimal Oblivious Transfer from QA-NIZK
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.

Browse Subjects

Show more subjects...

Statistics

from
to
Export