The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
136Jonathan Katz Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). Search on Bibsonomy SIGACT News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
83Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto Security-Mediated Certificateless Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security-mediated cryptography, certificateless cryptography
68Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
66Yih Huang, David Rine, Xunhua Wang A JCA-Based Implementation Framework for Threshold Cryptography. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
60Cryptography Editorial Office Acknowledgment to the Reviewers of Cryptography in 2022. Search on Bibsonomy Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
55Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
52Craig Gentry, Alice Silverberg Hierarchical ID-Based Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF hierarchical identity-based cryptography, elliptic curves, identity-based cryptography, pairing-based cryptography
51Marc Joye, Christophe Tymen Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms
51Ian Grigg Financial Cryptography in 7 Layers. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
49Shafi Goldwasser New Directions in Cryptography: Twenty Some Years Later. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF probabilistic proof systems, cryptography, cryptography, complexity theory, interactive proof systems, pseudo random number generation
49Tom Tedrick On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF History of Cryptography, History of War, Theory of War, Abstract Protocol Theory, Game Theoretic Cryptography, Rommel, ULTRA, Cryptographic Protocols
49Phong Q. Nguyen Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP
48Mary Ellen Zurko, Andrew S. Patrick Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF User-centered security, cryptography
48Walid Bagga, Refik Molva Policy-Based Cryptography and Applications. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Privacy, Authorization, Policy, Credentials, ID-based Cryptography
48Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai Toward Fair International Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party
47Eli Biham, Yaron J. Goren, Yuval Ishai Basing Weak Public-Key Cryptography on Strong One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model
46Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson What can identity-based cryptography offer to web services? Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message-level security, web services, identity-based cryptography
46Lei Zhang 0009, Futai Zhang, Wei Wu 0001 A Provably Secure Ring Signature Scheme in Certificateless Cryptography. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography
46Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Superscalar Coprocessor for High-Speed Curve-Based Cryptography. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF curve-based cryptography, HECC, ECC, instruction-level parallelism, scalar multiplication, Superscalar, coprocessor
45Jean-Claude Bajard, Laurent Imbert, Thomas Plantard Modular Number Systems: Beyond the Mersenne Family. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Generalized Mersenne numbers, Elliptic curve cryptography, Montgomery multiplication
43Wil Michiels Opportunities in White-Box Cryptography. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF black-box cryptography, gray-box cryptography, white-box cryptography, crypto corner, cryptography, security & privacy
43Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter How public key cryptography influences wireless sensor node lifetime. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor networks, performance, complexity, cryptography, RSA, elliptic curve cryptography
43Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff Practical Cryptography in High Dimensional Tori. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF torus-based cryptography, discrete-log based cryptography
43Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce Improved topology assumptions for threshold cryptography in mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed cryptography, mobile ad hoc networks, threshold cryptography, threshold signatures
43Zhi Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo Halftone visual cryptography. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Xuhua Ding, Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mediated RSA, revocation, Identity-based encryption
43Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson Constructions and Bounds for Visual Cryptography. Search on Bibsonomy ICALP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
43Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval Distributed Public-Key Cryptography from Weak Secrets. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Kiyomichi Araki, Takakazu Satoh, Shinji Miura Overview of Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
43Jacques Stern Lattices and Cryptography: An Overview. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Vivien Dubois, Louis Granboulan, Jacques Stern Cryptanalysis of HFE with Internal Perturbation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internal perturbation, binary vector spaces, differential cryptanalysis, multivariate cryptography, HFE
42Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 Generic On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic
42Jintai Ding, Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate
42Christophe Doche, Thomas Icart, David R. Kohel Efficient Scalar Multiplication by Isogeny Decompositions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast arithmetic, efficiently computable isogenies, efficient tripling, ?-adic, Elliptic curve cryptography
42Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography
42Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems
42Kaoru Kurosawa, Swee-Huay Heng From Digital Signature to ID-based Identification/Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GDH group, signature scheme, ID-based cryptography, identification scheme
42David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
42Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
42Nicolas T. Courtois, Magnus Daum, Patrick Felke On the Security of HFE, HFEv- and Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields
42Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin A Fast and Secure Implementation of Sflash. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE
42Nicolas T. Courtois Generic Attacks and the Security of Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Asymmetric cryptography, Hidden Field Equations (HFE), MQ, HFEv-, Quartz, finite fields, Flash, short signatures, Nessie, Sflash
42Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
40Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, authentication, pervasive computing, Elliptic Curve Cryptography, key-distribution, hardware implementation
40Carlos Roberto Moratelli, Érika F. Cota, Marcelo Lubaszewski A cryptography core tolerant to DFA fault attacks. Search on Bibsonomy SBCCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, smart cards, fault attacks
39Benoît Libert, Jean-Jacques Quisquater On Constructing Certificateless Cryptosystems from Identity Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF provable security, bilinear maps, Certificateless encryption
39Liqun Chen 0002, John Malone-Lee Improved Identity-Based Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Nick Mathewson, Roger Dingledine Mixminion: Strong Anonymity for Financial Cryptography. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Florian Hess, Gadiel Seroussi, Nigel P. Smart Two Topics in Hyperelliptic Cryptography. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
39Frédéric Amiel, Benoit Feix, Karine Villegas Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF arithmetic coprocessors, reverse engineering, Public key cryptography, side-channel analysis, exponentiation
39Jaap-Henk Hoepman Secret Key Authentication with Software-Only Verification. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF symmetric key cryptography, authentication, smart cards
39Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan Simultaneous Hardcore Bits and Cryptography against Memory Attacks. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Silvio Micali, Leonid Reyzin Physically Observable Cryptography (Extended Abstract). Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Gunnar Gaubatz, Berk Sunar Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF homomorphic embedding, modulus scaling, fault tolerance, error detection, public-key cryptography, arithmetic codes, Finite field arithmetic, cyclic codes, idempotency
38M. R. Oberman Communication Security in Remote controlled Computer Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF cryptography, remote control, Communication security
38Alexander Klimm, Oliver Sander, Jürgen Becker 0001, Sylvain Subileau A Hardware/Software Codesign of a Co-processor for Real-Time Hyperelliptic Curve Cryptography on a Spartan3 FPGA. Search on Bibsonomy ARCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hyperelliptic Curve Cryptography (HECC), FPGA, embedded systems, Public Key Cryptography (PKC), reconfigurable hardware
38Olivier Billet, Henri Gilbert Cryptanalysis of Rainbow. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow
38Wei Ming Lim, Mohammed Benaissa Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and cryptography. Search on Bibsonomy CODES+ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GF(2m) arithmetic, forward error control coding, galois field processor, cryptography, advanced encryption standard, elliptic curve cryptography, design space exploration, Reed-Solomon code, hardware-software co-design, BCH code
38Rajni Goel, Moses Garuba, Anteneh Girma Research Directions in Quantum Cryptography. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38James L. Massey Whither Cryptography? Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya Secret Key Cryptography with Cellular Automata. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Chin-Chen Chang 0001, Tai-Xing Yu Sharing a Secret Gray Image in Multiple Images. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secret sharing, Visual cryptography
37Shuai Han 0001, Shengli Liu 0001, Dawu Gu More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
37Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, Bogdan Ursu On Structure-Preserving Cryptography and Lattices. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
37Yuyu Wang 0001, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
37Carsten Baum, Ariel Nof Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
37Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter 0001 Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
37Jiang Zhang 0001, Yu Yu 0001, Shuqin Fan, Zhenfeng Zhang, Kang Yang 0002 Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
37Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
37Mihir Bellare, Viet Tung Hoang Adaptive Witness Encryption and Asymmetric Password-Based Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
37Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia Cryptography Using Captcha Puzzles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
37Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang Public-Key Cryptography from New Multivariate Quadratic Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
37Ali Juma, Yevgeniy Vahlis, Moti Yung Multi-location Leakage Resilient Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
37Vinod Vaikuntanathan New Developments in Leakage-Resilient Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
37Jintai Ding, Christopher Wolf, Bo-Yin Yang l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trapdoor, Encryption, Public Key, Signing
37Yair Frankel, Philip D. MacKenzie, Moti Yung "Psyeudorandom Intermixing": A Tool for Shared Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Byoungcheon Lee Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Unified public key infrastructure, Private key issuing protocol, Key generation and certification authority, Key privacy agent, Certificate-based cryptography, Hybrid cryptography, Bilinear pairing, ID-based cryptography
35Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, implementation, Elliptic Curve Cryptography, pairings, cryptographic primitives
35Alasdair McAndrew Teaching cryptography with open-source software. Search on Bibsonomy SIGCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptography, computer science education, open-source software, discrete mathematics, exploratory learning
35Ambrose Chu, Scott Miller, Mihai Sima Reconfigurable solutions for very-long arithmetic with applications in cryptography. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF field-programmable gate arrays, embedded systems, cryptography, reconfigurable computing
35Dagmar Bruß, Gábor Erdélyi, Tim Meyer, Tobias Riege, Jörg Rothe Quantum cryptography: A survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Quantum bit commitment, quantum cryptography, quantum key distribution
35Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi Security Mediated Certificateless Signatures. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security mediated, SMC cryptography, certificateless
35Jean-Sébastien Coron What Is Cryptography? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, cryptography, PKI, public key
35Jacques J. A. Fournier, Simon W. Moore A Vector Approach to Cryptography Implementation. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, AES, RSA, vector architecture, Montgomery Modular Multiplication
35Stefan Tillich, Johann Großschädl A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m). Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF application-specific instruction set extension, binary finite fields, SPARC V8, multiply step instruction, Elliptic curve cryptography
35Gwo-Chin Tai, Long-Wen Chang Visual Cryptography for Digital Watermarking in Still Images. Search on Bibsonomy PCM (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wavelet packet transform, digital watermarking, Visual cryptography
35Chip Elliott, David Pearson, Gregory D. Troxel Quantum cryptography in practice. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure networks, cryptographic protocols, error correction, IPsec, quantum cryptography, key agreement protocols, privacy amplification, quantum key distribution
35Mohamed Al-Ibrahim, Anton Cerný Proxy and Threshold One-Time Signatures. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature
34Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation
34Yoshinori Aono A New Lattice Construction for Partial Key Exposure Attack for RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction
34Benoît Libert, Jean-Jacques Quisquater, Moti Yung Parallel Key-Insulated Public Key Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel key-insulated encryption, standard model, pairings
34Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang Anonymous Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Kaoru Kurosawa, Swee-Huay Heng The Power of Identification Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trapdoor commitment scheme, on-line/off-line, signature scheme, Identification scheme, identity-based
34Endre Bangerter, Jan Camenisch, Ueli M. Maurer Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Edith Elkind, Helger Lipmaa Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Andris Ambainis, Markus Jakobsson, Helger Lipmaa Cryptographic Randomized Response Techniques. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF randomized response technique, privacy, privacy-preserving data-mining, oblivious transfer, polling, binary symmetric channel
34Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001 Efficient ID-based Group Key Agreement with Bilinear Maps. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Dahlia Malkhi, Elan Pavlov Anonymity without 'Cryptography'. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF
34Wenbo Mao Timed-Release Cryptography. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 18658 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license