Search

Your search keyword '"Pseudorandom function family"' showing total 520 results

Search Constraints

Start Over You searched for: Descriptor "Pseudorandom function family" Remove constraint Descriptor: "Pseudorandom function family"
520 results on '"Pseudorandom function family"'

Search Results

1. EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search

2. Privacy-Preserving Publicly Verifiable Databases

3. Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter

4. How to Construct Quantum Random Functions

5. Lattice‐based nominative signature using pseudorandom function

6. Traceable ring signatures: general framework and post-quantum security

7. Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function

9. Building Low-Interactivity Multifactor Authenticated Key Exchange for Industrial Internet of Things

10. Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs

11. Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment

13. SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version

14. Efficient Private Set Intersection Using Point-Value Polynomial Representation

15. Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2

16. Designing a secure round function based on chaos

17. Modular Design of Secure Group Messaging Protocols and the Security of MLS

19. Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons

20. Low-Complexity Weak Pseudorandom Functions in $$\mathtt {AC}0[\mathtt {MOD}2]$$

21. On Length Independent Security Bounds for the PMAC Family

22. Practical Threshold Multi-Factor Authentication

23. Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation

24. Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation

25. A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation

26. Detection of Node Capture Attack in Wireless Sensor Networks

28. Low-Gate Quantum Golden Collision Finding

29. On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding

30. VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE

31. Two-Server Delegation of Computation on Label-Encrypted Data

32. Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices

33. Algebraic Key-Recovery Attacks on Reduced-Round Xoofff

34. Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions

35. Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions

36. Systematic Security Analysis of Stream Encryption With Key Erasure

37. Fast Authentication Protocol With Privacy Preserving For Large-Scale Power LTE Private Network Terminals

38. MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces

39. An Efficient Private Set Intersection Protocol for the Cloud Computing Environments

40. On Quantum Chosen-Ciphertext Attacks and Learning with Errors

41. Traceable Ring Signatures with Post-quantum Security

42. Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF

43. Oblivious Pseudorandom Functions from Isogenies

44. Authenticated Encryption Based on Lesamnta-LW Hashing Mode

45. Collusion Resistant Watermarkable PRFs from Standard Assumptions

46. Super-Linear Time-Memory Trade-Offs for Symmetric Encryption

47. Adaptively Secure Threshold Symmetric-Key Encryption

48. Speeding up OMD Instantiations in Hardware

49. Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments

50. Correlated Pseudorandom Functions from Variable-Density LPN

Catalog

Books, media, physical & digital resources