Group Key Exchange Protocols from Supersingular Isogenies

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Inscrypt (16. : 2020 : Online) Information security and cryptology
1. Verfasser: Fan, Xuejun (VerfasserIn)
Weitere Verfasser: Xu, Xiu (VerfasserIn), Li, Bao (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors 2021 Li, Shanshan
Distributed Key Generation for SM9-Based Systems 2021 Zhang, Rui
A Paid Message Forwarding Scheme Based on Social Network 2021 Geng, Yifu
Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach 2021 Liu, Yang
A New Efficient Quantum Digital Signature Scheme for Multi-bit Messages 2021 Wang, Yukun
On Galois NFSRs Equivalent to Fibonacci Ones 2021 Zhong, Jianghua
On the Structure Property of PCR’s Adjacency Graph with a Prime Order and Its Application of Constructing M-Sequences 2021 Zhou, Congwei
E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS 2021 Lang, Fan
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack 2021 Wang, Ti
LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks 2021 Cai, Cailing
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System 2021 Chen, Zhaojie
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption 2021 Liu, Yanyan
Chosen Ciphertext Attacks Secure Inner-Product Functional Encryption from Learning with Errors Assumption 2021 Yun, Kelly
Bagua: A NFSR-Based Stream Cipher Constructed Following Confusion and Diffusion Principles 2021 Tan, Lin
Public Verifiable Private Decision Tree Prediction 2021 Wang, Hailong
Group Key Exchange Protocols from Supersingular Isogenies 2021 Fan, Xuejun
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm 2021 Zhang, Yudi
Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure 2021 Liu, Gang
Provable Related-Key Security of Contracting Feistel Networks 2021 Yu, Wenqi
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning 2021 Su, Heng-Chuan
Alle Artikel auflisten