|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 97 occurrences of 51 keywords
|
|
|
Results
Found 166 publication records. Showing 166 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
113 | Yevgeniy Dodis, Moti Yung |
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002, pp. 45-52, 2002, IEEE Computer Society, 0-7695-1888-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman |
78 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 148-158, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
68 | Wei Gao 0007, Xueli Wang, Dongqing Xie |
Chameleon Hashes Without Key Exposure Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(1), pp. 109-113, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
chameleon signature, key-exposure, chameleon hash |
65 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li |
Identity-Based Key-Insulated Signature with Secure Key-Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 13-26, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure |
64 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 255-271, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure |
63 | Mihir Bellare, Adriana Palacio |
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 16(6), pp. 379-396, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key update, Encryption, Identity-based encryption, Key exposure |
58 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 409-423, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure |
52 | Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai |
Exposure-Resilient Functions and All-or-Nothing Transforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 453-469, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
51 | Yoshinori Aono |
A New Lattice Construction for Partial Key Exposure Attack for RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 34-53, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction |
51 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 18-30, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
On-line/off-line signatures, Key exposure, Chameleon hashing |
49 | Ellen Jochemsz, Benne de Weger |
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 203-216, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction |
48 | Giuseppe Ateniese, Breno de Medeiros |
On the Key Exposure Problem in Chameleon Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 165-179, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Johannes Blömer, Alexander May 0001 |
New Partial Key Exposure Attacks on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 27-43, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Identity Based Key Insulated Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 226-234, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 366-384, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 203-220, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
threshold key-insulation, standard model, identity-based encryption, key-exposure |
36 | Duc-Liem Vo, Kwangjo Kim |
Yet Another Forward Secure Signature from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 441-455, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key evolution, pairings, Forward security, key exposure |
35 | Ron Steinfeld, Yuliang Zheng 0001 |
On the Security of RSA with Primes Sharing Least-Significant Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 15(3-4), pp. 179-200, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Partial Key Exposure, Boneh-Durfee-Frankel Attack, Coppersmith Algorithm, Server-Aided Signature Generation, Cryptanalysis, RSA Cryptosystem, Communication Security, Least-Significant Bits |
34 | Alfonso De Gregorio |
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 144-158, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Diana Berbecaru, Luca Albertalli |
An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), 13-15 February 2008, Toulouse, France, pp. 581-589, 2008, IEEE Computer Society, 978-0-7695-3089-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
generic FSS schemes, double cache technique, backward secrecy |
31 | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai |
Parallel Key-Insulated Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 105-122, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim |
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 11-21, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A Strong Identity Based Key-Insulated Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 352-361, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key-insulated cryptosystem, Bilinear pairings, ID-based |
28 | Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li |
Key-Insulated Group Signature Scheme with Selective Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 1057-1063, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(3), pp. 265-294, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin |
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 501, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
27 | Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin |
Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigCom ![In: Big Data Computing and Communications - Second International Conference, BigCom 2016, Shenyang, China, July 29-31, 2016. Proceedings, pp. 387-395, 2016, Springer, 978-3-319-42552-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai |
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 123-135, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Chameleon Hashing Without Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 87-98, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
Robust Key-Evolving Public Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 61-72, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 473-484, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
25 | Santanu Sarkar 0001, Subhamoy Maitra |
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 37-51, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
25 | Matthias Ernst, Ellen Jochemsz, Alexander May 0001, Benne de Weger |
Partial Key Exposure Attacks on RSA up to Full Size Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 371-386, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Yuefei Zhu, Dan Xu |
An Efficient Key-Evolving Signature Scheme Based on Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 26-28 May 2004, Suzhou, China, pp. 68-73, 2004, IEEE Computer Society, 0-7695-2118-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung |
