Results 51 to 60 of about 241 (86)
From Random Numbers to Random Objects. [PDF]
Zolfaghari B, Bibak K, Koshiba T.
europepmc +1 more source
Sherlock Holmes zero-knowledge protocols secure against active attackers
We present two simple zero-knowledge interactive proofs that can be instantiated with many of the standard decisional or computational hardness assumptions.
Teşeleanu George
doaj +1 more source
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
Continuous and context-aware authentication mechanisms have been proposed as complementary security mechanisms to password-based authentication for computer devices that are handled directly by humans, such as smart phones. Such authentication mechanisms
Eskeland Sigurd
doaj +1 more source
Orienteering with One Endomorphism. [PDF]
Arpin S +5 more
europepmc +1 more source
Rumour prevention in social networks with layer 2 blockchains. [PDF]
Thakur S, Breslin JG.
europepmc +1 more source
Functional encryption for set intersection in the multi-client setting. [PDF]
Lee K, Seo M.
europepmc +1 more source
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]
Azimi SA +5 more
europepmc +1 more source
Caps and progression-free sets in Z m n. [PDF]
Elsholtz C, Pach PP.
europepmc +1 more source
Cryptanalysis and Improvement of Yanlin and Xiaoping's Signature Scheme based on ECDLP and Factoring
Hemlal Sahu, Brijesh Sharma
semanticscholar +1 more source

