The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Key-Exposure (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2003 (18) 2004-2005 (18) 2006-2007 (24) 2008-2009 (19) 2010-2014 (19) 2015-2016 (16) 2017-2019 (22) 2020-2021 (16) 2022-2024 (14)
Publication types (Num. hits)
article(70) inproceedings(96)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 97 occurrences of 51 keywords

Results
Found 166 publication records. Showing 166 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
113Yevgeniy Dodis, Moti Yung Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman
78Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure
68Wei Gao 0007, Xueli Wang, Dongqing Xie Chameleon Hashes Without Key Exposure Based on Factoring. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chameleon signature, key-exposure, chameleon hash
65Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li Identity-Based Key-Insulated Signature with Secure Key-Updates. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure
64Ran Canetti, Shai Halevi, Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure
63Mihir Bellare, Adriana Palacio Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key update, Encryption, Identity-based encryption, Key exposure
58Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure
52Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai Exposure-Resilient Functions and All-or-Nothing Transforms. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
51Yoshinori Aono A New Lattice Construction for Partial Key Exposure Attack for RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction
51Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF On-line/off-line signatures, Key exposure, Chameleon hashing
49Ellen Jochemsz, Benne de Weger A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction
48Giuseppe Ateniese, Breno de Medeiros On the Key Exposure Problem in Chameleon Hashes. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
48Johannes Blömer, Alexander May 0001 New Partial Key Exposure Attacks on RSA. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Yuan Zhou, Zhenfu Cao, Zhenchuan Chai Identity Based Key Insulated Signature. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu Identity-Based Threshold Key-Insulated Encryption without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold key-insulation, standard model, identity-based encryption, key-exposure
36Duc-Liem Vo, Kwangjo Kim Yet Another Forward Secure Signature from Bilinear Pairings. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key evolution, pairings, Forward security, key exposure
35Ron Steinfeld, Yuliang Zheng 0001 On the Security of RSA with Primes Sharing Least-Significant Bits. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Partial Key Exposure, Boneh-Durfee-Frankel Attack, Coppersmith Algorithm, Server-Aided Signature Generation, Cryptanalysis, RSA Cryptosystem, Communication Security, Least-Significant Bits
34Alfonso De Gregorio Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Diana Berbecaru, Luca Albertalli An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF generic FSS schemes, double cache technique, backward secrecy
31Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai Parallel Key-Insulated Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Jin Li 0002, Fangguo Zhang, Yanming Wang A Strong Identity Based Key-Insulated Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-insulated cryptosystem, Bilinear pairings, ID-based
28Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li Key-Insulated Group Signature Scheme with Selective Revocation. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Ran Canetti, Shai Halevi, Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
27Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience. Search on Bibsonomy BigCom The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim Chameleon Hashing Without Key Exposure. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Wen-Guey Tzeng, Zhi-Jia Tzeng Robust Key-Evolving Public Key Encryption Schemes. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
25Santanu Sarkar 0001, Subhamoy Maitra Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
25Matthias Ernst, Ellen Jochemsz, Alexander May 0001, Benne de Weger Partial Key Exposure Attacks on RSA up to Full Size Exponents. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Yuefei Zhu, Dan Xu An Efficient Key-Evolving Signature Scheme Based on Pairing. Search on Bibsonomy FTDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung Intrusion-Resilient Public-Key Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Dawn Xiaodong Song Practical forward secure group signature schemes. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Benoît Libert, Moti Yung Dynamic fully forward-secure group signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key protection, anonymity, security modeling, group signatures, forward security, key exposure
24Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 On the Improvement of the BDF Attack on LSBS-RSA. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB)
24Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, provable security, forward security, key exposure
22Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna Partial key exposure attack on RSA using some private key blocks. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Tianqi Zhou, Jian Shen 0001, Sai Ji, Yongjun Ren, Mingwu Zhang Key Exposure Resistant Group Key Agreement Protocol. Search on Bibsonomy ProvSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Chengyu Hu, Yuqin Xu, Pengtao Liu, Jia Yu 0005, Shanqing Guo, Minghao Zhao 0001 Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Search on Bibsonomy Inf. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li Enhanced blockchain based key management scheme against key exposure attack. Search on Bibsonomy AIIPCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Hanshu Hong, Zhixin Sun, Ximeng Liu A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Renwang Su New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile Agents. Search on Bibsonomy SNPD (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Alfonso De Gregorio Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
22Mihir Bellare, Adriana Palacio Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
21Dae Hyun Yum, Pil Joong Lee Efficient Key Updating Signature Schemes Based on IBS. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key insulated signature, intrusion resilient siganture, identity based signature
