Pages that link to "Template:Reflist"
The following pages link to Template:Reflist:
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation (transclusion) (← links)
- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes (transclusion) (← links)
- Tight Proofs for Signature Schemes without Random Oracles (transclusion) (← links)
- Kubernetes (transclusion) (← links)
- Position-Based Quantum Cryptography: Impossibility and Constructions (transclusion) (← links)
- Template:Infobox software (transclusion) (← links)
- Template:Infobox software/doc (transclusion) (← links)
- Time-Lock Puzzles in the Random Oracle Model (transclusion) (← links)
- MongoDB (transclusion) (← links)
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 (transclusion) (← links)
- Classical Cryptographic Protocols in a Quantum World (transclusion) (← links)
- Optimal Verification of Operations on Dynamic Sets (transclusion) (← links)
- Secret Keys from Channel Noise (transclusion) (← links)
- Domain Extension for MACs Beyond the Birthday Barrier (transclusion) (← links)
- Improved Generic Algorithms for Hard Knapsacks (transclusion) (← links)
- Effcient Non-Interactive Secure Computation (transclusion) (← links)
- SoK: Secure Messaging (transclusion) (← links)
- Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities (transclusion) (← links)
- Zerocoin Anonymous Distributed E-Cash from Bitcoin (transclusion) (← links)
- Short Pairing-Based Non-interactive Zero-Knowledge Arguments (transclusion) (← links)
- Confidential Signatures and Deterministic Signcryption (transclusion) (← links)
- On the Feasibility of Consistent Computations (transclusion) (← links)
- Riak (transclusion) (← links)
- Apache ZooKeeper (transclusion) (← links)
- MapReduce (transclusion) (← links)
- CoreOS (transclusion) (← links)
- Apache Hadoop (transclusion) (← links)
- A Closer Look at Anonymity and Robustness in Encryption Schemes (transclusion) (← links)
- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions (transclusion) (← links)
- Generic Compilers for Authenticated Key Exchange (transclusion) (← links)
- OpenVZ (transclusion) (← links)
- P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets (transclusion) (← links)
- On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems (transclusion) (← links)
- Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing (transclusion) (← links)
- A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework (transclusion) (← links)
- Haskell (programming language) (transclusion) (← links)
- Computer-Aided Security Proofs for the Working Cryptographer (transclusion) (← links)
- Memory Delegation (transclusion) (← links)
- Leakage-Resilient Zero Knowledge (transclusion) (← links)
- Cryptography with Tamperable and Leaky Memory (transclusion) (← links)
- Merkle Puzzles in a Quantum World (transclusion) (← links)
- Haxe (transclusion) (← links)
- Apache Marmotta (transclusion) (← links)
- Oxygene (programming language) (transclusion) (← links)
- Go (programming language) (transclusion) (← links)
- GLSL (OpenGL Shading Language) (transclusion) (← links)
- Redis (transclusion) (← links)
- Constant-Size Commitments to Polynomials and Their Applications (transclusion) (← links)
- Rexx (REstructured eXtended eXecutor) (transclusion) (← links)
- ZeroVM (transclusion) (← links)