|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 666 occurrences of 307 keywords
|
|
|
Results
Found 1409 publication records. Showing 1409 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
72 | Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang |
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
provably secure, signcryption, Identity based cryptography |
67 | Xiaoming Hu, Shangteng Huang |
A Provably Secure Blind Signature Scheme. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
Polynomial reduction, Security arguments, Provably secure, Blind signature |
58 | Emmanuel Prouff, Christophe Giraud 0001, Sébastien Aumônier |
Provably Secure S-Box Implementation Based on Fourier Transform. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box |
58 | Tatsuaki Okamoto |
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
57 | Huafei Zhu, Feng Bao 0001, Tieyan Li, Ying Qiu |
More on Shared-Scalar-Product Protocols. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Malicious model, shared-scalar-product protocol, provably secure |
51 | Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Provably-secure time-bound hierarchical key assignment schemes. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
access control, provable security, key assignment |
51 | Shuhua Wu, Yuefei Zhu |
Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
provably secure, key exchange, password authenticated, dynamic group |
48 | Nicholas J. Hopper, Luis von Ahn, John Langford 0001 |
Provably Secure Steganography. |
IEEE Trans. Computers |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Provably Secure Timed-Release Public Key Encryption. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
key-insulated encryption, timed-release, authenticated encryption |
48 | Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang |
Provably Secure and ID-Based Group Signature Scheme. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai |
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Birgit Pfitzmann, Matthias Schunter, Michael Waidner |
How to Break Another Provably Secure Payment System. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
44 | Mike Burmester, Breno de Medeiros, Rossana Motta |
Robust, anonymous RFID authentication with constant key-lookup. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
provably secure protocols, privacy, scalability, RFID, availability, unlinkability |
44 | Yuichi Komano, Kazuo Ohta |
Taxonomic Consideration to OAEP Variants and Their Security. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
SAEP, provably secure, reduction, Padding, OAEP |
44 | Marc Joye, Jean-Jacques Quisquater, Moti Yung |
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Richard Berger, René Peralta 0001, Tom Tedrick |
A Provably Secure Oblivious Transfer Protocol. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
41 | Shuhua Wu, Yuefei Zhu |
Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
provably secure, Password, authenticated key exchange, cross-realm |
41 | Yi Mu 0001, Willy Susilo, Huafei Zhu |
Compact sequential aggregate signatures. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
RSA problem, communication, computer, provably secure, signatures |
41 | Haifeng Qian, Zhenfu Cao |
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
RSA, provably secure, random oracle model, proxy signature, identity-based signature |
41 | Shaoquan Jiang |
Efficient Primitives from Exponentiation in Zp. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Huafei Zhu, Feng Bao 0001 |
Oblivious Keyword Search Protocols in the Public Database Model. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Weijia Wang, Lei Hu, Yong Li 0002 |
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
39 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
36 | Kazuhiko Minematsu, Yukiyasu Tsunoo |
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Differentially-uniform permutation, MAC, Block cipher, AES |
36 | Young-Seol Kim, Jik-Hyun Chang |
Provably Secure Proxy Blind Signature Scheme. |
ISM |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm |
36 | David Pointcheval, Jacques Stern |
Provably Secure Blind Signature Schemes. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
35 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
Secure Hierarchical Identity Based Signature and Its Application. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Hierarchical identity-based signature, forward-secure signature, bilinear pairings |
34 | Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong |
Generic Security-Amplifying Methods of Ordinary Digital Signatures. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability |
34 | Jin Li 0002, Yuen-Yan Chan, Yanming Wang |
A Generic Construction of Secure Signatures Without Random Oracles. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, Signature, Standard Model |
32 | María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar |
A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Johannes Blömer, Jorge Guajardo, Volker Krummel |
Provably Secure Masking of AES. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Jinho Kim, Kwangjo Kim, Chulsoo Lee |
An Efficient and Provably Secure Threshold Blind Signature. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Alfredo De Santis, Moti Yung |
On the Design of Provably Secure Cryptographic Hash Functions. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
32 | Cas J. F. Cremers |
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Session- state reveal, Ephemeral Key reveal, Provably-secure, Authenticated Key Exchange |
32 | Shuhua Wu, Yuefei Zhu |
Efficient Hybrid Password-Based Authenticated Group Key Exchange. |
APWeb/WAIM |
2009 |
DBLP DOI BibTeX RDF |
provably secure, password authenticated, group key exchange |
32 | Khaled Ouafi, Raphael C.-W. Phan |
Privacy of Recent RFID Authentication Protocols. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
privacy, RFID, provably secure, authentication protocols, untraceability |
32 | Markku-Juhani Olavi Saarinen |
Linearization Attacks Against Syndrome Based Hashes. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack |
32 | Chik How Tan |
A secure signature scheme. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
strong RSA, cryptography, digital signature, factorization |
29 | Claude Castelluccia, Aldar C.-F. Chan, Einar Mykletun, Gene Tsudik |
Efficient and provably secure aggregation of encrypted data in wireless sensor networks. |
ACM Trans. Sens. Networks |
2009 |
DBLP DOI BibTeX RDF |
secure data aggregation, wireless sensor networks, privacy, Authentication, cryptography, stream ciphers, pseudorandom functions |
29 | Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis |
A Provably Secure One-Pass Two-Party Key Establishment Protocol. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation |
29 | Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro |
Provably Secure Electronic Cash Based on Blind Multisignature Schemes. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Blind multisignature, provable security, random oracle model, electronic cash |
29 | Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication |
29 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
On Session Key Construction in Provably-Secure Key Establishment Protocols. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Yuliang Zheng 0001, Yongge Wang |
Efficient and provably secure ciphers for storage device block level encryption. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
storage device encryption, hash function, symmetric cipher |
