ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
security amplification
Recently Published Documents
TOTAL DOCUMENTS
12
(FIVE YEARS 1)
H-INDEX
6
(FIVE YEARS 1)
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
Advances in Cryptology – CRYPTO 2019 - Lecture Notes in Computer Science
◽
10.1007/978-3-030-26954-8_10
◽
2019
◽
pp. 284-332
◽
Cited By ~ 9
Author(s):
Prabhanjan Ananth
◽
Aayush Jain
◽
Huijia Lin
◽
Christian Matt
◽
Amit Sahai
Keyword(s):
Indistinguishability Obfuscation
◽
Low Degree
◽
Multilinear Maps
◽
Security Amplification
Download Full-text
Security amplification of the computer-aided voting system using quantum cryptography protocols
2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
◽
10.1109/idaacs.2017.8095056
◽
2017
◽
Author(s):
Mikolaj Karpinski
◽
Tomasz Gancarczyk
◽
Aleksandra Klos-Witkowska
◽
Igor Limar
◽
Yevhen Vasiliu
Keyword(s):
Quantum Cryptography
◽
Computer Aided
◽
Voting System
◽
Security Amplification
Download Full-text
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks
Information Security and Cryptology - ICISC 2014 - Lecture Notes in Computer Science
◽
10.1007/978-3-319-15943-0_6
◽
2015
◽
pp. 84-100
◽
Cited By ~ 1
Author(s):
Fuyuki Kitagawa
◽
Takahiro Matsuda
◽
Goichiro Hanaoka
◽
Keisuke Tanaka
Keyword(s):
Security Amplification
Download Full-text
Modified method of security amplification for quantum direct communication protocols
2014 First International Scientific-Practical Conference Problems of Infocommunications Science and Technology
◽
10.1109/infocommst.2014.6992348
◽
2014
◽
Cited By ~ 3
Author(s):
Yevhen Vasiliu
◽
Sergiy Nikolayenko
Keyword(s):
Communication Protocols
◽
Direct Communication
◽
Modified Method
◽
Quantum Direct Communication
◽
Security Amplification
Download Full-text
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results
Selected Areas in Cryptography -- SAC 2014 - Lecture Notes in Computer Science
◽
10.1007/978-3-319-13051-4_8
◽
2014
◽
pp. 129-146
◽
Cited By ~ 6
Author(s):
Benoit Cogliati
◽
Jacques Patarin
◽
Yannick Seurin
Keyword(s):
Block Ciphers
◽
Security Amplification
Download Full-text
Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Cryptography and Coding - Lecture Notes in Computer Science
◽
10.1007/978-3-642-45239-0_15
◽
2013
◽
pp. 252-269
◽
Cited By ~ 3
Author(s):
Pierre-Alain Fouque
◽
Pierre Karpman
Keyword(s):
Security Amplification
Download Full-text
Security amplification of the ping-pong protocol with many-qubit Greenberger-Horne-Zeilinger states
Ukrainian Scientific Journal of Information Security
◽
10.18372/2225-5036.18.3470
◽
2012
◽
Vol 18
(2)
◽
Cited By ~ 1
Author(s):
Yevhen Vasiliu
◽
Sergiy Gnatyuk
◽
Sergiy Nikolayenko
◽
Tetiana Zhmurko
Keyword(s):
Ping Pong
◽
Security Amplification
Download Full-text
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
Applied Cryptography and Network Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-31284-7_13
◽
2012
◽
pp. 206-223
◽
Cited By ~ 4
Author(s):
Afonso Arriaga
◽
Manuel Barbosa
◽
Pooya Farshim
Keyword(s):
Encryption Schemes
◽
Security Amplification
Download Full-text
Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma
Theory of Cryptography - Lecture Notes in Computer Science
◽
10.1007/978-3-642-19571-6_3
◽
2011
◽
pp. 37-54
◽
Cited By ~ 19
Author(s):
Stefano Tessaro
Keyword(s):
Security Amplification
Download Full-text
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch
Theory of Cryptography - Lecture Notes in Computer Science
◽
10.1007/978-3-642-11799-2_15
◽
2010
◽
pp. 237-254
◽
Cited By ~ 10
Author(s):
Ueli Maurer
◽
Stefano Tessaro
Keyword(s):
Security Amplification
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close