|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 130 occurrences of 91 keywords
|
|
|
Results
Found 165 publication records. Showing 165 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
76 | Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam |
Improved Bounds on Security Reductions for Discrete Log Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 93-107, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Schnorr Signature Scheme, Provable Security, Random Oracle Model |
48 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 264-276, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
46 | Sarvar Patel, Ganapathy S. Sundaram |
An Efficient Discrete Log Pseudo Random Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 304-317, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
46 | Pascal Paillier, Damien Vergnaud |
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 1-20, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | David Jao, Stephen D. Miller, Ramarathnam Venkatesan |
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 21-40, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
random reducibility, modular forms, L-functions, generalized Riemann hypothesis, elliptic curves, expanders, Ramanujan graphs, isogenies, rapid mixing, discrete log |
38 | László Babai, Robert Beals, Ákos Seress |
Polynomial-time theory of matrix groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 55-64, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
computational group theory, matrix groups, discrete log |
31 | Adam L. Young, Moti Yung |
Relationships Between Diffie-Hellman and "Index Oracles". ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 16-32, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Diffie-Hellman (DH), Computational Diffie-Hellman, Decision Diffie-Hellman, JDL, LDL, Public Key Cryptography, Oracles, Black-Box Reductions, Discrete-Log |
31 | Adam L. Young, Moti Yung |
Kleptography: Using Cryptography Against Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 62-74, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, leakage bandwidth, design and manufacturing of cryptographic devices and software, black-box devices, SETUP mechanisms, RSA, randomness, information hiding, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, Discrete Log |
29 | Adam L. Young, Moti Yung |
A PVSS as Hard as Discrete Log and Shareholder Separability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 287-299, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 295-310, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Distributed Key Generation, Discrete Logarithm, Threshold Cryptography, VSS |
29 | Bert den Boer |
Diffie-Hellman is as Strong as Discrete Log for Certain Primes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 530-539, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
26 | Pierre-Alain Fouque, Jacques Stern |
One Round Threshold Discrete-Log Key Generation without Private Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 300-316, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Threshold DLK Generation, Publicly Verifiable Encryption, Adaptive and Concurrent Adversary |
26 | René Peralta 0001 |
Simultaneous Security of Bits in the Discrete Log. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 62-72, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
25 | Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff |
Practical Cryptography in High Dimensional Tori. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 234-250, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
torus-based cryptography, discrete-log based cryptography |
24 | Eu-Jin Goh, Stanislaw Jarecki |
A Signature Scheme as Secure as the Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 401-415, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computational Diffie-Hellman, Discrete Logarithm, Random Oracle Model, Signature Schemes, Exact Security, Tight Reductions |
24 | Marc Fischlin |
A Note on Security Proofs in the Generic Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 458-469, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf |
An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 127-141, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
23 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(1), pp. 51-83, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Chae Hoon Lim, Pil Joong Lee |
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 249-263, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
23 | Daniel M. Gordon |
Designing and Detecting Trapdoors for Discrete Log Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, pp. 66-75, 1992, Springer, 3-540-57340-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
21 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Secure Applications of Pedersen's Distributed Key Generation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 373-390, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
distributed key generation, discrete logarithm, random oracle model, Threshold cryptography, exact security |
20 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(2), pp. 219-241, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
20 | Yacov Yacobi |
Discrete-Log With Compressible Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 639-643, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
19 | Lun Li, Mitchell A. Thornton, David W. Matula |
A digit serial algorithm for the integer power operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 16th ACM Great Lakes Symposium on VLSI 2006, Philadelphia, PA, USA, April 30 - May 1, 2006, pp. 302-307, 2006, ACM, 1-59593-347-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
power operation, standard cell implementation, exponential, discrete log |
19 | Eugene M. Luks |
