New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACISP (25. : 2020 : Perth, Western Australia; Online) Information security and privacy
1. Verfasser: Zhao, Xiaopeng (VerfasserIn)
Weitere Verfasser: Cao, Zhenfu (VerfasserIn), Dong, Xiaolei (VerfasserIn), Shao, Jun (VerfasserIn), Wang, Licheng (VerfasserIn), Liu, Zhusen (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm 2020 Yeoh, Wei-Zhu
A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models 2020 Wang, Tongchen
Efficient Forward-Secure Threshold Public Key Encryption 2020 Kurek, Rafael
A New Targeted Password Guessing Model 2020 Xie, Zhijie
Revisiting the Hardness of Binary Error LWE 2020 Sun, Chao
PALOR: Machine Learning Security Poisoning Attacks Against Logistic Regression 2020 Wen, Jialin
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method 2020 Oonishi, Kento
Security Analysis on Tangle-Based Blockchain Through Simulation 2020 Wang, Bozhi
A New Improved AES S-box with Enhanced Properties 2020 Nitaj, Abderrahmane
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers 2020 Koike, Yuji
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition 2020 Chen, Jinrong
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks 2020 Ma, Zuchao
Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices 2020 Li, Linyu
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis 2020 Baksi, Anubhab
User Identity Linkage Across Social Networks via Community Preserving Network Embedding 2020 Guo, Xiaoyu
JTaint: Finding Privacy-Leakage in Chrome Extensions 2020 Xie, Mengfei
Lattice Blind Signatures with Forward Security 2020 Le, Huy Quoc
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts 2020 Alkadri, Nabil Alkeilani
Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security 2020 Davies, Gareth T.
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2 2020 Huang, Junhao
Alle Artikel auflisten