The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase ID-PKC (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-1998 (24) 1999 (30) 2000 (33) 2001 (34) 2002 (34) 2003 (32) 2004 (40) 2005 (39) 2006 (53) 2007 (50) 2008 (44) 2009 (39) 2010 (38) 2011 (34) 2012 (48) 2013 (37) 2014 (46) 2015 (41) 2016 (39) 2017 (43) 2018 (56) 2019 (49) 2020 (50) 2021 (56) 2022 (42) 2023 (57) 2024 (58)
Publication types (Num. hits)
article(60) inproceedings(1048) proceedings(38)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 457 occurrences of 265 keywords

Results
Found 1146 publication records. Showing 1146 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
128Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Encryption. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
127Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC)
113Dae Hyun Yum, Pil Joong Lee Identity-Based Cryptography in Public Key Management. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
107Yingxin Li, Carol A. Heckman, Julie A. Barnes Nonlinear Modeling on Protein Kinase C(PKC)-Epsilon Inverse Regulation of Stress Fibers in Oncogenically Transformed Cells. Search on Bibsonomy CSB The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
105Young-Il Oh, Sang-Hoon Kim, Jong-Hoon Kim, Chang-Won Kang Effects of Retinoic Acid-induced PKC-d on the Insulin Like Growth Factor-I (IGF-I)System is Involved in Reactive Oxygen Species (ROS) in MCF-7 Cells. Search on Bibsonomy BMEI (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Insulin like growth factor-I(IGF-I), protein kanase C (PKC)-d, Reactive oxigen spesies(ROS), Oxidative stress, Retinoic acid, antioxidents, MCF-7
101Kazukuni Kobara, Hideki Imai New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
101Kazukuni Kobara, Hideki Imai Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
86Christopher Wolf, An Braeken, Bart Preneel Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
71An Liu, Peng Ning TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TinyECC, ECC, public key cryptography, Wireless sensor network security
71Chang-Ji Wang, Yong Tang 0001, Qin Li 0009 ID-Based Fair Off-Line Electronic Cash System with Multiple Banks. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based cryptography, electronic cash, restrictive partially blind signature
71Wenliang Du, Ronghua Wang, Peng Ning An efficient scheme for authenticating public keys in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deployment knowledge, wireless sensor networks, public key, merkle tree
71Keith Gibson The Security of the Gabidulin Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
66Masao Kasahara Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
64Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
58Daewan Han, Myung-Hwan Kim, Yongjin Yeom Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack
57Ortal Arazi, Hairong Qi 0001, Derek Rose A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
57Christopher Wolf, An Braeken, Bart Preneel On the security of stepwise triangular systems. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 11T55, 12F99, 51E26, 14Q99, 14N10, 68Q25, AMS Classification 94A60, 68W40
57DaeHun Nyang, Abedelaziz Mohaisen Cooperative Public Key Authentication Protocol in Wireless Sensor Network. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public Key Authentication, Cooperative Protocol, Voting
57Ran Canetti, Shafi Goldwasser An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
50Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan Side Channels in the McEliece PKC. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attack, timing attack, post quantum cryptography
50Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications. Search on Bibsonomy ICSAMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, embedded system, efficient implementation, motes, digital signature schemes, Multivariate public-key cryptosystem
50Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee 0002, Jongin Lim 0001 Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Wasilij Beskorovajnov, Roland Gröll, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
44Masao Kasahara New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
44Masao Kasahara New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over 픽2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
44Masao Kasahara A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems -. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
44Jian Weng 0001, Yunlei Zhao, Goichiro Hanaoka On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
44Jean-Charles Faugère, Pierre-Jean Spaenlehauer Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
44Christopher Wolf, An Braeken, Bart Preneel Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
43Rodrigo Roman, Cristina Alcaraz Applicability of Public Key Infrastructures in Wireless Sensor Networks. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Public Key Cryptography, Public Key Infrastructure
43Ronghua Wang, Wenliang Du, Peng Ning Containing denial-of-service attacks in broadcast authentication in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF broadcast delay, security, wireless sensor networks, energy saving, denial of service attack
43Siddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Montgomery’s Multiplication Method, FPGA, RSA, ECC, Public Key Cryptography, systolic array
41Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation
41S. C. Samuel, D. Gnanaraj Thomas, P. J. Abisha, K. G. Subramanian 0001 Tree Replacement and Public Key Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tree replacement system, Church-Rosser tree replacement system, public key cryptosystem (PKC), word problem
36Luk Bettale, Jean-Charles Faugère, Ludovic Perret Cryptanalysis of the TRMS Signature Scheme of PKC'05. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern Total Break of the l-IC Signature Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Marc Fischlin Anonymous Signatures Made Easy. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF perfectly one-way hash function, Anonymity, signature scheme, randomness extractor
36Emmanuel Bresson, Dario Catalano, Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Florian Mendel, Norbert Pramstaller, Christian Rechberger Improved Collision Attack on the Hash Function Proposed at PKC'98. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision
36Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF discrete logarithm, proof of knowledge, Public key cryptanalysis
36Benoît Libert, Jean-Jacques Quisquater On Constructing Certificateless Cryptosystems from Identity Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF provable security, bilinear maps, Certificateless encryption
36Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto Security-Mediated Certificateless Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security-mediated cryptography, certificateless cryptography
