Search

Your search keyword '"Security parameter"' showing total 1,152 results

Search Constraints

Start Over You searched for: Descriptor "Security parameter" Remove constraint Descriptor: "Security parameter"
1,152 results on '"Security parameter"'

Search Results

1. Optimal security parameter for encrypted control systems against eavesdropper and malicious server

2. The Many Entropies in One-Way Functions

3. Universal Samplers with Fast Verification

4. FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime

5. Non-malleable Codes with Split-State Refresh

6. Private Puncturable PRFs from Standard Lattice Assumptions

7. From Minicrypt to Obfustopia via Private-Key Functional Encryption

8. Hashing Garbled Circuits for Free

9. Lattice-Based SNARGs and Their Application to More Efficient Obfuscation

10. Magic Adversaries Versus Individual Reduction: Science Wins Either Way

11. Analysis of the Blockchain Protocol in Asynchronous Networks

12. LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)

13. 基于改进双跳无线体域网的身份认证方案.

14. Security Requirements Elicitation and Modeling Authorizations

15. Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach

16. Towards Tightly Secure Lattice Short Signature and Id-Based Encryption

17. Strong Hardness of Privacy from Weak Traitor Tracing

18. Proofs of Proofs of Work with Sublinear Complexity

19. Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN

20. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption

21. Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security

22. Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium

23. Practical Order-Revealing Encryption with Limited Leakage

24. Circuit Compilers with Leakage Rate

25. Secure ElGamal-Type Cryptosystems Without Message Encoding

26. Improved OR-Composition of Sigma-Protocols

27. On the Hardness of Learning with Rounding over Small Modulus

28. Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control

29. Software-Only Two-Factor Authentication Secure Against Active Servers

30. Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)

31. Security of Identity-Based Encryption Schemes from Quadratic Residues

34. HEtest: A Homomorphic Encryption Testing Framework

35. Concurrent Secure Computation via Non-Black Box Simulation

36. Resizable Tree-Based Oblivious RAM

37. Two Halves Make a Whole : Reducing Data Transfer in Garbled Circuits Using Half Gates

38. Hosting Services on an Untrusted Cloud

39. Privacy Amplification in the Isolated Qubits Model

40. Universal Signature Aggregators

41. Inner Product Masking Revisited

42. Obfuscating Circuits via Composite-Order Graded Encoding

43. Verifiable Random Functions from Weaker Assumptions

44. Aggregate Pseudorandom Functions and Connections to Learning

45. On the Regularity of Lossy RSA : Improved Bounds and Applications to Padding-Based Encryption

46. Non-committing Encryption from Φ-hiding

47. Locally Decodable and Updatable Non-malleable Codes and Their Applications

48. A Tamper and Leakage Resilient von Neumann Architecture

49. Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based

50. Simpler Efficient Group Signatures from Lattices

Catalog

Books, media, physical & digital resources