Context Hiding Multi-Key Linearly Homomorphic Authenticators. | 0 | 0.34 | 2019 |
Postquantum Cryptography, Part 2. | 1 | 0.35 | 2018 |
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection. | 0 | 0.34 | 2018 |
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols. | 1 | 0.39 | 2018 |
PRoPyLA: Privacy Preserving Long-Term Secure Storage. | 1 | 0.38 | 2018 |
A Linearly Homomorphic Signature Scheme from Weaker Assumptions. | 0 | 0.34 | 2018 |
Function-Dependent Commitments For Verifiable Multi-Party Computation | 0 | 0.34 | 2018 |
Chqs: Publicly Verifiable Homomorphic Signatures Beyond The Linear Case | 0 | 0.34 | 2018 |
Update-tolerant and Revocable Password Backup (Extended Version). | 0 | 0.34 | 2017 |
The Status of Quantum-Based Long-Term Secure Communication over the Internet. | 0 | 0.34 | 2017 |
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper). | 0 | 0.34 | 2017 |
Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics. | 2 | 0.35 | 2017 |
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions. | 2 | 0.38 | 2017 |
An unconditionally hiding auditing procedure for computations over distributed data. | 0 | 0.34 | 2016 |
Long Term Confidentiality: a Survey. | 6 | 0.51 | 2014 |
A One Way Function Based on Ideal Arithmetic in Number Fields | 9 | 0.89 | 1997 |