Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Concrete security

Known as: Asymptotic security, Concrete security model 
In cryptography, concrete security or exact security is a practice-oriented approach that aims to give more precise estimates of the computational… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Thank you for reading design and control of concrete mixtures. Maybe you have knowledge that, people have look numerous times for… Expand
Is this relevant?
Highly Cited
2015
Highly Cited
2015
This study reports the synthesis and characterization of geopolymer foam concrete (GFC). A Class F fly ash with partial slag… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 10
  • figure 11
Is this relevant?
Highly Cited
2015
Highly Cited
2015
This paper presents an experimental study on shear strengthening of rectangular reinforced concrete (RC) beams with advanced… Expand
  • figure 1
  • figure 3
  • table 1
  • table 2
  • figure 4
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Abstract This paper presents an experimental and an analytical investigation of the behavior of Reinforced Concrete (RC) beams… Expand
  • table 1
  • table 3
  • table 4
  • table 5
  • table 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A method and an apparatus for setting up a concrete form for the subsequent forming of a concrete member therein and for… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Most seismic codes specify empirical formulas to estimate the fundamental vibration period of buildings. Evaluated first in this… Expand
  • table 1
  • figure 2
  • figure 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. We give four different… Expand
  • figure 1
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Most seismic codes specify empirical formulas to estimate the fundamental vibration period of buildings. Evaluated first in this… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Pseudorandom function families are a powerful cryptographic primitive, yielding, in particular simple solutions for the main… Expand
Is this relevant?