-
1
Accountable multi-authority attribute-based data access control in smart grids
Published 2023-07-01Subjects: Get full text
Article -
2
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Published 2015-12-01Subjects: Get full text
Article -
3
On a class of strongly asymmetric PKA algorithms
Published 2015-10-01Subjects: Get full text
Article -
4
RSA: A number of formulas to improve the search for p+qp+q
Published 2017-12-01Subjects: Get full text
Article -
5
Is extracting data the same as possessing data?
Published 2014-06-01Subjects: Get full text
Article -
6
-
7
Improved cryptanalysis of the AJPS Mersenne based cryptosystem
Published 2020-07-01Subjects: Get full text
Article -
8
-
9
Cryptanalysis of an RSA variant with moduli N=prql
Published 2017-06-01Subjects: Get full text
Article -
10
-
11
Construction of strongly aperiodic logarithmic signatures
Published 2018-03-01Subjects: Get full text
Article -
12
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier
Published 2016-06-01Subjects: Get full text
Article -
13
Discretisation and Product Distributions in Ring-LWE
Published 2020-11-01Subjects: Get full text
Article -
14
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings
Published 2020-12-01Subjects: Get full text
Article -
15
Generalization of Roos bias in RC4 and some results on key-keystream relations
Published 2018-03-01Subjects: Get full text
Article -
16
The round functions of KASUMI generate the alternating group
Published 2015-03-01Subjects: Get full text
Article -
17
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Published 2015-06-01Subjects: Get full text
Article -
18
Hash functions from superspecial genus-2 curves using Richelot isogenies
Published 2020-08-01Subjects: Get full text
Article -
19
Linear approaches to resilient aggregation in sensor networks
Published 2015-12-01Subjects: Get full text
Article -
20
Exact information ratios for secret sharing on small graphs with girth at least 5
Published 2019-06-01Subjects: Get full text
Article