|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 917 occurrences of 351 keywords
|
|
|
Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
331 | Feng Bao 0001, Robert H. Deng, Huafei Zhu |
Variations of Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 301-312, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Square Diffie-Hellman problem, Inverse Diffie-Hellman problem, Divisible Diffie-Hellman problem, Diffie-Hellman problem |
265 | Adam L. Young, Moti Yung |
Relationships Between Diffie-Hellman and "Index Oracles". ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 16-32, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Diffie-Hellman (DH), Computational Diffie-Hellman, Decision Diffie-Hellman, JDL, LDL, Public Key Cryptography, Oracles, Black-Box Reductions, Discrete-Log |
185 | David Cash, Eike Kiltz, Victor Shoup |
The Twin Diffie-Hellman Problem and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 127-145, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
166 | Antoine Joux, Kim Nguyen |
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 16(4), pp. 239-247, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Elliptic curve, Discrete logarithm, Diffie-Hellman, Weil pairing |
150 | Benoît Libert, Jean-Jacques Quisquater |
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 187-200, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Gap Diffie-Hellman groups, provable security, signcryption |
150 | Myungsun Kim, Kwangjo Kim |
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 362-378, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Gap-problems, Bilinear Diffie-Hellman problem, Identification scheme, Weil-pairing |
150 | Ueli M. Maurer, Stefan Wolf 0001 |
Diffie-Hellman Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 268-282, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Public-key cryptography, Elliptic curves, Discrete logarithms |
149 | Eric R. Verheul |
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 17(4), pp. 277-296, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman problem, Supersingular elliptic curves, Inverting MOV embedding, Tripartite Diffie-Hellman key exchange, Escrow, XTR |
133 | Ian F. Blake, Theodoulos Garefalakis, Igor E. Shparlinski |
On the bit security of the Diffie-Hellman key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 16(6), pp. 397-404, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Bit security, Exponential sums |
133 | Michael Szydlo |
A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 166-170, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Chosen basis, Decisional Diffie-Hellman, Interactive assumptions |
133 | Pierre-Alain Fouque, David Pointcheval, Jacques Stern, Sébastien Zimmer |
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 240-251, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman transform, exponential sums, least significant bits, randomness extraction |
133 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 37-54, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation |
117 | Dan Boneh, Igor E. Shparlinski |
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 201-212, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
116 | Michel Abdalla, Mihir Bellare, Phillip Rogaway |
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 143-158, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cryptographic standards, Diffie-Hellman key exchange, provable security, elliptic curve cryptosystems, generic model, ElGamal encryption |
116 | Paul C. Kocher |
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 104-113, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, DSS, RSA, Timing attack, Diffie-Hellman |
101 | Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 |
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 241-256, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
100 | Eu-Jin Goh, Stanislaw Jarecki, Jonathan Katz, Nan Wang 0001 |
Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(4), pp. 493-514, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
100 | Benoît Libert, Jean-Jacques Quisquater |
Improved Signcryption from q-Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 220-234, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
provable security, bilinear maps, signcryption |
100 | Jonathan C. Herzog |
The Diffie-Hellman Key-Agreement Scheme in the Strand-Space Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 234-247, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
100 | Michel Abdalla, David Pointcheval |
Simple Password-Based Encrypted Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 191-208, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
encrypted key exchange, Password, Diffie-Hellman assumptions |
100 | Helena Handschuh, Yiannis Tsiounis, Moti Yung |
Decision Oracles are Equivalent to Matching Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 276-289, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems |
99 | Hai Huang 0005, Zhenfu Cao |
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 333-342, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
BDH problem, twin Diffie-Hellman, ID-based, authenticated key exchange |
99 | Rob Delicata, Steve A. Schneider |
An algebraic approach to the verification of a class of Diffie-Hellman protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(2-3), pp. 183-196, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Protocol verification, Diffie-Hellman |
99 | Arkadius G. Kalka |
Representation Attacks on the Braid Diffie-Hellman Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 17(3-4), pp. 257-266, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Braid Diffie-Hellman key agreement protocol, Generalized conjugacy search problem, Decomposition problem, Linear algebra attack, Lawrence-Krammer representation, Public-key cryptography, Braid group |
99 | Daniel J. Bernstein |
Curve25519: New Diffie-Hellman Speed Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 207-228, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
new curve, new software, high conjectured security, short keys, elliptic curves, high speed, Diffie-Hellman, point multiplication, constant time |
99 | Michel Abdalla, David Pointcheval |
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 341-356, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Password-based authentication, multi-party protocols, Diffie-Hellman assumptions |
99 | Eu-Jin Goh, Stanislaw Jarecki |
A Signature Scheme as Secure as the Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 401-415, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computational Diffie-Hellman, Discrete Logarithm, Random Oracle Model, Signature Schemes, Exact Security, Tight Reductions |
98 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 128-143, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
84 | Dennis Hofheinz, Eike Kiltz |
The Group of Signed Quadratic Residues and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 637-653, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hybrid ElGamal/DHIES, Public-key encryption, chosen-ciphertext security |
84 | Eric R. Verheul |
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 195-210, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
84 | Victor Shoup |
Using Hash Functions as a Hedge against Chosen Ciphertext Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 275-288, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
84 | Goichiro Hanaoka, Kaoru Kurosawa |
