Search

Showing total 36 results

Search Constraints

Start Over You searched for: Topic cryptography Remove constraint Topic: cryptography Topic data encryption Remove constraint Topic: data encryption Journal computer journal Remove constraint Journal: computer journal
36 results

Search Results

1. Authorized Function Homomorphic Signature.

2. Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128.

3. Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128.

4. Novel Smooth Hash Proof Systems Based on Lattices.

5. Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.

6. A Practical Hybrid Group Key Establishment for Secure Group Communications.

7. Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.

8. Structural Key Recovery of Simple Matrix Encryption Scheme Family.

9. Tightly Secure Encryption Schemes against Related-Key Attacks.

10. Klepto for Ring-LWE Encryption.

11. Statistical Cipher Feedback of Stream Ciphers.

12. Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting.

13. Cheating Immune Threshold Visual Secret Sharing1.

14. Side-Channel Attack Using Meet-in-the-Middle Technique.

15. Probabilistic Visual Cryptography Schemes.

16. On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme.

17. Pairing-Free and Secure Certificateless Signcryption Scheme.

18. RGB, a Mixed Multivariate Signature Scheme.

19. From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data.

20. Efficient Identity-Based Proxy Signature in the Standard Model.

21. CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System†.

22. Heterogeneous Signcryption with Key Privacy.

23. An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices.

24. A Cellular Automata Based Reconfigurable Architecture for Hybrid Cryptosystems.

25. Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations.

26. Visual Cryptography Schemes with Reversing.

27. Matrix FHE and Its Application in Optimizing Bootstrapping.

28. Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security.

29. RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.

30. Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.

31. Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms.

32. On Unconditional ϵ-Security of Private Key Encryption.

33. Automated Proofs for Computational Indistinguishability.

34. Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.

35. A Novel Image Signature Method for Content Authentication.

36. Encrypted Pointers in Protection System Design.