210 papers found
Refreshing results…
The Eleventh Power Residue Symbol
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
New number-theoretic cryptographic primitives
Private Data Aggregation over Selected Subsets of Users
PINFER: Privacy-Preserving Inference
Decentralized Policy-Hiding ABE with Receiver Privacy
Differential Attacks on Deterministic Signatures
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption
RSA Signatures Under Hardware Restrictions
Function-Revealing Encryption: Definitions and Constructions
Private yet Efficient Decision Tree Evaluation
Privacy and security: Key requirements for sustainable IoT growth
Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves
Function-Revealing Encryption
Inversion-free arithmetic on elliptic curves through isomorphisms
Efficient Cryptosystems From $𝟐^{{\varvec{k}}}$ 2 k -th Power Residue Symbols
Cryptanalysis of a Privacy-Preserving Aggregation Protocol
Secure ElGamal-Type Cryptosystems Without Message Encoding
Identity-Based Cryptosystems and Quadratic Residuosity
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Missing publications? Read more about our data sources.