36Carlos Costa 0001, José Luís Oliveira, Augusto Silva Critical Information Systems Authentication Based on PKC and Biometrics. Search on Bibsonomy ICWE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Daewan Han, Sangwoo Park, Seongtaek Chee Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Sung-Min Lee 0006, Hyung-Woo Lee, Tai-Yun Kim A Secure Electronic Software Distribution (ESD) Protocol Based on PKC. Search on Bibsonomy EC-Web The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Jean-Luc Beuchat, Jean-Michel Muller Automatic Generation of Modular Multipliers for FPGA Applications. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, implementation, Elliptic Curve Cryptography, pairings, cryptographic primitives
28Ching Yu Ng, Willy Susilo, Yi Mu 0001, Reihaneh Safavi-Naini RFID Privacy Models Revisited. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Selim Volkan Kaya, Erkay Savas, Albert Levi, Özgür Erçetin Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF spatio-temporal attacks, security, privacy, RFID, public key cryptography
28Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, Ingrid Verbauwhede Public-Key Cryptography for RFID-Tags. Search on Bibsonomy PerCom Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Manuel Barbosa, Pooya Farshim Randomness Reuse: Extensions and Improvements. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Randomness Reuse, Multi-Recipient, Hybrid Encryption
28Saeran Kwon, Sang-Ho Lee Identity-Based Key Issuing Without Secure Channel in a Broad Area. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Jaeil Lee, Inkyoung Jeun, Seoklae Lee Efficient Attribute Authentication in Wireless Mobile Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28JingFeng Li, Yuefei Zhu, Heng Pan, DaWei Wei A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain. Search on Bibsonomy WAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Gunnar Gaubatz, Jens-Peter Kaps, Erdinç Öztürk, Berk Sunar State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. Search on Bibsonomy PerCom Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Roie Zivan, Amnon Meisels Asymmetric Distributed Constraints Satisfaction Problems. Search on Bibsonomy CP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28William L. Freking, Keshab K. Parhi Parallel modular multiplication with application to VLSI RSA implementation. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterson, Pankaj Rohatgi Trust management for secure information flows. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ID-PKC, trust, information flow, risk
27Alexander Klimm, Oliver Sander, Jürgen Becker 0001, Sylvain Subileau A Hardware/Software Codesign of a Co-processor for Real-Time Hyperelliptic Curve Cryptography on a Spartan3 FPGA. Search on Bibsonomy ARCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hyperelliptic Curve Cryptography (HECC), FPGA, embedded systems, Public Key Cryptography (PKC), reconfigurable hardware
27Paul Camion, Hervé Chabanne On the Powerline System. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Chor-Rivest, Powerline, Fractional Powerline, Quadratic Fractional Power System, Berlekamp-Massey, RSA, Identification, Public Key Cryptosystem (PKC), Knapsack
22Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu 0008, Mehdi Tibouchi, Masayuki Abe Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone Improved Cryptanalysis of HFERP. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang 0002, Yu Yu 0001, Kaiyi Zhang 0001 sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Shuichi Katsumata, Yi-Fu Lai, Michael Reichle Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Anja Lehmann, Cavit Özbay Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong 0001, Jie Chen 0021 Registered Attribute-Based Signature. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Haruhisa Kosuge, Keita Xagawa Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Hannah Davis, Matthew D. Green, Nadia Heninger, Keegan Ryan, Adam Suhl On the Possibility of a Backdoor in the Micali-Schnorr Generator. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Balthazar Bauer, Georg Fuchsbauer, Fabian Regen On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Romain Gay, Bogdan Ursu On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Bertram Poettering, Simon Rastikian Formalizing Hash-then-Sign Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22San Ling, Khoa Nguyen 0002, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Christian Badertscher, Monosij Maitra, Christian Matt 0002, Hendrik Waldner Updatable Policy-Compliant Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Madalina Bolboceanu, Zvika Brakerski, Devika Sharma On Algebraic Embedding for Unstructured Lattices. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang A Refined Hardness Estimation of LWE in Two-Step Mode. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Sanjam Garg, Mohammad Hajiabadi, Peihan Miao 0001, Alice Murphy Laconic Branching Programs from the Diffie-Hellman Assumption. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Jiaxin Pan, Runzhi Zeng Selective Opening Security in the Quantum Random Oracle Model, Revisited. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran 0001, Rajeev Raghunath R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Yu Chen 0003, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu Private Set Operations from Multi-query Reverse Private Membership Test. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Pedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto Rate-1 Fully Local Somewhere Extractable Hashing from DDH. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Mingjie Chen, Antonin Leroux, Lorenz Panny SCALLOP-HD: Group Action from 2-Dimensional Isogenies. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, Bogdan Ursu On Structure-Preserving Cryptography and Lattices. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Maria Corte-Real Santos, Craig Costello, Sam Frengley An Algorithm for Efficient Detection of (N, N)-Splittings and Its Application to the Isogeny Problem in Dimension 2. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Yiming Li, Shengli Liu 0001 Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Cyprien Delpech de Saint Guilhem, Robi Pedersen New Proof Systems and an OPRF from CSIDH. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Benoît Libert Vector Commitments with Proofs of Smallness: Short Range Proofs and More. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Daniel Escudero 0001, Ivan Tjuawinata, Chaoping Xing On Information-Theoretic Secure Multiparty Computation with Local Repairability. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Benoît Libert Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Matteo Campanelli, Antonio Faonio, Dario Fiore 0001, Tianyu Li 0002, Helger Lipmaa Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Xindong Liu, Li-Ping Wang Short Code-Based One-out-of-Many Proofs and Applications. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Matteo Campanelli, Dario Fiore 0001, Hamidreza Khoshakhlagh Witness Encryption for Succinct Functional Commitments and Applications. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1146 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license