1–35 of 35 hits
Sort by:
Sort by:
-
Bilinear Entropy Expansion from the Decisional Linear Assumption
Free accessSpringer Verlag | 2015| -
Bilinear Entropy Expansion from the Decisional Linear Assumption
British Library Conference Proceedings | 2015| -
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Private Database Access with HE-over-ORAM Architecture
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
mrPUF: A Novel Memristive Device Based Physical Unclonable Function
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
A Signature Scheme with a Fuzzy Private Key
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
On the XOR of Multiple Random Permutations
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Generic Construction of UC-Secure Oblivious Transfer
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Exploiting Eye Tracking for Smartphone Authentication
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Arithmetic Addition over Boolean Masking
Towards First- and Second-Order Resistance in HardwareSpringer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Cryptographic Enforcement of Information Flow Policies Without Public Information
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Recovering Lost Device-Bound Credentials
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU
(Extended Abstract)Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
A Fully Decentralized Data Usage Control Enforcement Infrastructure
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Differential Power Analysis of a McEliece Cryptosystem
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Post-Quantum Forward-Secure Onion Routing
(Future Anonymity in Today’s Budget)Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Non-malleability Under Selective Opening Attacks: Implication and Separation
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop -
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
Springer Verlag | 2016|Contributors: Lewko, Allison Bishop
- ««
- «
- 1
- »»
Hits per page
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.