The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptology with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1981 (49) 1982 (39) 1983 (31) 1984 (81) 1985 (81) 1986 (41) 1987 (73) 1988 (88) 1989 (136) 1990 (141) 1991 (144) 1992 (137) 1993 (103) 1994 (126) 1995 (78) 1996 (105) 1997 (78) 1998 (147) 1999 (132) 2000 (178) 2001 (211) 2002 (211) 2003 (214) 2004 (213) 2005 (317) 2006 (277) 2007 (279) 2008 (290) 2009 (346) 2010 (307) 2011 (321) 2012 (336) 2013 (359) 2014 (391) 2015 (376) 2016 (443) 2017 (447) 2018 (428) 2019 (491) 2020 (481) 2021 (492) 2022 (510) 2023 (658) 2024 (122)
Publication types (Num. hits)
article(156) book(12) incollection(6) inproceedings(9969) phdthesis(12) proceedings(353)
Venues (Conferences, Journals, ...)
CRYPTO(1266) EUROCRYPT(1193) ASIACRYPT(685) ICISC(678) INDOCRYPT(669) CT-RSA(645) Inscrypt(527) CANS(518) AFRICACRYPT(336) CRYPTO (2)(319) CRYPTO (1)(317) ASIACRYPT (1)(296) ASIACRYPT (2)(290) EUROCRYPT (1)(260) EUROCRYPT (2)(248) CRYPTO (3)(211) More (+10 of total 157)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3467 occurrences of 1071 keywords

Results
Found 10508 publication records. Showing 10508 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
105Olivier Billet, Henri Gilbert A Traceable Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance
92Man Y. Rhee Research Activities on Cryptology in Korea. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
69Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
69Louis C. Guillou, Jean-Jacques Quisquater A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology
67Xiaomin Wang, Jiashu Zhang, Wenfang Zhang Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Nonlinear digital filter, Chaos, Cryptology, Keystream
61Selim G. Akl, Henk Meijer A Fast Pseudo Random Permutation Generator With Applications to Cryptology. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
59Phong Q. Nguyen The Two Faces of Lattices in Cryptology. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
59Phong Q. Nguyen, Jacques Stern The Two Faces of Lattices in Cryptology. Search on Bibsonomy CaLC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
59Michael Portz On the Use of Interconnection Networks in Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
53Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox
53Friedrich L. Bauer Cryptology - Methods and Maxims. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF cipher systems, computational complexity.Computing Reviews Classification: D.3, cryptography, cryptanalysis, encryption, Cryptology
49Ross J. Anderson Cryptology: Where Is the New Frontier? Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Karl Rubin, Alice Silverberg Supersingular Abelian Varieties in Cryptology. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Cees J. A. Jansen, Dick E. Boekee On the Significance of the Directed Acyclic Word Graph in Cryptology. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
48Andrew Chmora, Stephen B. Wicker (eds.) Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
48Mohssen Alabbadi, Stephen B. Wicker Susceptibility of Digital Signature Schemes Based on Error-Correcting Codes to Universal Forgery. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48I. L. Asnis, Sergei V. Fedorenko, E. A. Krouk, E. T. Mironchikov Tables of Coverings for Decoding by S-Sets. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Vladimir Sidorenko Periodicity of One-Dimensional Tilings. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48G. R. Blakley, Gregory Kabatianskii Linear Algebra Approach to Secret Sharing Schemes. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Irina E. Bocharova, Boris D. Kudryashov Fast Infinite Response Filtering for Speech Processing. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Miodrag J. Mihaljevic On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Uwe Dettmar, Ulrich K. Sorger, Victor V. Zyablov Concatenated Codes with Convolutional Inner and Outer Codes. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Ernst M. Gabidulin, Vitaly V. Zanin Codes that Correct Two-Dimensional Burst Errors. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Felix A. Taubin Reduced-State Decoding for Trellis Coded Modulation on Nonlinear Intersymbol Interference Channels. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Ernst M. Gabidulin, Olaf Kjelsen How to Avoid the Sidel'nikov-Shestakov Attack. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Irina E. Bocharova, Victor D. Kolesnik, Victor Yu. Krachkovsky, Boris D. Kudryashov, Eugeny P. Ovsjannikov, Boris K. Troyanovsky On Trellis Codes for Linear Predictive Speech Compression. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Tor Helleseth, Torleiv Kløve, Øyvind Ytrehus Generalizations of the Griesmer Bound. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Victor V. Zyablov, Alexei E. Ashikhmin Partial Unit Memory Codes on the Base of Subcodes of Hadamard Codes. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48Victor V. Zyablov, Vladimir Sidorenko On Periodic (Partial) Unit Memory Codes with Maximum Free Distance. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48V. A. Artamonov, A. A. Klyachko, V. M. Sidelnikov, V. V. Yashchenko Algebraic Aspects of Key Generation Systems. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
