398 results on '"public-key encryption"'
Search Results
2. Efficient error-correcting codes for the HQC post-quantum cryptosystem.
3. Analysis of Multivariate Encryption Schemes: Application to Dob and C∗.
4. Towards Robust IoT Security: A Blockchain Design with Attribute-Based Encryption
5. On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives
6. A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness
7. 公钥加密综述.
8. FESTA: Fast Encryption from Supersingular Torsion Attacks
9. Public-Key Encryption, Local Pseudorandom Generators, and the Low-Degree Method
10. Oblivious Transfer from Rerandomizable PKE
11. Vision Paper: Do We Need to Change Some Things? : Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments
12. Compact Public-Key Encryption Using Learning with Rounding
13. An Efficient Cloud Data Sharing and Accessing Control Based on Public-Key Encryption with Authentication Search.
14. Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform
15. Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
16. Traceable Receipt-Free Encryption
17. Public-Key Encryption from Homogeneous CLWE
18. Post-quantum Plaintext-Awareness
19. Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions
20. Integrating and Evaluating Quantum-safe TLS in Database Applications
21. The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application
22. Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain
23. Generic Plaintext Equality and Inequality Proofs
24. Analysing the HPKE Standard
25. Universal Proxy Re-Encryption
26. Approach to Cryptography from Differential Geometry with Example
27. Non-Interactive Private Set Intersection From Functional Encryption
28. Simpler Constructions of Asymmetric Primitives from Obfuscation
29. Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
30. Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions
31. Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security
32. Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption
33. Lattice-Based Cryptosystems on FPGA: Parallelization and Comparison Using HLS.
34. Efficient implementation of post quantum MLWR-based PKE scheme using NTT.
35. CPA-to-CCA Transformation for KDM Security
36. Quantum Security Proofs Using Semi-classical Oracles
37. Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions
38. Round5: Compact and Fast Post-quantum Public-Key Encryption
39. Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem
40. A New Gabidulin-Like Code and Its Application in Cryptography
41. An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms.
42. A Survey on Public-Key and Identity-Based Encryption Scheme with Equality Testing over Encrypted Data in Cloud Computing.
43. On the design and security of Lee metric McEliece cryptosystems.
44. Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
45. Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing
46. Efficient NewHope Cryptography Based Facial Security System on a GPU
47. Hardware security without secure hardware: How to decrypt with a password and a server.
48. On the security of the modified Dual-ouroboros PKE using Gabidulin codes.
49. Efficient public-key encryption with equality test from lattices.
50. An Efficient E-ticket Fare Scheme for Passengers Based on the Distance Traveled Between Entry Point and Exit Point
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.