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 308-325, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
84 | Dimitar Jetchev, Ramarathnam Venkatesan |
Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 75-92, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
84 | Arnab Roy 0001, Anupam Datta, John C. Mitchell |
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 312-329, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
84 | David Jao, Dimitar Jetchev, Ramarathnam Venkatesan |
On the Bits of Elliptic Curve Diffie-Hellman Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 33-47, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
84 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
Secure Hashed Diffie-Hellman over Non-DDH Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 361-381, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
84 | Alexandra Boldyreva |
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 31-46, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
84 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
The Group Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 325-338, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
84 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 321-336, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
84 | Michael J. Beller, Yacov Yacobi |
Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings, pp. 208-220, 1992, Springer, 3-540-56413-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
83 | KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon |
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MADNES ![In: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers, pp. 118-131, 2005, Springer, 3-540-36646-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Ad-hoc networks, Digital signature, Bilinear map, Diffie-Hellman problem |
83 | Ueli M. Maurer, Stefan Wolf 0001 |
Lower Bounds on Generic Algorithms in Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 72-84, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, roots in finite groups, complexity, lower bounds, discrete logarithms, generic algorithms |
82 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Log. ![In: ACM Trans. Comput. Log. 9(4), pp. 24:1-24:52, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Diffie-Hellman exponentiation, Dolev-Yao model, complexity, protocols, Algebraic properties |
82 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Provably secure authenticated group Diffie-Hellman key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(3), pp. 10, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, Diffie-Hellman, Group Key Exchange |
82 | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo |
Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 926-936, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, Network security, Key-agreement, Diffie-Hellman |
82 | Myungsun Kim, Jongseong Kim, Kwangjo Kim |
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 97-108, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
asymmetric and symmetric fingerprinting, Bilinear Diffie-Hellman problem, Security reduction, Anonymous, Intellectual property protection |
82 | Jan Johannsen |
Weak Bounded Arithmetic, the Diffie-Hellman Problem and Constable's Class K. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 14th Annual IEEE Symposium on Logic in Computer Science, Trento, Italy, July 2-5, 1999, pp. 268-274, 1999, IEEE Computer Society, 0-7695-0158-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
feasible interpolation, cryptographic hardness assumption, function algebra, bounded arithmetic, implicit computational complexity, Diffie-Hellman problem |
75 | Paul C. van Oorschot, Michael J. Wiener |
On Diffie-Hellman Key Agreement with Short Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 332-343, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
68 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Provably secure password-based authentication in TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 35-45, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password authentication, TLS |
68 | Tatsuaki Okamoto, Shigenori Uchiyama |
Security of an Identity-Based Cryptosystem and the Related Reductions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 546-560, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
68 | Ingrid Biehl, Bernd Meyer 0002, Christoph Thiel |
Cryptographic Protocols Based on Real-Quadratic A-fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, pp. 15-25, 1996, Springer, 3-540-61872-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
67 | David Jao, Kayo Yoshida |
Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings, pp. 1-16, 2009, Springer, 978-3-642-03297-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
Optimal Randomness Extraction from a Diffie-Hellman Element. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 572-589, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
67 | Dan Boneh, Emily Shen, Brent Waters |
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 229-240, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Jung Hee Cheon |
Security Analysis of the Strong Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 1-11, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
67 | Hugo Krawczyk |
HMQV: A High-Performance Secure Diffie-Hellman Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 546-566, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Rob Delicata, Steve A. Schneider |
A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers, pp. 34-46, 2005, Springer, 3-540-32628-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Takeshi Koshiba, Kaoru Kurosawa |
Short Exponent Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 173-186, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
67 | María Isabel González Vasco, Mats Näslund, Igor E. Shparlinski |
New Results on the Hardness of Diffie-Hellman Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 159-172, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
67 | Xukai Zou, Byrav Ramamurthy |
A Simple Group Diffie-Hellman Key Agreement Protocol Without Member Serialization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 725-731, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
67 | Tanja Lange 0001, Arne Winterhof |
Interpolation of the Elliptic Curve Diffie-Hellman Mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 15th International Symposium, AAECC-15, Toulouse, France, May 12-16, 2003, Proceedings, pp. 51-60, 2003, Springer, 3-540-40111-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim |
Prime Numbers of Diffie-Hellman Groups for IKE-MODP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 228-234, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Hugo Krawczyk |
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 400-425, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater |
Provably authenticated group Diffie-Hellman key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 255-264, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
67 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 290-309, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
67 | Eike Kiltz |
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 339-350, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
67 | Shoichi Hirose, Susumu Yoshida |
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 135-148, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
67 | Dan Boneh, Ramarathnam Venkatesan |
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 129-142, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
