-
1
Accountable multi-authority attribute-based data access control in smart grids
Published 2023-07-01Subjects: “…68P25…”
Get full text
Article -
2
Differential privacy based classification model for mining medical data stream using adaptive random forest
Published 2021-06-01Subjects: Get full text
Article -
3
Signcryption schemes with insider security in an ideal permutation model
Published 2019-06-01Subjects: Get full text
Article -
4
A fundamental flaw in the ++AE authenticated encryption mode
Published 2018-03-01Subjects: Get full text
Article -
5
Differential experiments using parallel alternative operations
Published 2024-02-01Subjects: Get full text
Article -
6
On the optimality of non-linear computations for symmetric key primitives
Published 2018-12-01Subjects: Get full text
Article -
7
-
8
Efficiently Processing Complex-Valued Data in Homomorphic Encryption
Published 2020-06-01Subjects: Get full text
Article -
9
Towards a Ring Analogue of the Leftover Hash Lemma
Published 2020-11-01Subjects: Get full text
Article -
10
The mF mode of authenticated encryption with associated data
Published 2022-01-01Subjects: Get full text
Article -
11
New methods of construction of cartesian authentication codes from geometries over finite commutative rings
Published 2018-09-01Subjects: Get full text
Article -
12
(In)Security of Ring-LWE Under Partial Key Exposure
Published 2020-11-01Subjects: Get full text
Article -
13
Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis
Published 2018-09-01Subjects: Get full text
Article -
14
Provable security against generic attacks on stream ciphers
Published 2023-06-01Subjects: Get full text
Article -
15
-
16
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
Published 2024-02-01Subjects: Get full text
Article -
17
A construction of encryption protocols over some semidirect products
Published 2023-03-01Subjects: Get full text
Article -
18
Another look at normal approximations in cryptanalysis
Published 2016-06-01Subjects: Get full text
Article -
19
Rigorous upper bounds on data complexities of block cipher cryptanalysis
Published 2017-10-01Subjects: Get full text
Article -
20
New approach to practical leakage-resilient public-key cryptography
Published 2020-07-01Subjects: Get full text
Article