nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
|
Ge, Chunpeng |
|
2018 |
86 |
11 |
p. 2587-2603 |
artikel |
2 |
Cover attacks for elliptic curves with cofactor two
|
Tian, Song |
|
2018 |
86 |
11 |
p. 2451-2468 |
artikel |
3 |
Covering arrays of strength three from extended permutation vectors
|
Torres-Jimenez, Jose |
|
2018 |
86 |
11 |
p. 2629-2643 |
artikel |
4 |
Euclidean and Hermitian LCD MDS codes
|
Carlet, Claude |
|
2018 |
86 |
11 |
p. 2605-2618 |
artikel |
5 |
How to build time-lock encryption
|
Liu, Jia |
|
2018 |
86 |
11 |
p. 2549-2586 |
artikel |
6 |
Lexicodes over finite principal ideal rings
|
Antrobus, Jared |
|
2018 |
86 |
11 |
p. 2661-2676 |
artikel |
7 |
Multiset combinatorial batch codes
|
Zhang, Hui |
|
2018 |
86 |
11 |
p. 2645-2660 |
artikel |
8 |
Nonlinear diffusion layers
|
Liu, Yunwen |
|
2018 |
86 |
11 |
p. 2469-2484 |
artikel |
9 |
On explicit minimum weight bases for extended cyclic codes related to Gold functions
|
Mogilnykh, I. Yu. |
|
2018 |
86 |
11 |
p. 2619-2627 |
artikel |
10 |
On self-dual negacirculant codes of index two and four
|
Shi, Minjia |
|
2018 |
86 |
11 |
p. 2485-2494 |
artikel |
11 |
Practical witness encryption for algebraic languages or how to encrypt under Groth–Sahai proofs
|
Derler, David |
|
2018 |
86 |
11 |
p. 2525-2547 |
artikel |
12 |
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption
|
Wen, Yunhua |
|
2018 |
86 |
11 |
p. 2495-2512 |
artikel |
13 |
Three-weight ternary linear codes from a family of cyclic difference sets
|
Zhou, Zhengchun |
|
2018 |
86 |
11 |
p. 2513-2523 |
artikel |