Results 51 to 60 of about 241 (86)

From Random Numbers to Random Objects. [PDF]

open access: yesEntropy (Basel), 2022
Zolfaghari B, Bibak K, Koshiba T.
europepmc   +1 more source

Sherlock Holmes zero-knowledge protocols secure against active attackers

open access: yesJournal of Mathematical Cryptology
We present two simple zero-knowledge interactive proofs that can be instantiated with many of the standard decisional or computational hardness assumptions.
Teşeleanu George
doaj   +1 more source

Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection

open access: yesJournal of Mathematical Cryptology
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj   +1 more source

Orienteering with One Endomorphism. [PDF]

open access: yesMathematica (N Y), 2023
Arpin S   +5 more
europepmc   +1 more source

Caps and progression-free sets in Z m n. [PDF]

open access: yesDes Codes Cryptogr, 2020
Elsholtz C, Pach PP.
europepmc   +1 more source

Home - About - Disclaimer - Privacy