Computing in Solvable Matrix Groups ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 33rd Annual Symposium on Foundations of Computer Science, Pittsburgh, Pennsylvania, USA, 24-27 October 1992, pp. 111-120, 1992, IEEE Computer Society, 0-8186-2900-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Sylow subgroups, solvable matrix groups, solvability, nilpotence, discrete-log problem, solvable permutation groups, finite matrix groups, finite fields, polynomial-time, centralizers, intersections, algebraic number fields, subgroups, membership-testing |
15 | Pascal Paillier |
Trapdooring Discrete Logarithms on Elliptic Curves over Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 573-584, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Claus-Peter Schnorr |
Efficient Identification and Signatures for Smart Cards (Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 688-689, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
15 | Claus-Peter Schnorr |
Efficient Identification and Signatures for Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 239-252, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
14 | Abdulmajeed Alqasem, Heshan Aravinda, Arnaud Marsiglietti, James Melbourne |
On a Conjecture of Feige for Discrete Log-Concave Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Discret. Math. ![In: SIAM J. Discret. Math. 38(1), pp. 93-102, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Heshan Aravinda |
Entropy-variance inequalities for discrete log-concave random variables via degree of freedom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Math. ![In: Discret. Math. 347(1), pp. 113683, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Lejing Yan, Chao Luo, Rui Shao |
Discrete log anomaly detection: A novel time-aware graph-based link prediction approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 647, pp. 119576, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Sergey G. Bobkov, Arnaud Marsiglietti, James Melbourne |
Concentration functions and entropy bounds for discrete log-concave distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comb. Probab. Comput. ![In: Comb. Probab. Comput. 31(1), pp. 54-72, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | María A. Hernández Cifre, Eduardo Lucas |
On Discrete LOG-Brunn-Minkowski Type Inequalities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Discret. Math. ![In: SIAM J. Discret. Math. 36(3), pp. 1748-1760, September 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Heshan Aravinda |
Entropy-variance inequalities for discrete log-concave random variables via degree of freedom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.09115, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Easwar Vivek Mangipudi, Aniket Kate |
D-KODE: Distributed Mechanism to Manage a Billion Discrete-log Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFT ![In: Proceedings of the 4th ACM Conference on Advances in Financial Technologies, AFT 2022, Cambridge, MA, USA, September 19-21, 2022, pp. 308-325, 2022, ACM, 978-1-4503-9861-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Jianchang Lai, Ge Wu 0001, Peng Jiang, Zhen Zhao 0005, Willy Susilo, Fuchun Guo |
Generic construction for tightly-secure signatures from discrete log. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 888, pp. 13-21, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko |
Homomorphic decryption in blockchains via compressed discrete-log lookup tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 899, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
14 | Gary McGuire, Oisín Robinson |
Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 15(1), pp. 223-236, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko |
Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DPM/CBT@ESORICS ![In: Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers, pp. 328-339, 2021, Springer, 978-3-030-93943-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Itai Dinur, Nathan Keller, Ohad Klein |
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 33(3), pp. 824-873, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Alexander Bienstock, Allison Bishop, Eli Goldin, Garrison Grogan, Victor Lecomte |
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 164, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler |
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 57, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Max Hoffmann 0001, Michael Klooß, Andy Rupp |
Efficient zero-knowledge arguments in the discrete log setting, revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 944, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
14 | Max Hoffmann 0001, Michael Klooß, Andy Rupp |
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019., pp. 2093-2110, 2019, ACM, 978-1-4503-6747-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler |
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 344-373, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Itai Dinur, Nathan Keller, Ohad Klein |
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 731, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
14 | Itai Dinur, Nathan Keller, Ohad Klein |
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III, pp. 213-242, 2018, Springer, 978-3-319-96877-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain |
Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCSW ![In: Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017, pp. 17-28, 2017, ACM, 978-1-4503-5204-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain |
Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, October 9-11, 2017, pp. 531-539, 2017, IEEE, 978-1-5386-0683-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit 0001 |
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 263, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
