Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

SYMMETRIC KEY ENCRYPTION
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
Security of Stateful Order-Preserving Encryption
HOMOMORPHIC ENCRYPTION
Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
Multi-Party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
Improved Key Generation Algorithm for Gentry's Fully Homomorphic Encryption Scheme
SIDE CHANNEL ANALYSIS AND IMPLEMENTATION
Novel Leakage against Realistic Masking and Shuffling Countermeasures
case study on PRINCE and SEED
Detecting Similar Code Segments through Side Channel Leakage in Microcontrollers
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
BROADCAST ENCRYPTION
Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
Recipient Revocable Broadcast Encryption with Dealership
ELLIPTIC CURVE
Solving 114-bit ECDLP for a Barreto-Naehrig Curve
On the computational complexity of ECDLP for elliptic curves in various forms using index calculus
SIGNATURE AND PROTOCOL
Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs For RFID Systems
On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices
Security Analysis of Improved Cubic UOV Signature Schemes
NETWORK AND SYSTEM SECURITY
Evaluating the Impact of Juice Filming Charging Attack in Practical Environments
Reading Network Packets as a Natural Language for Intrusion Detection
Friend-safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.

Browse Subjects

Show more subjects...

Statistics

from
to
Export