TFHE: Fast Fully Homomorphic Encryption Over the Torus
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09319-x
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09316-0
Practical Collision Attacks against Round-Reduced SHA-3
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09313-3
Kummer for Genus One Over Prime-Order Fields
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09320-4
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09336-w
Drivers of Green Supply Chain Initiatives and their Impact on Economic Performance of Firms: Evidence from Pakistan’s Manufacturing Sector
来源期刊:Journal of CryptologyDOI:10.7441/joc.2019.03.01
Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09322-2
Solving LPN Using Covering Codes
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09338-8
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09321-3
An Efficiency Assessment of Selected German Airports Using the DEA Model
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.01.09
Cryptanalysis of NORX v2.0
来源期刊:Journal of CryptologyDOI:10.1007/S00145-018-9297-9
On the Power of Secure Two-Party Computation
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09314-2
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09337-9
A Model Replication with an Extension of Students’ Perception of Prospective Employer Attractiveness
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.02.01
Facets of Competitiveness in Improving the Professional Skills
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.02.07
On Tight Security Proofs for Schnorr Signatures
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09311-5
Topology-Hiding Computation on All Graphs
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09318-y
Economy of Heating and Competitiveness of the State – The Link between the Life Expectancy and the Heating Fuel Type. The Case of the Slovak Republic
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.01.08
Key Establishment à la Merkle in a Quantum World
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09317-z
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09330-2
How Successfully can Decision-Making Style Predict the Orientation toward Well- or Ill-Structured Decision-Making Problems
来源期刊:Journal of CryptologyDOI:10.7441/joc.2019.01.07
Competitiveness in Higher Education: The Case of University Management
来源期刊:Journal of CryptologyDOI:10.7441/joc.2019.04.01
International Corporate Structuring of Slovak Companies Using Tax Havens
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.01.02
A Practical Forgery Attack on Lilliput-AE
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09333-z
The Effects of Entering the Eurozone on other Central and Eastern European Countries in Relation to Poland
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.01.01
Multi-theorem Preprocessing NIZKs from Lattices
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09324-0
Liquidity values in municipal accounting in the Czech Republic
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.01.06
Blockcipher-Based Authenticated Encryption: How Small Can We Go?
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09325-z
Determining Probabilities for a Commercial Risk Model of Czech Exports to China with Respect to Cultural Differences and in Financial Management
来源期刊:Journal of CryptologyDOI:10.7441/joc.219.03.07
Do selected tax advantages affect tax revenue from the personal income tax
来源期刊:Journal of CryptologyDOI:10.7441/joc.2019.04.05
The Communication Complexity of Private Simultaneous Messages, Revisited
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09334-y
From Minicrypt to Obfustopia via Private-Key Functional Encryption
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09327-x
Design and Experimental Evaluation of integrated orientation estimation algorithm Autonomous Underwater Vehicle Based on Indirect Complementary Filter
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.1.47
Design Supplementary Controller Based on Stabilizing Effect of Delay for Damping Inter Area Oscillations in a Power System
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.2.43
Robust Controller Design Based on Sliding Mode Observer in The Presence of Uncertainties and Actuator Saturation
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.2.23
Compact Adaptively Secure ABE for NC1 from k-Lin
来源期刊:J. Cryptol.DOI:10.1007/s00145-019-09335-x
The Impact of Stocks and Bonds on Pension Fund Performance
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.02.02
Presenting an Optimized Combinational Controller based on NSGA-II for Boost Switching Converter
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.1.57
From Quality to Quantity and Vice Versa: How to Evaluate Performance in the Budgetary Control Process
来源期刊:Journal of CryptologyDOI:10.7441/JOC.2019.01.04
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09329-9
Identification and Adaptive Position and Speed Control of Permanent Magnet DC Motor with Dead Zone Characteristics Based on Support Vector Machines
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.2.53
Generic Attacks on Hash Combiners
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09328-w
طراحی یک کنترل کننده ترکیبی ANFIS+PID برای کنترل بازوی ربات شش درجه آزادی و تحلیل همگرایی خطای آن
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.3.51
Design and stability analysis of optimal controller and observer for Itô stochastic model of active vehicle suspension system
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.3.71
Implementation of Roll Angle and Angular Velocity Estimation Algorithm for a High-Speed Projectile Using Accelerometers Output Data
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.2.67
Cryptanalytic Time–Memory–Data Trade-offs for FX-Constructions and the Affine Equivalence Problem
来源期刊:Journal of CryptologyDOI:10.1007/s00145-019-09332-0
Local stabilization for a class of nonlinear impulsive switched system with non-vanishing uncertainties under a norm-bounded control input
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.1.21
European States in a Bout of Corporate Tax Competition
来源期刊:Journal of CryptologyDOI:10.7441/joc.2019.03.02
Optimal Robust Control for a Series Elastic Actuator assisting Knee Joint
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.2.1
Persian sign language detection based on normalized depth image information
来源期刊:Journal of CryptologyDOI:10.29252/JOC.13.3.29