Intrusion-Resilient Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 19-32, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Dawn Xiaodong Song |
Practical forward secure group signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 225-234, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 70-81, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
24 | Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 |
On the Improvement of the BDF Attack on LSBS-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 84-97, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB) |
24 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 176-184, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital signature, provable security, forward security, key exposure |
22 | Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna |
Partial key exposure attack on RSA using some private key blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 185-193, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Tianqi Zhou, Jian Shen 0001, Sai Ji, Yongjun Ren, Mingwu Zhang |
Key Exposure Resistant Group Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings, pp. 83-97, 2021, Springer, 978-3-030-90401-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Chengyu Hu, Yuqin Xu, Pengtao Liu, Jia Yu 0005, Shanqing Guo, Minghao Zhao 0001 |
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 520, pp. 15-30, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li |
Enhanced blockchain based key management scheme against key exposure attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIPCC ![In: Proceedings of the International Conference on Artificial Intelligence, Information Processing and Cloud Computing, AIIPCC 2019, Sanya, China, December 19-21, 2019., pp. 68:1-68:6, 2019, ACM, 978-1-4503-7633-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Hanshu Hong, Zhixin Sun, Ximeng Liu |
A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 10(5), pp. 2394-2406, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Renwang Su |
New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (2) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 126-131, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Alfonso De Gregorio |
Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 320, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
22 | Mihir Bellare, Adriana Palacio |
Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 64, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
21 | Dae Hyun Yum, Pil Joong Lee |
Efficient Key Updating Signature Schemes Based on IBS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 167-182, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key insulated signature, intrusion resilient siganture, identity based signature |
21 | Gene Itkis, Peng Xie |
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 151-168, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Tage Stabell-Kulø, Arne Helme, Gianluca Dini |
Detecting Key-Dependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 356-366, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa |
An Efficient Strong Key-Insulated Signature Scheme and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 150-165, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
strong key-insulated signature, key leakage, DL assumption, random oracle model, adaptive security |
18 | Satoshi Koga, Kouichi Sakurai |
A Distributed Online Certificate Status Protocol with a Single Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 389-401, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 83-97, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital signature, forward security, bilinear maps, computation Diffie-Hellman problem |
18 | Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel |
On the performance, feasibility, and use of forward-secure signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 131-144, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
forward-secure signatures, digital signatures |
18 | Ron Steinfeld, Yuliang Zheng 0001 |
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 52-62, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Tal Malkin, Satoshi Obana, Moti Yung |
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 306-322, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 85-96, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Dan Boneh, Glenn Durfee, Yair Frankel |
An Attack on RSA Given a Small Fraction of the Private Key Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 25-34, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Qingqing Gan, Xiaoming Wang, Daxin Huang, Jianwei Li, Changji Wang, Zhen Liu |
Online/offline remote data auditing with strong key-exposure resilience for cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 88, pp. 103798, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Mengce Zheng |
Partial Key Exposure Attack on Common Prime RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 61, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
16 | BoXue Huang, Juntao Gao, Xuelian Li |
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cloud Comput. ![In: J. Cloud Comput. 12(1), pp. 37, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wenting Shen, Jia Yu 0005, Ming Yang 0023, Jiankun Hu |
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(6), pp. 4593-4606, November - December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Mengce Zheng |
Partial Key Exposure Attack on Common Prime RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt (2) ![In: Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II, pp. 407-410, 2023, Springer, 978-981-97-0944-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Congge Xie, Jian Weng 0001, Dehua Zhou |
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 594, pp. 249-263, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Longjiang Li, Jie Wang, Rui Zhang, Yuanchen Gao, Yonggang Li, Yuming Mao |
Exploiting Redundant Randomness for Resisting Key Exposure in Encrypted Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 16(4), pp. 6727-6735, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Andre Esser 0001, Alexander May 0001, Javier A. Verbel, Weiqiang Wen |
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 259, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
16 | Yuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert |
