The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Shamir with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1962-1978 (17) 1979-1981 (16) 1982-1983 (16) 1984 (18) 1985-1986 (23) 1987-1988 (20) 1989 (20) 1990 (18) 1991 (17) 1992 (22) 1993 (28) 1994 (19) 1995-1996 (23) 1997 (18) 1998 (26) 1999 (40) 2000 (31) 2001 (32) 2002 (45) 2003 (53) 2004 (60) 2005 (81) 2006 (71) 2007 (64) 2008 (81) 2009 (85) 2010 (63) 2011 (72) 2012 (63) 2013 (63) 2014 (56) 2015 (66) 2016 (65) 2017 (65) 2018 (81) 2019 (69) 2020 (71) 2021 (86) 2022 (76) 2023 (90) 2024 (23)
Publication types (Num. hits)
article(984) book(1) incollection(13) inproceedings(940) phdthesis(8) proceedings(7)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 573 occurrences of 364 keywords

Results
Found 2011 publication records. Showing 1953 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
87Artemios G. Voyiatzis, Dimitrios N. Serpanos The security of the Fiat-Shamir scheme in the presence of transient hardware faults. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack
78Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF joint sparse form, left-to-right, multi-scalar multiplication, shamir method, elliptic curve cryptosystem
72Shafi Goldwasser, Yael Tauman Kalai On the (In)security of the Fiat-Shamir Paradigm. Search on Bibsonomy FOCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
57Claus-Peter Schnorr Security of 2^t-Root Identification and Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model
53David Chaum How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
51H. Ong, Claus-Peter Schnorr Fast Signature Generation With a Fiat Shamir-Like Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
51Yvo Desmedt, Claude Goutier, Samy Bengio Special Uses and Abuses of the Fiat-Shamir Passport Protocol. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
48Silvio Micali, Adi Shamir An Improvement of the Fiat-Shamir Identification and Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
46Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing
42Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or
42Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack
42Artemios G. Voyiatzis, Dimitrios N. Serpanos Active hardware attacks and proactive countermeasures. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis
42Nicolas T. Courtois The Security of Hidden Field Equations (HFE). Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
42Jane Fedorowicz Comments on Price/Performance Patterns of U.S. Computer Systems. Search on Bibsonomy Commun. ACM The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
41Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Xin Jiang, Jintai Ding, Lei Hu Kipnis-Shamir Attack on HFE Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MinRank, relinearization, Gröbner basis, multivariate public key cryptosystem, XL algorithm, HFE
41Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Artemios G. Voyiatzis, Dimitrios N. Serpanos A Fault-Injection Attack on Fiat-Shamir Cryptosystems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Silvio Micali, Leonid Reyzin Improving the Exact Security of Fiat-Shamir Signature Schemes. Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
41Thorsten Theobald How to Break Shamir's Asymmetric Basis. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
41David Naccache A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
41Kazuo Ohta, Tatsuaki Okamoto A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
41Kazuo Ohta, Tatsuaki Okamoto A Modification of the Fiat-Shamir Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
39Adi Shamir An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
39Julien Devevey Lattice-based Signatures in the Fiat-Shamir Paradigm. (Signatures Fondées sur les Réseaux Euclidiens dans le Paradigme de Fiat-Shamir). Search on Bibsonomy 2023   RDF
39Yvo Desmedt Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
39Yvo Desmedt Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Mirit Shamir, Lior Shamir, Mary H. Durfee The application of fuzzy logic to the precautionary principle. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Precautionary principle, Environmental law, Fuzzy logic
36Shoham Shamir, Orna Kupferman, Eli Shamir 0001 Branching-Depth Hierarchies. Search on Bibsonomy EXPRESS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Jean-Sébastien Coron, David Naccache Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fiat-Shamir Identification Protocol, Zero-knowledge
36Cynthia Dwork, Moni Naor, Omer Reingold, Larry J. Stockmeyer Magic Functions. Search on Bibsonomy J. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Fiat-Shamir methodology, interactive argument, magic function, selective decommitment, Digital signature, zero knowledge, interactive proof system
36Chih-Hung Li, Josef Pieprzyk Conference Key Agreement from Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols
32Hua Huang 0001, TianNan Fu, Paul L. Rosin, Chun Qi Real-time content-aware image resizing. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Keyword content aware, video resizing, real time, matching, image resizing
32Changlu Lin, Lein Harn, Dingfeng Ye Ideal Perfect Multilevel Threshold Secret Sharing Scheme. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Matthew Robshaw The eSTREAM Project. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF On-line/off-line signatures, Key exposure, Chameleon hashing
32Moti Yung, Yunlei Zhao Interactive Zero-Knowledge with Restricted Random Oracles. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Haifeng Qian, Zhenfu Cao A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, provably secure, random oracle model, proxy signature, identity-based signature
32Silvio Micali, Leonid Reyzin Improving the Exact Security of Digital Signature Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
32Don Coppersmith, Jacques Stern, Serge Vaudenay Attacks on the Birational Permutation Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
32Louis C. Guillou, Jean-Jacques Quisquater A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
32Gustavus J. Simmons A Secure Subliminal Channel (?). Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
32Maurice Mignotte How to Share a Secret? Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
30Boaz Tsaban Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Mihir Bellare, Sarah Shoup Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Christophe Tartary, Huaxiong Wang Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Vincent Bénony, François Recher, Eric Wegrzynowski, Caroline Fontaine Cryptanalysis of a Particular Case of Klimov-Shamir Pseudo-Random Generator. Search on Bibsonomy SETA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Kee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Norio Adachi, Yuichi Komano, Satoshi Aoki, Kazuo Ohta The Security Problems of Rivest and Shamir's PayWord Scheme. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