14 | Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit 0001 |
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (2) ![In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, pp. 327-357, 2016, Springer, 978-3-662-49895-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Peter Landrock |
Power map permutations and the discrete log problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 77(2-3), pp. 713-724, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
14 | Oliver Johnson |
A discrete log-Sobolev inequality under a Bakry-Emery type condition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1507.06268, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
14 | Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs |
On Continual Leakage of Discrete Log Representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (2) ![In: Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II, pp. 401-420, 2013, Springer, 978-3-642-42044-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Mohamed Rasslan, Mahmoud Nasreldin |
Identification Protocols based on Discrete Log Representation Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSPN/ICTH ![In: The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), Niagara Falls, Ontario, Canada, October 21-24, 2013, pp. 368-373, 2013, Elsevier. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs |
On Continual Leakage of Discrete Log Representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 367, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
14 | Muhammad Rezal Kamel Ariffin, Zahari Mahad, Nor Azman Abu, Arif Mandangan, Kamel Ariffin Mohd Atan |
Linear Diophantine Equation Discrete Log Problem and the AAβ-Cryptosystem ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1103.4433, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
14 | Muhammad Rezal Kamel Ariffin, M. A. Asbullah, Nor Azman Abu |
Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Discrete Log Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 467, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
14 | |
Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA-beta-cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 145, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
14 | |
Cryptanalysis of the AAbeta Cryptosystem based on Linear Diophantine Equation Discrete Log Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 351, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
14 | Sourav Chakraborty 0001, David García-Soriano, Arie Matsliah |
Cycle Detection, Order Finding and Discrete Log with Jumps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Innovations in Computer Science - ICS 2011, Tsinghua University, Beijing, China, January 7-9, 2011. Proceedings, pp. 284-297, 2011, Tsinghua University Press, 978-7-302-24517-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
14 | Xavier Boyen, Brent Waters |
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings, pp. 35-52, 2010, 978-3-642-13707-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
14 | |
A short Note on Discrete Log Problem in Fp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 381, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
14 | Licheng Wang, Lihua Wang 0001, Yun Pan, Zonghua Zhang, Yixian Yang |
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings, pp. 493-502, 2009, Springer, 978-3-642-11144-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Neal Koblitz, Alfred Menezes |
Another look at non-standard discrete log and Diffie-Hellman problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 2(4), pp. 311-326, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Neal Koblitz, Alfred Menezes |
Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 442, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
14 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 453, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
14 | Zhixiong Chen 0002, Ning Zhang, Guozhen Xiao |
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 231-245, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
elliptic curves, discrete logarithm, discrepancy, linear complexity, pseudo-random sequences, character sums |
14 | Jeong Han Kim, Ravi Montenegro, Prasad Tetali |
Near Optimal Bounds for Collision in Pollard Rho for Discrete Log. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 215-223, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Philip D. MacKenzie, Sarvar Patel |
Hard Bits of the Discrete Log with Applications to Password Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 209-226, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Johan Håstad, Mats Näslund |
The security of all RSA and discrete log bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 51(2), pp. 187-230, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
RSA-encryption, bit-security, complexity, Cryptography, discrete logarithms |
14 | David Jao, Stephen D. Miller, Ramarathnam Venkatesan |
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR math.NT/0411378, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
14 | David Jao, Stephen D. Miller, Ramarathnam Venkatesan |
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 312, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
14 | Kenneth J. Giuliani, Guang Gong |
New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SETA ![In: Sequences and Their Applications - SETA 2004, Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers, pp. 298-312, 2004, Springer, 3-540-26084-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Andrew M. Wallace, D. J. McLaren |
Gradient detection in discrete log-polar images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. Lett. ![In: Pattern Recognit. Lett. 24(14), pp. 2463-2470, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Eikoh Chida, Toshiya Itoh, Hiroki Shizuya |
