The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DDH with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-2003 (24) 2004-2005 (20) 2006-2007 (21) 2008 (16) 2009-2011 (16) 2012-2015 (15) 2016-2018 (16) 2019-2021 (17) 2022-2023 (20) 2024 (4)
Publication types (Num. hits)
article(51) incollection(1) inproceedings(117)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 56 occurrences of 46 keywords

Results
Found 169 publication records. Showing 169 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
126Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protocol Security, Provable Scurity, Computational Soundness, Diffie-Hellman Assumptions
112Rosario Gennaro, Hugo Krawczyk, Tal Rabin Secure Hashed Diffie-Hellman over Non-DDH Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
65Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan Hybrid Damgård Is CCA1-Secure under the DDH Assumption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems
64Anna Lysyanskaya Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Unique signatures, verifiable random functions, application of groups with DH-DDH separation
55Ratna Dutta, Rana Barua Constant Round Dynamic Group Key Agreement. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DDH problem, provable security, group key agreement
44Allison B. Lewko, Brent Waters Efficient pseudorandom functions from the decisional linear assumption and weaker variants. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF decisional linear assumption, pseudorandom functions
44Adam L. Young, Moti Yung Relationships Between Diffie-Hellman and "Index Oracles". Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Diffie-Hellman (DH), Computational Diffie-Hellman, Decision Diffie-Hellman, JDL, LDL, Public Key Cryptography, Oracles, Black-Box Reductions, Discrete-Log
44Yevgeniy Dodis Efficient Construction of (Distributed) Verifiable Random Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Kaoru Kurosawa, Ryo Nojima Simple Adaptive Oblivious Transfer without Random Oracle. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adaptive OT, Fully Simulatable, DDH, Standard Model
41Jun Shao, Zhenfu Cao CCA-Secure Proxy Re-encryption without Pairings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance
40HongDa Li 0001, Bao Li 0001 Existence of 3-round zero-knowledge proof systems for NP. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF non-black-box simulation, DDH assumption, zero-knowledge proof, interactive proof
40Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF matrix semigroup action, DDH problem, public key cryptosystem, semantically secure
40Raylin Tso, Takeshi Okamoto, Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature
40Junghyun Nam, Seungjoo Kim, Dongho Won Secure Group Communications over Combined Wired and Wireless Networks. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF combined wired and wireless networks, DDH assumption, mobile devices, Group key agreement
38Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu 0001 Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Alexander W. Dent, Steven D. Galbraith Hidden Pairings and Trapdoor DDH Groups. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Toru Nakanishi 0001, Nobuo Funabiki A short anonymously revocable group signature scheme from decision linear assumption. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymity, group signature, revocation
29Ali Bagherzandi, Stanislaw Jarecki Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Tengjiao Wang 0003, Bishan Yang, Jun Gao 0003, Dongqing Yang Effective Data Distribution and Reallocation Strategies for Fast Query Response in Distributed Query-Intensive Data Environments. Search on Bibsonomy APWeb The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data reallocation, query response, data distribution
29Dennis Hofheinz, Eike Kiltz Secure Hybrid Encryption from Weakened Key Encapsulation. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. Search on Bibsonomy FoSSaCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Matthieu Gaud, Jacques Traoré On the Anonymity of Fair Offline E-cash Systems. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Daniele Micciancio, Erez Petrank Simulatable Commitments and Efficient Concurrent Zero-Knowledge. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Ran Canetti, Shafi Goldwasser An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Dan Boneh The Decision Diffie-Hellman Problem. Search on Bibsonomy ANTS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Han Jiang 0001, Qiuliang Xu, Changyuan Liu, Zhihua Zheng, Yi Tang, Mingqiang Wang Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Pedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto Rate-1 Fully Local Somewhere Extractable Hashing from DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
23Pedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto Rate-1 Fully Local Somewhere Extractable Hashing from DDH. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu Twinkle: Threshold Signatures from DDH with Full Adaptive Security. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Sourav Das, Ling Ren 0001 Adaptively Secure BLS Threshold Signatures from DDH and co-CDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
23Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu Twinkle: Threshold Signatures from DDH with Full Adaptive Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
