Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3
-
4
-
5
-
6“... by Albrecht (Eurocrypt 2017), which forces some LWE-based cryptosystems, especially fully homomorphic...”
Get full text
Article -
7“..., CHES 2013; LowMC, EUROCRYPT 2015; HADES, EUROCRYPT 2020; MALICIOUS, CRYPTO 2020), we study...”
Get full text
Article -
8by Yusuke Naito“... by Black and Rogaway (EUROCRYPT 2002). Improving the security bound is a main research topic for PMAC...”
Published 2019-06-01
Get full text
Article -
9“.../IPES(IDEA)[1][2], which was proposed by X. Lai and J. Massey in EUROCRYPT 90, and we analyze...”
Get full text
Others -
10“... paper of PMAC by Black and Rogaway in Eurocrypt-2002, the bound was shown to be (σ + 1)2/2n–1. In FSE...”
Get full text
Article -
11“... fifteen years since Naor and Shamir proposed Visual Cryptography in EuroCrypt’94. Fruitful research...”
Get full text
Others -
12“...碩士 === 國立交通大學 === 資訊科學與工程研究所 === 94 === In EuroCrypt2005, Wang et al. publish their collision...”
Get full text
Others -
13“... such attacks. Finally, we take Attrapadung’s framework in Eurocrypt’14 as an example to show how to “compile...”
Get full text
Article -
14“..., the bootstrapping technique of Halevi and Shoup (EUROCRYPT 15) is improved. Firstly, by introducing a definition...”
Get full text
Article -
15“..., which exceeds that of Safavi-Naini and Wang [Proc. of Eurocrypt'98, LNCS 1403, Springer (1998), pp. 527...”
Get full text
Article -
16“...碩士 === 逢甲大學 === 資訊工程所 === 91 === At Eurocrypt’91, D. Chaum and E. Heyst first introduced the notion...”
Get full text
Others -
17by Čurilla, Marcel“... Supervisor: doc. Mgr. Štěpán Holub, Ph.D. Abstract: Stream cipher QUAD was introduced in 2006 on Eurocrypt...”
Published 2012
Get full text
Dissertation -
18by Ben Hamouda--Guichoux, Fabrice“... Eurocrypt'02, comme un outil pour construire des schémas de chiffrement efficaces et sûrs contre les...”
Published 2016
Get full text
-
19“...Recently, Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) secure...”
Get full text
Article -
20“... of the ring. From a high level, we adapt Libert et al.’s zero-knowledge argument system (Eurocrypt 2016...”
Get full text
Article