We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. RFID Security

    Living reference work entry 2024
  2. Protocol

    Living reference work entry 2024
  3. Vulnerability Metrics

    Living reference work entry 2024
  4. Threshold Signature

    Living reference work entry 2024
  5. Metrics of Software Security

    Guido Salvaneschi, Paolo Salvaneschi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  6. Theorem Proving and Security

    Living reference work entry 2024
  7. Oblivious RAM (ORAM)

    Alessandro Barenghi, Gerardo Pelosi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2024
  8. Byzantine Agreement

    Living reference work entry 2024
  9. The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model

    The security of block-cipher-based hash-then-encrypt-type message authentication codes (MACs) has been proven with universal hash functions. Thus,...
    Conference paper 2024
  10. Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher

    In the single-key attack scenario, meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES...
    Jiqiang Lu, Wenchang Zhou in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  11. TFHE Public-Key Encryption Revisited

    Fully homomorphic encryption allows directly processing encrypted data without having to decrypt it. The result of the computation is encrypted,...
    Conference paper 2024
  12. SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice

    Since the first fault attack by Boneh et al. in 1997, various physical fault injection mechanisms have been explored to induce errors in electronic...
    Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  13. Towards Compact Identity-Based Encryption on Ideal Lattices

    Basic encryption and signature on lattices have comparable efficiency to their classical counterparts in terms of speed and key size. However,...
    Huiwen Jia, Yupu Hu, ... Lin Wang in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  14. Cutting the GRASS: Threshold GRoup Action Signature Schemes

    Group actions are fundamental mathematical tools, with a long history of use in cryptography. Indeed, the action of finite groups at the basis of the...
    Michele Battagliola, Giacomo Borin, ... Edoardo Persichetti in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  15. Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption

    Homomorphic Encryption (HE) is a type of cryptography that allows computing on encrypted data, enabling computation on sensitive data to be...
    Conference paper 2024
Did you find what you were looking for? Share feedback.