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1163, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
16 | Xiaoling Yu, Yuntao Wang |
A Lattice-based Ring Signature Scheme Secure against Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1432, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
16 | Simeng Yuan, Wei Yu 0008, Kunpeng Wang, Xiuxiu Li |
Partial Key Exposure Attacks on RSA with Moduli N=prqs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: IEEE International Symposium on Information Theory, ISIT 2022, Espoo, Finland, June 26 - July 1, 2022, pp. 1436-1440, 2022, IEEE, 978-1-6654-2159-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Yuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert |
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV, pp. 508-536, 2022, Springer, 978-3-031-22971-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Andre Esser 0001, Alexander May 0001, Javier A. Verbel, Weiqiang Wen |
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III, pp. 346-375, 2022, Springer, 978-3-031-15981-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao 0010 |
Lattice-based revocable attribute-based encryption with decryption key exposure resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 15(6), pp. 428-441, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Chunhui Wu, Lishan Ke, Yusong Du |
Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 548, pp. 438-449, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Yangyang Bao, Weidong Qiu, Xiaochun Cheng |
Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 8(11), pp. 9189-9205, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Atsushi Takayasu, Yohei Watanabe 0001 |
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 849, pp. 64-98, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen |
Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 925, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
16 | Alexander May 0001, Julian Nowakowski, Santanu Sarkar 0001 |
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 972, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
16 | Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi |
(In)Security of Ring-LWE Under Partial Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Math. Cryptol. ![In: J. Math. Cryptol. 15(1), pp. 72-86, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Alexander May 0001, Julian Nowakowski, Santanu Sarkar 0001 |
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I, pp. 99-129, 2021, Springer, 978-3-030-92061-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
16 | Feifei Wang, Guosheng Xu 0001, Guoai Xu, Yuejie Wang, Junhao Peng |
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 2020, pp. 3805058:1-3805058:15, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro |
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 841, pp. 62-83, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu |
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 809, pp. 103-136, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Congge Xie, Jian Weng 0001, Jinming Wen |
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2020, pp. 1743421:1-1743421:11, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
16 | S. Mary Virgil Nithya, V. Rhymend Uthariaraj |
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2020, pp. 4838497:1-4838497:13, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Katarzyna Kapusta, Matthieu Rambaud, Gérard Memmi |
Revisiting Shared Data Protection Against Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, pp. 165-177, 2020, ACM, 978-1-4503-6750-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
16 | Shengmin Xu, Guomin Yang, Yi Mu 0001 |
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 479, pp. 116-134, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Xiaojun Zhang, Huaxiong Wang, Chunxiang Xu |
Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 472, pp. 223-234, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Baodong Qin, Qinglan Zhao, Dong Zheng 0001, Hui Cui 0001 |
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 490, pp. 74-92, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun |
Securing Cloud Data Under Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 7(3), pp. 838-849, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Atsushi Takayasu, Noboru Kunihiro |
Partial key exposure attacks on RSA: Achieving the Boneh-Durfee bound. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 761, pp. 51-77, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Katarzyna Kapusta, Gérard Memmi, Matthieu Rambaud |
Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1901.08083, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
16 | Shengmin Xu, Guomin Yang, Yi Mu 0001, Ximeng Liu |
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 97, pp. 284-294, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Yanyan Liu, Yiru Sun |
Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1455, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
16 | Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu |
Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 441-471, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Atsushi Takayasu, Noboru Kunihiro |
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 516, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
16 | Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu |
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 420, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
16 | Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi |
Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1068, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
16 | Katarzyna Kapusta, Gérard Memmi |
Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pp. 2231-2233, 2018, ACM, 978-1-4503-5693-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Katarzyna Kapusta, Gérard Memmi |
Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cyberspace Safety and Security - 10th International Symposium, CSS 2018, Amalfi, Italy, October 29-31, 2018, Proceedings, pp. 181-193, 2018, Springer, 978-3-030-01688-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Yuu Ishida, Junji Shikata, Yohei Watanabe 0001 |
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Cryptogr. ![In: Int. J. Appl. Cryptogr. 3(3), pp. 288-311, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 166 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|