29 | Ahto Buldas, Märt Saarepera |
On Provably Secure Time-Stamping Schemes. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Shouhuai Xu, Ravi S. Sandhu |
Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Victor Boyko, Philip D. MacKenzie, Sarvar Patel |
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik |
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes |
29 | Eiichiro Fujisaki, Tatsuaki Okamoto |
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Stefan Lucks |
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Yan Zong Ding, Michael O. Rabin |
Hyper-Encryption and Everlasting Security. |
STACS |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Jonathan Katz, Moti Yung |
Scalable Protocols for Authenticated Group Key Exchange. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A Strong Identity Based Key-Insulated Cryptosystem. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
Key-insulated cryptosystem, Bilinear pairings, ID-based |
28 | Jonathan Katz, Moti Yung |
Scalable Protocols for Authenticated Group Key Exchange. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Ivan Damgård, Jesper Buus Nielsen |
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Jianhong Zhang, Hua Chen, Qin Geng |
Efficient and Provably Secure Self-certified Signature Scheme. |
AMT |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Léonard Dallot, Damien Vergnaud |
Provably Secure Code-Based Threshold Ring Signatures. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff |
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Yassin M. Hasan |
From stream to provably secure block ciphers based on pseudorandom matrix transformations. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Provably secure authenticated group Diffie-Hellman key exchange. |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, Diffie-Hellman, Group Key Exchange |
26 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Efficient Provably-Secure Hierarchical Key Assignment Schemes. |
MFCS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
New constructions for provably-secure time-bound hierarchical key assignment schemes. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
access control, provable security, key assignment |
26 | Lei Zhang 0009, Futai Zhang, Wei Wu 0001 |
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography |
26 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval |
Provably secure password-based authentication in TLS. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
encrypted key exchange, password authentication, TLS |
26 | Anna Lysyanskaya, Mira Meyerovich |
Provably Secure Steganography with Imperfect Sampling. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
digital signatures, Markov processes, steganography, Information hiding |
26 | Shanshan Duan, Zhenfu Cao |
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Martin Boesgaard, Thomas Christensen, Erik Zenner |
Badger - A Fast and Provably Secure MAC. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
tree, MAC, universal hash, pseudo-random generator |
26 | Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater |
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang |
Practical and Provably-Secure Multicasting over High-Delay Networks. |
International Conference on Computational Science (2) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
26 | Lan Nguyen, Reihaneh Safavi-Naini |
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
26 | David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar |
A Provably Secure Elliptic Curve Scheme with Fast Encryption. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Ratna Dutta, Rana Barua, Palash Sarkar 0001 |
Provably Secure Authenticated Tree Based Group Key Agreement. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
provable security, bilinear pairing, group key agreement, authenticated key agreement |
26 | Nikolay P. Varnovsky, Vladimir A. Zakharov |
On the Possibility of Provably Secure Obfuscating Programs. |
Ershov Memorial Conference |
2003 |
DBLP DOI BibTeX RDF |
hard-core predicate, security, program transformation, mutual information, obfuscation, one-way function |
26 | Mario Di Raimondo, Rosario Gennaro |
Provably Secure Threshold Password-Authenticated Key Exchange. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Greg Maitland, Colin Boyd |
A Provably Secure Restrictive Partially Blind Signature Scheme. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Chan H. Lee, Xiaotie Deng, Huafei Zhu |
An Identification Scheme Provably Secure against Reset Attack. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Wakaha Ogata, Kaoru Kurosawa |
Provably Secure Metering Scheme. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Ronald Cramer, Victor Shoup |
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Shai Halevi, Silvio Micali |
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
26 | Victor Shoup |
On Fast and Provably Secure Message Authentication Based on Universal Hashing. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
26 | Ueli M. Maurer |
A Provably-Secure Strongly-Randomized Cipher. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
26 | Shinji Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii |
Provably Secure Key-Updating Schemes in Identity-Based Systems. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
26 | Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai |
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
25 | Yair Frankel, Yiannis Tsiounis, Moti Yung |
Fair Off-Line e-cash Made Easy. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo |
Towards a Theory of White-Box Security. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Raphael C.-W. Phan, Serge Vaudenay |
Security-Preserving Asymmetric Protocol Encapsulation. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee 0001 |
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Kaoru Kurosawa, Katja Schmidt-Samoa |
New Online/Offline Signature Schemes Without Random Oracles. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption |
25 | Kaoru Kurosawa, Swee-Huay Heng |
Identity-Based Identification Without Random Oracles. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
ID-based cryptography, identification scheme |
25 | Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong |
Pairing-Based Provable Blind Signature Scheme Without Random Oracles. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Alexander W. Dent |
A Designer's Guide to KEMs. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Xavier Boyen, Qixiang Mei, Brent Waters |
Direct chosen ciphertext security from identity-based techniques. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
identity-based encryption, chosen ciphertext security |
25 | Luis von Ahn, Nicholas J. Hopper, John Langford 0001 |
Covert two-party computation. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
covert computation, fair two-party computation, two-party computation, steganography |
25 | Chiu-Yuen Koo |
Broadcast in radio networks tolerating byzantine adversarial behavior. |
PODC |
2004 |
DBLP DOI BibTeX RDF |
fault tolerance, broadcast, radio networks |
22 | Xing-Lan Zhang |
Authenticated Key Exchange Protocol in One-Round. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity |
22 | Xavier Boyen, Brent Waters |
Compact Group Signatures Without Random Oracles. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Michael Backes 0001, Markus Dürmuth |
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1409 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|