23Arthur Lazzaretti, Charalampos Papamanthou TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
23Théophile Brézot, Paola de Perthuis, David Pointcheval Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
23Peihan Miao 0001, Sikhar Patranabis, Gaven J. Watson Unidirectional Updatable Encryption and Proxy Re-encryption from DDH. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Zicheng Zhang, Yingjie Zhou, Wei Sun 0029, Wei Lu 0021, Xiongkuo Min, Yu Wang, Guangtao Zhai DDH-QA: A Dynamic Digital Humans Quality Assessment Database. Search on Bibsonomy ICME The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Théophile Brézot, Paola de Perthuis, David Pointcheval Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. Search on Bibsonomy ESORICS (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Arthur Lazzaretti, Charalampos Papamanthou TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH. Search on Bibsonomy CRYPTO (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain 0002, Zhengzhong Jin, Jiaheng Zhang Correlation Intractability and SNARGs from Sub-exponential DDH. Search on Bibsonomy CRYPTO (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Eiichiro Fujisaki Improving Practical UC-Secure Commitments based on the DDH Assumption. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Hui Wang 0040, Yang Jin, Hongchang Ke, Xinping Zhang DDH-YOLOv5: improved YOLOv5 based on Double IoU-aware Decoupled Head for object detection. Search on Bibsonomy J. Real Time Image Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Zicheng Zhang, Yingjie Zhou, Wei Sun 0029, Wei Lu 0021, Xiongkuo Min, Yu Wang, Guangtao Zhai DDH-QA: A Dynamic Digital Humans Quality Assessment Database. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Dario Catalano, Dario Fiore 0001, Emanuele Giunta Adaptively Secure Single Secret Leader Election from DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan SNARGs for P from Sub-exponential DDH and QR. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Peihan Miao 0001, Sikhar Patranabis, Gaven J. Watson Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain 0002, Zhengzhong Jin, Jiaheng Zhang Correlation Intractability and SNARGs from Sub-exponential DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Takuya Tsuruta, Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki A Study on a DDH-Based Keyed Homomorphic Encryption Suitable to Machine Learning in the Cloud. Search on Bibsonomy ICCE-TW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan SNARGs for P from Sub-exponential DDH and QR. Search on Bibsonomy EUROCRYPT (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Dario Catalano, Dario Fiore 0001, Emanuele Giunta Adaptively Secure Single Secret Leader Election from DDH. Search on Bibsonomy PODC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Olivier Blazy, Saqib A. Kakvi Identity-Based Encryption in DDH Hard Groups. Search on Bibsonomy AFRICACRYPT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Masayuki Fukumitsu, Shingo Hasegawa A Tightly Secure DDH-based Multisignature with Public-Key Aggregation. Search on Bibsonomy Int. J. Netw. Comput. The full citation details ... 2021 DBLP  BibTeX  RDF
23Abhishek Jain 0002, Zhengzhong Jin Non-Interactive Zero Knowledge from Sub-exponential DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
23Abhishek Jain 0002, Zhengzhong Jin Non-interactive Zero Knowledge from Sub-exponential DDH. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Fazail Amin, Arijit Mondal, Jimson Mathew WLAMr-DDH: Weighted Laterals With Augmentation Mask for Discriminative Deep Hashing for Face Image Retrieval. Search on Bibsonomy IJCNN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Saikrishna Badrinarayanan, James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee Reusable Two-Round MPC from DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23Péter Kutas, Christophe Petit 0001, Javier Silva 0001 Trapdoor DDH Groups from Pairings and Isogenies. Search on Bibsonomy SAC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee Reusable Two-Round MPC from DDH. Search on Bibsonomy TCC (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Masayuki Fukumitsu, Shingo Hasegawa A Tightly Secure DDH-based Multisignature with Public-Key Aggregation. Search on Bibsonomy CANDAR (Workshops) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Seok-min Hwang, Hee-Jun Park, Jong-Ha Lee A Study on a Mask R-CNN-Based Diagnostic System Measuring DDH Angles on Ultrasound Scans. Search on Bibsonomy IHCI (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Arunkumar Kannan, Antony J. Hodgson, Kishore Mulpuri, Rafeef Garbi Uncertainty Estimation for Assessment of 3D US Scan Adequacy and DDH Metric Reliability. Search on Bibsonomy UNSURE/GRAIL@MICCAI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Péter Kutas, Christophe Petit 0001, Javier Silva 0001 Trapdoor DDH groups from pairings and isogenies. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Duc-Phong Le, Guomin Yang, Ali A. Ghorbani 0001 DDH-based Multisignatures with Public Key Aggregation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Shuichi Katsumata, Shota Yamada 0001 Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Keitaro Hashimoto, Wakaha Ogata, Toi Tomita Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Shuichi Katsumata, Shota Yamada 0001 Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Kresimir Nenadic, Tomislav Galba, Irena Galic Image processing in differential digital holography (DDH). Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2018 DBLP  BibTeX  RDF