21Gene Itkis, Peng Xie Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Tage Stabell-Kulø, Arne Helme, Gianluca Dini Detecting Key-Dependencies. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa An Efficient Strong Key-Insulated Signature Scheme and Its Application. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF strong key-insulated signature, key leakage, DL assumption, random oracle model, adaptive security
18Satoshi Koga, Kouichi Sakurai A Distributed Online Certificate Status Protocol with a Single Public Key. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, forward security, bilinear maps, computation Diffie-Hellman problem
18Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel On the performance, feasibility, and use of forward-secure signatures. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF forward-secure signatures, digital signatures
18Ron Steinfeld, Yuliang Zheng 0001 An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Tal Malkin, Satoshi Obana, Moti Yung The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Dan Boneh, Glenn Durfee, Yair Frankel An Attack on RSA Given a Small Fraction of the Private Key Bits. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Qingqing Gan, Xiaoming Wang, Daxin Huang, Jianwei Li, Changji Wang, Zhen Liu Online/offline remote data auditing with strong key-exposure resilience for cloud storage. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Mengce Zheng Partial Key Exposure Attack on Common Prime RSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
16BoXue Huang, Juntao Gao, Xuelian Li Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. Search on Bibsonomy J. Cloud Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Wenting Shen, Jia Yu 0005, Ming Yang 0023, Jiankun Hu Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Mengce Zheng Partial Key Exposure Attack on Common Prime RSA. Search on Bibsonomy Inscrypt (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Congge Xie, Jian Weng 0001, Dehua Zhou Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. Search on Bibsonomy Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Longjiang Li, Jie Wang, Rui Zhang, Yuanchen Gao, Yonggang Li, Yuming Mao Exploiting Redundant Randomness for Resisting Key Exposure in Encrypted Communication Systems. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Andre Esser 0001, Alexander May 0001, Javier A. Verbel, Weiqiang Wen Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Yuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Xiaoling Yu, Yuntao Wang A Lattice-based Ring Signature Scheme Secure against Key Exposure. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Simeng Yuan, Wei Yu 0008, Kunpeng Wang, Xiuxiu Li Partial Key Exposure Attacks on RSA with Moduli N=prqs. Search on Bibsonomy ISIT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Yuanyuan Zhou 0006, Joop van de Pol, Yu Yu 0001, François-Xavier Standaert A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Andre Esser 0001, Alexander May 0001, Javier A. Verbel, Weiqiang Wen Partial Key Exposure Attacks on BIKE, Rainbow and NTRU. Search on Bibsonomy CRYPTO (3) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao 0010 Lattice-based revocable attribute-based encryption with decryption key exposure resistance. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Chunhui Wu, Lishan Ke, Yusong Du Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Yangyang Bao, Weidong Qiu, Xiaochun Cheng Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Atsushi Takayasu, Yohei Watanabe 0001 Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Marten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
16Alexander May 0001, Julian Nowakowski, Santanu Sarkar 0001 Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
16Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi (In)Security of Ring-LWE Under Partial Key Exposure. Search on Bibsonomy J. Math. Cryptol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Alexander May 0001, Julian Nowakowski, Santanu Sarkar 0001 Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Feifei Wang, Guosheng Xu 0001, Guoai Xu, Yuejie Wang, Junhao Peng A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Congge Xie, Jian Weng 0001, Jinming Wen Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16S. Mary Virgil Nithya, V. Rhymend Uthariaraj Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Katarzyna Kapusta, Matthieu Rambaud, Gérard Memmi Revisiting Shared Data Protection Against Key Exposure. Search on Bibsonomy AsiaCCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Shengmin Xu, Guomin Yang, Yi Mu 0001 Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Search on Bibsonomy Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Xiaojun Zhang, Huaxiong Wang, Chunxiang Xu Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Search on Bibsonomy Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Baodong Qin, Qinglan Zhao, Dong Zheng 0001, Hui Cui 0001 (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Search on Bibsonomy Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun Securing Cloud Data Under Key Exposure. Search on Bibsonomy IEEE Trans. Cloud Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Atsushi Takayasu, Noboru Kunihiro Partial key exposure attacks on RSA: Achieving the Boneh-Durfee bound. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Katarzyna Kapusta, Gérard Memmi, Matthieu Rambaud Circular All-Or-Nothing: Revisiting Data Protection Against Key Exposure. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Shengmin Xu, Guomin Yang, Yi Mu 0001, Ximeng Liu A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Yanyan Liu, Yiru Sun Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
16Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Atsushi Takayasu, Noboru Kunihiro Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
16Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
16Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
16Katarzyna Kapusta, Gérard Memmi Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Katarzyna Kapusta, Gérard Memmi Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. Search on Bibsonomy CSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Yuu Ishida, Junji Shikata, Yohei Watanabe 0001 CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 166 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license