48I. M. Boyarinov Self-Checking Decoding Algorithm for Reed-Solomon Codes. Search on Bibsonomy Error Control, Cryptology, and Speech Compression The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
47Mahabir Prasad Jhanwar, Rana Barua Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA Group, Free Group, Quadratic Residues
47Shahram Khazaei, Willi Meier New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Self-synchronizing Stream Ciphers, T-functions, Key Recovery
47Souradyuti Paul, Bart Preneel On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Claus Diem The XL-Algorithm and a Conjecture from Commutative Algebra. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Salil P. Vadhan On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Shujun Li, Xuanqin Mou, Yuanlong Cai Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
47John O. Pliam On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
47Martín Abadi Taming the Adversary. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
47Gilles Brassard Quantum Information Processing: The Good, the Bad and the Ugly. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
47Jürgen Bierbrauer, K. Gopalakrishnan 0001, Douglas R. Stinson Bounds for Resilient Functions and Orthogonal Arrays. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
47Ernest F. Brickell A Survey of Hardware Implementation of RSA (Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
47Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
47Wyn L. Price Progress in Data Security Standardization. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
45Arto Salomaa Caesar and DNA. Views on Cryptology. Search on Bibsonomy FCT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
45Ernst S. Selmer From the Memoirs of a Norwegian Cryptologist. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
45James L. Massey In Memoriam Tore Herlestam (1929 - 1986). Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
44Jean-Charles Faugère, Ludovic Perret High order derivatives and decomposition of multivariate polynomials. Search on Bibsonomy ISSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF gröbner basis, multivariate cryptology, public key cryptography, cryptology, algebraic cryptanalysis, f5 algorithm
43Junfeng Fan, Lejla Batina, Ingrid Verbauwhede Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Bart Preneel The Future of Cryptographic Algorithms. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Jean-Charles Faugère Interactions between computer algebra (Gröbner bases) and cryptology. Search on Bibsonomy ISSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF gröbner basis, public key, cryptology, algebraic cryptanalysis, multivariate cryptography, f5 algorithm
38Marie-Jeanne Toussaint Separating the Specification and Implementation Phases in Cryptology. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF knowledge state, protocol execution tree, security, formal verification, cryptographic protocol, cryptology
36Changxiang Shen, Huanguo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang Survey of information security. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network security, information security, information hiding, trusted computing, cryptology
36Jesús Adolfo García-Pasquel, José Galaviz Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF classical cryptography, Cryptology
36Wontae Hwang, Dongseung Kim Load Balanced Block Lanczos Algorithm over GF(2) for Factorization of Large Keys. Search on Bibsonomy HiPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF parallel/cluster computing, RSA key, load balancing, sparse matrix, cryptology
36Jiqiang Lu Security Weaknesses in Two Proxy Signature Schemes. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key cryptology, Proxy signature, Forgery attack
33Hwajeong Seo, Suhri Kim (eds.) Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I Search on Bibsonomy ICISC (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
33Hwajeong Seo, Suhri Kim (eds.) Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II Search on Bibsonomy ICISC (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
33Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro (eds.) Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I Search on Bibsonomy INDOCRYPT (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
33Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro (eds.) Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II Search on Bibsonomy INDOCRYPT (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