A Note on the Relationships among Certified Discrete Log Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5), pp. 1198-1202, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
14 | Emmanuel Bresson, Jacques Stern |
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 272-288, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Claus-Peter Schnorr |
Security of Blind Discrete Log Signatures against Interactive Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 1-12, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Pierrick Gaudry |
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 19-34, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Rosario Gennaro |
An Improved Pseudo-random Generator Based on Discrete Log. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 469-481, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Johan Håstad, Mats Näslund |
The Security of all RSA and Discrete Log Bits ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR99, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
14 | Johan Håstad, Mats Näslund |
Security of all RSA and Discrete Log Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 1999, pp. 19, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
14 | Iwan M. Duursma, Pierrick Gaudry, François Morain |
Speeding up the Discrete Log Computation on Curves with Automorphisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings, pp. 103-121, 1999, Springer, 3-540-66666-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Kouichi Sakurai, Hiroki Shizuya |
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(1), pp. 29-43, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Computational number theory, Computational number theory, Securi, Security, Randomness, Randomness, Public-key cryptography, Public-key cryptography, Elliptic curves, Elliptic curves, Key exchange, Key exchange, Discrete logarithm, Discrete logarithm, Key words, Cryptosystem, Cryptosystem |
14 | R. Balasubramanian, Neal Koblitz |
The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes - Okamoto - Vanstone Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(2), pp. 141-145, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Elliptic curve, Elliptic curve, Discrete logarithm, Discrete logarithm, Key words, Weil pairing, Weil pairing |
14 | Claus-Peter Schnorr |
Security of Allmost ALL Discrete Log Bits ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR98, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
14 | Claus-Peter Schnorr |
Almost All Discrete Log Bits Are Simultaneously Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 1998, pp. 20, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
14 | Victor Boyko, Marcus Peinado, Ramarathnam Venkatesan |
Speeding up Discrete Log and Factoring Based Schemes via Precomputations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 221-235, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
14 | Damian Weber, Thomas F. Denny |
The Solution of McCurley's Discrete Log Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 458-471, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Index Calculus, Lanczos, Discrete Logarithms, Number Field Sieve |
14 | Kouichi Sakurai, Hiroki Shizuya |
Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 341-355, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
14 | Wolfgang Hörmann |
A universal generator for discrete log-concave distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 52(1), pp. 89-96, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
14 | A. W. Schrift, Adi Shamir |
The Discrete Log is Very Discreet ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, USA, pp. 405-415, 1990, ACM, 0-89791-361-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
14 | Neal Koblitz |
A Family of Jacobians Suitable for Discrete Log Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 94-99, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
14 | Luc Devroye |
A simple generator for discrete log-concave distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 39(1), pp. 87-91, 1987. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
14 | Douglas L. Long, Avi Wigderson |
How Discreet is the Discrete Log? ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 25-27 April, 1983, Boston, Massachusetts, USA, pp. 413-420, 1983, ACM. The full citation details ...](Pics/full.jpeg) |
1983 |
DBLP DOI BibTeX RDF |
|
12 | Sébastien Canard, Iwen Coisel, Jacques Traoré |
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 122-137, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Tal Malkin, Ryan Moriarty, Nikolai Yakovenko |
Generalized Environmental Security from Number Theoretic Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 343-359, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Lun Li, Alex Fit-Florea, Mitchell A. Thornton, David W. Matula |
Performance Evaluation of a Novel Direct Table Lookup Method and Architecture with Application to 16-bit Integer Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 2006 IEEE International Conference on Application-Specific Systems, Architecture and Processors (ASAP 2006), 11-13 September 2006, Steamboat Springs, Colorado, USA, pp. 99-104, 2006, IEEE Computer Society, 0-7695-2682-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Cheng-Kang Chu, Wen-Guey Tzeng |
Distributed Key Generation as a Component of an Integrated Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 411-421, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Marc Fischlin, Roger Fischlin |
Efficient Non-malleable Commitment Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 413-431, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 165 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|