67 | Ueli M. Maurer |
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, pp. 271-281, 1994, Springer, 3-540-58333-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
67 | Bert den Boer |
Diffie-Hellman is as Strong as Discrete Log for Certain Primes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 530-539, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
66 | Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 482-499, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Protocol Security, Provable Scurity, Computational Soundness, Diffie-Hellman Assumptions |
66 | Shuhua Wu, Yuefei Zhu |
Efficient Augmented Password-Based Encrypted Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 533-542, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password, Diffie-Hellman assumptions |
66 | Kaoru Kurosawa, Swee-Huay Heng |
Relations Among Security Notions for Undeniable Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 34-48, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature |
66 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Constructing Secure Proxy Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 150-161, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Proxy cryptosystem, bilinear Diffie-Hellman, ID-based |
66 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 187-194, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
66 | Zhenjie Huang, Kefei Chen, Yumin Wang |
Efficient Identity-Based Signatures and Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 120-133, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Gap Diffie-Hellman group, Signature, Bilinear pairings, Blind signature, Identity-based |
66 | Fabien Laguillaumie, Damien Vergnaud |
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 105-119, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Privacy of signers identity, Bilinear Diffie-Hellman problems, Exact security, Designated verifier signatures, Tight reduction |
66 | Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu |
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 357-371, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
TGDH, Bilinear Diffie-Hellman, Pairings, Bilinear map, Group key agreement |
66 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 255-271, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure |
66 | K. C. Reddy, Divya Nalla |
Identity Based Authenticated Group Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 215-233, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing |
66 | Ahmad-Reza Sadeghi, Michael Steiner 0001 |
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 244-261, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cryptographic Assumptions, Square Exponent, Inverse Exponent, Discrete Logarithms, Complexity Theory, Diffie-Hellman, Generic Algorithms |
66 | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai |
Toward Fair International Key Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 171-187, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party |
66 | Satoshi Hada, Toshiaki Tanaka |
On the Existence of 3-Round Zero-Knowledge Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 408-423, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Zero-knowledge, interactive proof, Diffie-Hellman problem |
66 | Adam L. Young, Moti Yung |
Kleptography: Using Cryptography Against Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 62-74, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, leakage bandwidth, design and manufacturing of cryptographic devices and software, black-box devices, SETUP mechanisms, RSA, randomness, information hiding, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, Discrete Log |
66 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 264-276, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
66 | Wen Xin Khoo Joshua, Xin Wei Teoh Justin, Chern Nam Yap |
Arithmetic Circuit Homomorphic Encryption Key Pairing Comparisons and Analysis between Elliptic Curve Diffie Hellman and Supersingular Isogeny Diffie Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACCC ![In: 2nd Asia Conference on Computers and Communications, ACCC 2021, Singapore, September 24-27, 2021, pp. 138-142, 2021, IEEE, 978-1-6654-0743-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
66 | Dongyoung Roh, I-Yeol Kim, Sang Geun Hahn |
The l-th power Diffie-Hellman problem and the l-th root Diffie-Hellman problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 29(1), pp. 41-57, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
66 | |
Knapsack Diffie-Hellman: A New Family of Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 347, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
66 | Antoine Joux, Kim Nguyen |
Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2001, pp. 3, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
65 | Long Ngo, Colin Boyd, Juanma González Nieto |
Automated Proofs for Diffie-Hellman-Based Key Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 51-65, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
modular, automated, key exchange, Diffie-Hellman |
65 | Fang-Yie Leu, Yi-Fung Huang, Chao-Hong Chiu |
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: CISIS 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010, pp. 391-397, 2010, IEEE Computer Society, 978-0-7695-3967-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Diffie-Hellman PKDS, Common secret key, PKMv1, WiMax security, IEEE802.16e data security |
65 | Yi-Fung Huang, Fang-Yie Leu, Ko-Chung Wei |
Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: CISIS 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010, pp. 384-390, 2010, IEEE Computer Society, 978-0-7695-3967-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Diffie-Hellman PKDS, Stream cipher technique, Pseudo random number sequence, Increasing-doublingable sequence ladder, Pseudo random number generator |
51 | Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto |
An Efficient Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 272-286, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Dungara Ram Choudhary, Dev Anshul, Suman Roy 0001, Chandrashekhar Thejaswi P. S. |
Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Shaoquan Jiang |
Efficient Primitives from Exponentiation in Zp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 259-270, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Fabien Laguillaumie, Damien Vergnaud |
Short Undeniable Signatures Without Random Oracles: The Missing Link. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 283-296, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Audrey Montreuil, Jacques Patarin |
The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 33-47, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Jonathan Katz, Nan Wang 0001 |
Efficiency improvements for signature schemes with tight security reductions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 155-164, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
digital signatures |
51 | Chik How Tan, Xun Yi, Chee Kheong Siew |
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 428-442, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
adaptive chosen-ciphertext attack, Public key cryptosystem, shift registers |
51 | Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan |
Password-Authenticated Key Exchange Based on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 599-613, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1148 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|