30Jacques Stern An Alternative to the Fiat-Shamir Protocol. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
30Hans-Joachim Knobloch A Smart Card Implementation of the Fiat-Shamir Identification Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
30Dennis Estes, Leonard M. Adleman, Kireeti Kompella, Kevin S. McCurley, Gary L. Miller Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
30J. C. Lagarias 0001 Performance Analysis of Shamir's Attack on the Basic Merkle-Hellman Knapsack Cryptosystem. Search on Bibsonomy ICALP The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
29Nicolas T. Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Adi Shamir Memory Efficient Variants of Public-Key Schemes for Smart Card Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
29H. Ong, Claus-Peter Schnorr, Adi Shamir Efficient Signature Schemes Based on Polynomial Equations. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
29Adi Shamir On the Generation of Cryptographically Strong Pseudo-Random Sequences. Search on Bibsonomy ICALP The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
25Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Giuseppe Bianchi 0001 Key escrow schemes with sliding window for privacy-aware anomaly detection system. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Shamir's scheme, privacy, sliding window, key revocation
25Chin-Chen Chang 0001, Chia-Chen Lin 0001, T. Hoang Ngan Le, Hoai Bac Le A New Probabilistic Visual Secret Sharing Scheme for Color Images. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Probabilistic visual secret sharing, Shamir?s scheme, GSBTC technique, (2, n) ProbVSS scheme, color images
25Ronald J. Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus TinyPK: securing sensor networks with public key technology. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public key (PK), rivest shamir adelman (RSA), sensor networks, authentication, cryptography, encryption, key management, TinyOS, diffie-hellman
21Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas Polynomial approach in a secret image sharing using quadratic residue. Search on Bibsonomy ISCIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk Practical Threshold Signatures with Linear Secret Sharing Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear secret sharing, function sharing, threshold cryptography
21Kazukuni Kobara, Kirill Morozov, Raphael Overbeck Coding-Based Oblivious Transfer. Search on Bibsonomy MMICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF permuted kernel problem, Oblivious transfer, McEliece cryptosystem, coding-based cryptography
21Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Rosario Gennaro Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Yugeng Sun, Juwei Zhang, Hao Ji, Ting Yang KMSGC: A Key Management Scheme for Clustered Wireless Sensor Networks Based on Group-oriented Cryptography. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Ping Yu 0006, Stephen R. Tate Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online/Offline Signing, Devices with Limited Computing Capabilities, Digital Signature, Standard Model, Strong RSA Assumption
21Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret Cryptanalysis of MinRank. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Ronald Cramer, Ivan Damgård, Robbert de Haan Atomic Secure Multi-party Multiplication with Low Communication. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Noam Kogan, Tamir Tassa Improved efficiency for revocation schemes via Newton interpolation. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Newton interpolation, secret sharing, broadcast encryption, User revocation
21Håvard Molland, Tor Helleseth Linear Properties in T-Functions. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 Generic On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic
21Guofu Gui, Ling-ge Jiang, Chen He 0001 A new watermarking system for joint ownership verification. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Xiaoyu Ruan, Rajendra S. Katti Left-to-Right Optimal Signed-Binary Representation of a Pair of Integers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF elliptic scalar multiplication, recoding of integers, joint sparse form, elliptic curve cryptography, Public-key cryptography
21Nicolas T. Courtois, Magnus Daum, Patrick Felke On the Security of HFE, HFEv- and Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields
21Souradyuti Paul, Bart Preneel Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Ching-Nung Yang, Hsu-Tun Teng An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Ayako Maeda, Atsuko Miyaji, Mitsuru Tada Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Peter Landrock A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
21Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini Secret Sharing in Multilevel and Compartmented Groups. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security
21Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF cryptography, computer security, secret sharing, threshold schemes, group oriented cryptography
21David Naccache Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
21Jacques Patarin, Pascal Chauvaud Improved Algorithms for the Permuted Kernel Problem. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
21Jacques Stern A New Identification Scheme Based on Syndrome Decoding. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
21Alexander Shen IP = PSPACE: Simplified Proof. Search on Bibsonomy J. ACM The full citation details ... 1992 DBLP  DOI  BibTeX  RDF interactive proofs, PSPACE
21Cynthia Dwork, Moni Naor Pricing via Processing or Combatting Junk Mail. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
21Lars R. Knudsen Iterative Characteristics of DES and s²-DES. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
21Hiroshi Miyano A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
21Xuejia Lai, James L. Massey, Sean Murphy Markov Ciphers and Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
21Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker 0001 A General Zero-Knowledge Scheme (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi Secure Audio Teleconference. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF identification, signature, bridging, secrecy
21Gustavus J. Simmons The Subliminal Channel and Digital Signature. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
21James A. Davis, Diane B. Holdridge, Gustavus J. Simmons Status Report on Factoring (At the Sandia National Laboratories). Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
19Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1953 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license