Search

Your search keyword '"public-key encryption"' showing total 398 results

Search Constraints

Start Over You searched for: Descriptor "public-key encryption" Remove constraint Descriptor: "public-key encryption"
398 results on '"public-key encryption"'

Search Results

1. Updatable Encryption Secure Against Randomness Compromise

2. Efficient error-correcting codes for the HQC post-quantum cryptosystem.

3. Analysis of Multivariate Encryption Schemes: Application to Dob and C∗.

4. Towards Robust IoT Security: A Blockchain Design with Attribute-Based Encryption

6. A Note on Failing Gracefully: Completing the Picture for Explicitly Rejecting Fujisaki-Okamoto Transforms Using Worst-Case Correctness

7. 公钥加密综述.

8. FESTA: Fast Encryption from Supersingular Torsion Attacks

10. Oblivious Transfer from Rerandomizable PKE

11. Vision Paper: Do We Need to Change Some Things? : Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments

12. Compact Public-Key Encryption Using Learning with Rounding

13. An Efficient Cloud Data Sharing and Accessing Control Based on Public-Key Encryption with Authentication Search.

14. Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform

16. Traceable Receipt-Free Encryption

17. Public-Key Encryption from Homogeneous CLWE

18. Post-quantum Plaintext-Awareness

20. Integrating and Evaluating Quantum-safe TLS in Database Applications

21. The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application

22. Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain

23. Generic Plaintext Equality and Inequality Proofs

24. Analysing the HPKE Standard

25. Universal Proxy Re-Encryption

26. Approach to Cryptography from Differential Geometry with Example

27. Non-Interactive Private Set Intersection From Functional Encryption

28. Simpler Constructions of Asymmetric Primitives from Obfuscation

29. Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption

30. Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions

31. Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security

33. Lattice-Based Cryptosystems on FPGA: Parallelization and Comparison Using HLS.

34. Efficient implementation of post quantum MLWR-based PKE scheme using NTT.

35. CPA-to-CCA Transformation for KDM Security

36. Quantum Security Proofs Using Semi-classical Oracles

37. Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions

38. Round5: Compact and Fast Post-quantum Public-Key Encryption

39. Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem

40. A New Gabidulin-Like Code and Its Application in Cryptography

41. An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms.

42. A Survey on Public-Key and Identity-Based Encryption Scheme with Equality Testing over Encrypted Data in Cloud Computing.

43. On the design and security of Lee metric McEliece cryptosystems.

44. Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage

45. Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing

46. Efficient NewHope Cryptography Based Facial Security System on a GPU

47. Hardware security without secure hardware: How to decrypt with a password and a server.

48. On the security of the modified Dual-ouroboros PKE using Gabidulin codes.

49. Efficient public-key encryption with equality test from lattices.

50. An Efficient E-ticket Fare Scheme for Passengers Based on the Distance Traveled Between Entry Point and Exit Point

Catalog

Books, media, physical & digital resources