23Tibor Jager, Rafael Kurek, Jiaxin Pan Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
23Tibor Jager, Rafael Kurek, Jiaxin Pan Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Benoît Libert, Thomas Peters, Chen Qian 0002 Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption. Search on Bibsonomy ESORICS (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Akshayaram Srinivasan, Chandrasekaran Pandu Rangan Efficiently Obfuscating Re-Encryption Program Under DDH Assumption. Search on Bibsonomy ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Huijia Lin, Vinod Vaikuntanathan Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Eiichiro Fujisaki Improving Practical UC-Secure Commitments based on the DDH Assumption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Elette Boyle, Niv Gilboa, Yuval Ishai Breaking the Circuit Size Barrier for Secure Computation Under DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Huijia Lin Indistinguishability Obfuscation from DDH on 5-linear Maps and Locality-5 PRGs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Abhilash Rakkunedeth Hareendranathan, Myles Mabee, Kumaradevan Punithakumar, Michelle Noga, Jacob L. Jaremko Toward automated classification of acetabular shape in ultrasound for diagnosis of DDH: Contour alpha angle and the rounding index. Search on Bibsonomy Comput. Methods Programs Biomed. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Huijia Lin, Vinod Vaikuntanathan Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings. Search on Bibsonomy FOCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Abhilash Rakkunedeth Hareendranathan, Dornoosh Zonoobi, Myles Mabee, Chad Diederichs, Kumaradevan Punithakumar, Michelle Noga, Jacob L. Jaremko Hip segmentation from MRI volumes in infants for DDH diagnosis and treatment planning. Search on Bibsonomy EMBC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Muhammad Salman, Muhammad Asif Aziz, Munam Ali Shah Simulation based evaluation of DDH-MAC protocol for Cognitive Radio Networks. Search on Bibsonomy ICAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23David Golan, Yoni Donner, Chris Mansi, Jacob L. Jaremko, Manoj Ramachandran Fully Automating Graf's Method for DDH Diagnosis Using Deep Convolutional Neural Networks. Search on Bibsonomy LABELS/DLMIA@MICCAI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Eiichiro Fujisaki Improving Practical UC-Secure Commitments Based on the DDH Assumption. Search on Bibsonomy SCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Elette Boyle, Niv Gilboa, Yuval Ishai Breaking the Circuit Size Barrier for Secure Computation Under DDH. Search on Bibsonomy CRYPTO (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit 0001 Short Accountable Ring Signatures Based on DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Guilhem Castagnos, Fabien Laguillaumie Linearly Homomorphic Encryption from DDH. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Akshayaram Srinivasan, C. Pandu Rangan Efficiently Obfuscating Re-Encryption Program under DDH Assumption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Areen K. Al-Bashir, Mohammad A. Al-Abed, Fayez M. Abu Sharkh, Mohamed N. Kordeya, Fadi M. Al-Rousan Algorithm for automatic angles measurement and screening for Developmental Dysplasia of the Hip (DDH). Search on Bibsonomy EMBC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Guilhem Castagnos, Fabien Laguillaumie Linearly Homomorphic Encryption from $$\mathsf {DDH}$$. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit 0001 Short Accountable Ring Signatures Based on DDH. Search on Bibsonomy ESORICS (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Yannick Seurin New Constructions and Applications of Trapdoor DDH Groups. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
23Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen Efficient leakage-resilient public key encryption from DDH assumption. Search on Bibsonomy Clust. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Yannick Seurin New Constructions and Applications of Trapdoor DDH Groups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Dingding Jia, Xianhui Lu, Bao Li 0001, Qixiang Mei RKA Secure PKE Based on the DDH and HR Assumptions. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis How powerful are the DDH hard groups? Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 2012 DBLP  BibTeX  RDF
23Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis How powerful are the DDH hard groups? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
23Shengli Liu 0001, Fangguo Zhang, Kefei Chen Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Brett Hemenway, Rafail Ostrovsky Extended-DDH and Lossy Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel DDH-Like Assumptions Based on Extension Rings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23 DDH Problem. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Xiaodong Lin 0001 A provably secure threshold signature scheme based on DDH assumption. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Yehuda Lindell Highly-Efficient Universally-Composable Commitments based on the DDH Assumption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 169 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license