Revocable and Linkable Ring Signature

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Inscrypt (15. : 2019 : Nanjing) Information security and cryptology
1. Verfasser: Zhang, Xinyu (VerfasserIn)
Weitere Verfasser: Liu, Joseph K. (VerfasserIn), Steinfeld, Ron (VerfasserIn), Kuchta, Veronika (VerfasserIn), Yu, Jiangshan (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Improving Division Property Based Cube Attacks by Removing Invalid Monomials 2020 Pan, Senshan
Revocable and Linkable Ring Signature 2020 Zhang, Xinyu
PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework 2020 He, Houhua
Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGC 2020 Li, Chuang
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model 2020 Zhang, Qihui
Improving ECDLP Computation in Characteristic 2 2020 Zhang, Fangguo
SymSem: Symbolic Execution with Time Stamps for Deobfuscation 2020 Li, Huayi
Attribute-Based Keyword Search from Lattices 2020 Li, Jie
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems 2020 Moriya, Tomoki
Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service 2020 Tang, Qiang
Consolidating Hash Power in Blockchain Shards with a Forest 2020 Zhao, Jun
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model 2020 Duong, Dung Hoang
Evaluating the Cache Side Channel Attacks Against ECDSA 2020 Ma, Ziqiang
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption 2020 Mandal, Mriganka
Generic Constructions of Revocable Identity-Based Encryption 2020 Ma, Xuecheng
Untraceability of Partial Blind and Blind Signature Schemes 2020 Rawal, Swati
MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature 2020 Chen, Jiahui
Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance 2020 Lou, Xiaoxuan
Strong Authenticity with Leakage Under Weak and Falsifiable Physical Assumptions 2020 Berti, Francesco
Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy 2020 Chen, Yueyao
Alle Artikel auflisten