Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Secure Multi-Party Computation for Elliptic Curves
Suzuki, Koutarou, Yoneyama, Kazuki
Published in Advances in Information and Computer Security (2014)
Published in Advances in Information and Computer Security (2014)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Cryptographic Pairings Based on Elliptic Nets
Ogura, Naoki, Kanayama, Naoki, Uchiyama, Shigenori, Okamoto, Eiji
Published in Advances in Information and Computer Security (2011)
Published in Advances in Information and Computer Security (2011)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Loading…
A Theoretical Analysis of the Structure of HC-128
Paul, Goutam, Maitra, Subhamoy, Raizada, Shashwat
Published in Advances in Information and Computer Security (2011)
Published in Advances in Information and Computer Security (2011)
Get full text
Book Chapter
Loading…
Statistics on Encrypted Cloud Data
Tseng, Fu-Kuo, Liu, Yung-Hsiang, Chen, Rong-Jaye, Lin, Bao-Shuh Paul
Published in Advances in Information and Computer Security (2013)
Published in Advances in Information and Computer Security (2013)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Static Integer Overflow Vulnerability Detection in Windows Binary
Deng, Yi, Zhang, Yang, Cheng, Liang, Sun, Xiaoshan
Published in Advances in Information and Computer Security (2013)
Published in Advances in Information and Computer Security (2013)
Get full text
Book Chapter
Loading…
Loading…
Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces
Moreira, José, Fernández, Marcel, Kabatiansky, Grigory
Published in Advances in Information and Computer Security (2013)
Published in Advances in Information and Computer Security (2013)
Get full text
Book Chapter
Publication
Loading…
Efficient Algorithm for Tate Pairing of Composite Order
Kiyomura, Yutaro, Takagi, Tsuyoshi
Published in Advances in Information and Computer Security (2013)
Published in Advances in Information and Computer Security (2013)
Get full text
Book Chapter
Loading…
Loading…
Structured Encryption for Conceptual Graphs
Poh, Geong Sen, Mohamad, Moesfa Soeheila, Z’aba, Muhammad Reza
Published in Advances in Information and Computer Security (2012)
Published in Advances in Information and Computer Security (2012)
Get full text
Book Chapter
Loading…
Loading…