Year of publication
Type of media
Source
Subject
Type of material
Licence
TIB reading rooms collection
Synonyms were used for: security • system • system security
Search without synonyms: keywords:(system security)
Used synonyms:
- safety
- sicherheit
Used synonyms:
- systeme
Used synonyms:
- systemsicherheit
-
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings
Tema Archive | 2014|Keywords: Systemsicherheit -
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
Tema Archive | 2014|Keywords: Systemsicherheit -
On the Efficacy of Solving LWE by Reduction to Unique-SVP
Tema Archive | 2014|Keywords: Systemsicherheit, Computer-System -
Cyber-Physical Production System Fingerprinting
Free accessFraunhofer Publica | 2019|Keywords: Systemsicherheit -
FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR
Tema Archive | 2014|Keywords: Systemsicherheit -
Efficient Three-Party Computation from Cut-and-Choose
Tema Archive | 2014|Keywords: Systemsicherheit -
Cryptography from Compression Functions: The UCE Bridge to the ROM
Tema Archive | 2014|Keywords: Systemsicherheit -
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
Tema Archive | 2014|Keywords: Systemsicherheit -
Hardness of k-LWE and Applications in Traitor Tracing
Tema Archive | 2014|Keywords: Systemsicherheit -
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator
Tema Archive | 2014|Keywords: Systemsicherheit -
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Tema Archive | 2014|Keywords: Systemsicherheit -
The Security of Multiple Encryption in the Ideal Cipher Model
Tema Archive | 2014|Keywords: Systemsicherheit, Sicherheit, beweisbare Sicherheit -
Round-Efficient Black-Box Construction of Composable Multi-Party Computation
Tema Archive | 2014|Keywords: Systemsicherheit -
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
Tema Archive | 2014|Keywords: Systemsicherheit -
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Tema Archive | 2014|Keywords: Systemsicherheit -
Leakage-Tolerant Computation with Input-Independent Preprocessing
Tema Archive | 2014|Keywords: Systemsicherheit -
Low Entropy Masking Schemes, Revisited
Tema Archive | 2014|Keywords: Systemsicherheit, Computer-System -
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Tema Archive | 2014|Keywords: Systemsicherheit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.