33Jian Guo 0001, Ron Steinfeld (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jian Guo 0001, Ron Steinfeld (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jian Guo 0001, Ron Steinfeld (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VII Search on Bibsonomy ASIACRYPT (7) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jian Guo 0001, Ron Steinfeld (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jian Guo 0001, Ron Steinfeld (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jian Guo 0001, Ron Steinfeld (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V Search on Bibsonomy ASIACRYPT (5) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jian Guo 0001, Ron Steinfeld (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jian Guo 0001, Ron Steinfeld (eds.) Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII Search on Bibsonomy ASIACRYPT (8) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Abdelrahaman Aly, Mehdi Tibouchi (eds.) Progress in Cryptology - LATINCRYPT 2023 - 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings Search on Bibsonomy LATINCRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Nadia El Mrabet, Luca De Feo, Sylvain Duquesne (eds.) Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Helena Handschuh, Anna Lysyanskaya (eds.) Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV Search on Bibsonomy CRYPTO (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Helena Handschuh, Anna Lysyanskaya (eds.) Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I Search on Bibsonomy CRYPTO (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Helena Handschuh, Anna Lysyanskaya (eds.) Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III Search on Bibsonomy CRYPTO (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Helena Handschuh, Anna Lysyanskaya (eds.) Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part V Search on Bibsonomy CRYPTO (5) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Helena Handschuh, Anna Lysyanskaya (eds.) Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II Search on Bibsonomy CRYPTO (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Vasily Mikhalev, Nils Kopal, Bernhard Esslinger, Michelle Waldispühl, Benedek Láng, Beáta Megyesi What is the Code for the Code? Historical Cryptology Terminology. Search on Bibsonomy HistoCrypt The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Eunice Kim, Christian Millichap Deciphering Secrets Throughout History: An Interdisciplinary Linguistics and Cryptology Course. Search on Bibsonomy HistoCrypt The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Qian Guo 0001, Denis Nabokov, Alexander Nilsson, Thomas Johansson 0001 SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Andre Esser 0001, Rahul Girme, Arindam Mukherjee 0003, Santanu Sarkar 0001 Memory-Efficient Attacks on Small LWE Keys. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont Quantitative Fault Injection Analysis. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Alain Couvreur, Rocco Mora, Jean-Pierre Tillich A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jonas Meers, Julian Nowakowski Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Alexander May 0001, Julian Nowakowski Too Many Hints - When LLL Breaks LWE. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Haodong Jiang, Zhi Ma 0001, Zhenfeng Zhang Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Dominique Unruh Towards Compressed Permutation Oracles. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Jiaxin Pan, Benedikt Wagner, Runzhi Zeng Tighter Security for Generic Authenticated Key Exchange in the QROM. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Maxime Plançon Exploiting Algebraic Structures in Probing Security. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Felix Dörre, Jeremias Mechler, Jörn Müller-Quade Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Kaijie Jiang, Anyu Wang 0001, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption. Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Yi Wang 0055, Rongmao Chen, Xinyi Huang 0001, Moti Yung Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp 0001 The Pre-Shared Key Modes of HPKE. Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Srinivasan Raghuraman, Yibin Yang 0001 Just How Fair is an Unreactive World? Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Brice Minaud, Michael Reichle Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption. Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Long Chen 0018, Hui Guo, Ya-Nan Li, Qiang Tang 0005 Efficient Secure Storage with Version Control and Key Rotation. Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Antonio Guimarães, Hilder V. L. Pereira, Barry Van Leeuwen Amortized Bootstrapping Revisited: Simpler, Asymptotically-Faster, Implemented. Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Hiroki Okada 0001, Rachel Player, Simon Pohmann Homomorphic Polynomial Evaluation Using Galois Structure and Applications to BFV Bootstrapping. Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 10508 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license