|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 573 occurrences of 364 keywords
|
|
|
Results
Found 2011 publication records. Showing 1953 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
The security of the Fiat-Shamir scheme in the presence of transient hardware faults. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack |
78 | Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi |
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
joint sparse form, left-to-right, multi-scalar multiplication, shamir method, elliptic curve cryptosystem |
72 | Shafi Goldwasser, Yael Tauman Kalai |
On the (In)security of the Fiat-Shamir Paradigm. |
FOCS |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Claus-Peter Schnorr |
Security of 2^t-Root Identification and Signatures. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model |
53 | David Chaum |
How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
51 | H. Ong, Claus-Peter Schnorr |
Fast Signature Generation With a Fiat Shamir-Like Scheme. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
51 | Yvo Desmedt, Claude Goutier, Samy Bengio |
Special Uses and Abuses of the Fiat-Shamir Passport Protocol. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
48 | Silvio Micali, Adi Shamir |
An Improvement of the Fiat-Shamir Identification and Signature Scheme. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
46 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang |
Changing Thresholds in the Absence of Secure Channels. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing |
42 | Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or |
42 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack |
42 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
Active hardware attacks and proactive countermeasures. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
42 | Nicolas T. Courtois |
The Security of Hidden Field Equations (HFE). |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
42 | Jane Fedorowicz |
Comments on Price/Performance Patterns of U.S. Computer Systems. |
Commun. ACM |
1981 |
DBLP DOI BibTeX RDF |
|
41 | Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka |
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Xin Jiang, Jintai Ding, Lei Hu |
Kipnis-Shamir Attack on HFE Revisited. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
MinRank, relinearization, Gröbner basis, multivariate public key cryptosystem, XL algorithm, HFE |
41 | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk |
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
A Fault-Injection Attack on Fiat-Shamir Cryptosystems. |
ICDCS Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Silvio Micali, Leonid Reyzin |
Improving the Exact Security of Fiat-Shamir Signature Schemes. |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
|
41 | Thorsten Theobald |
How to Break Shamir's Asymmetric Basis. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
41 | David Naccache |
A Montgomery-Suitable Fiat-Shamir-like Authenication Scheme. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
41 | Kazuo Ohta, Tatsuaki Okamoto |
A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
41 | Kazuo Ohta, Tatsuaki Okamoto |
A Modification of the Fiat-Shamir Scheme. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
39 | Adi Shamir |
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
39 | Julien Devevey |
Lattice-based Signatures in the Fiat-Shamir Paradigm. (Signatures Fondées sur les Réseaux Euclidiens dans le Paradigme de Fiat-Shamir). |
|
2023 |
RDF |
|
39 | Yvo Desmedt |
Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
39 | Yvo Desmedt |
Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Mirit Shamir, Lior Shamir, Mary H. Durfee |
The application of fuzzy logic to the precautionary principle. |
Artif. Intell. Law |
2007 |
DBLP DOI BibTeX RDF |
Precautionary principle, Environmental law, Fuzzy logic |
36 | Shoham Shamir, Orna Kupferman, Eli Shamir 0001 |
Branching-Depth Hierarchies. |
EXPRESS |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Jean-Sébastien Coron, David Naccache |
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Fiat-Shamir Identification Protocol, Zero-knowledge |
36 | Cynthia Dwork, Moni Naor, Omer Reingold, Larry J. Stockmeyer |
Magic Functions. |
J. ACM |
2003 |
DBLP DOI BibTeX RDF |
Fiat-Shamir methodology, interactive argument, magic function, selective decommitment, Digital signature, zero knowledge, interactive proof system |
36 | Chih-Hung Li, Josef Pieprzyk |
Conference Key Agreement from Secret Sharing. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols |
32 | Hua Huang 0001, TianNan Fu, Paul L. Rosin, Chun Qi |
Real-time content-aware image resizing. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Keyword content aware, video resizing, real time, matching, image resizing |
32 | Changlu Lin, Lein Harn, Dingfeng Ye |
Ideal Perfect Multilevel Threshold Secret Sharing Scheme. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Matthew Robshaw |
The eSTREAM Project. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
On-line/off-line signatures, Key exposure, Chameleon hashing |
32 | Moti Yung, Yunlei Zhao |
Interactive Zero-Knowledge with Restricted Random Oracles. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Haifeng Qian, Zhenfu Cao |
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
RSA, provably secure, random oracle model, proxy signature, identity-based signature |
32 | Silvio Micali, Leonid Reyzin |
Improving the Exact Security of Digital Signature Schemes. |
J. Cryptol. |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
32 | Don Coppersmith, Jacques Stern, Serge Vaudenay |
Attacks on the Birational Permutation Signature Schemes. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
32 | Louis C. Guillou, Jean-Jacques Quisquater |
A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
32 | Gustavus J. Simmons |
A Secure Subliminal Channel (?). |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
32 | Maurice Mignotte |
How to Share a Secret? |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
|
30 | Boaz Tsaban |
Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Mihir Bellare, Sarah Shoup |
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Christophe Tartary, Huaxiong Wang |
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Vincent Bénony, François Recher, Eric Wegrzynowski, Caroline Fontaine |
Cryptanalysis of a Particular Case of Klimov-Shamir Pseudo-Random Generator. |
SETA |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Kee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im |
Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Norio Adachi, Yuichi Komano, Satoshi Aoki, Kazuo Ohta |
The Security Problems of Rivest and Shamir's PayWord Scheme. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama |
Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
30 | Jacques Stern |
An Alternative to the Fiat-Shamir Protocol. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
30 | Hans-Joachim Knobloch |
A Smart Card Implementation of the Fiat-Shamir Identification Scheme. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
30 | Dennis Estes, Leonard M. Adleman, Kireeti Kompella, Kevin S. McCurley, Gary L. Miller |
Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
30 | J. C. Lagarias 0001 |
Performance Analysis of Shamir's Attack on the Basic Merkle-Hellman Knapsack Cryptosystem. |
ICALP |
1984 |
DBLP DOI BibTeX RDF |
|
29 | Nicolas T. Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir |
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Adi Shamir |
Memory Efficient Variants of Public-Key Schemes for Smart Card Applications. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
29 | H. Ong, Claus-Peter Schnorr, Adi Shamir |
Efficient Signature Schemes Based on Polynomial Equations. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
29 | Adi Shamir |
On the Generation of Cryptographically Strong Pseudo-Random Sequences. |
ICALP |
1981 |
DBLP DOI BibTeX RDF |
|
25 | Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Giuseppe Bianchi 0001 |
Key escrow schemes with sliding window for privacy-aware anomaly detection system. |
EDBT/ICDT Workshops |
2010 |
DBLP DOI BibTeX RDF |
Shamir's scheme, privacy, sliding window, key revocation |
25 | Chin-Chen Chang 0001, Chia-Chen Lin 0001, T. Hoang Ngan Le, Hoai Bac Le |
A New Probabilistic Visual Secret Sharing Scheme for Color Images. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Probabilistic visual secret sharing, Shamir?s scheme, GSBTC technique, (2, n) ProbVSS scheme, color images |
25 | Ronald J. Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus |
TinyPK: securing sensor networks with public key technology. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
public key (PK), rivest shamir adelman (RSA), sensor networks, authentication, cryptography, encryption, key management, TinyOS, diffie-hellman |
21 | Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas |
Polynomial approach in a secret image sharing using quadratic residue. |
ISCIS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk |
Practical Threshold Signatures with Linear Secret Sharing Schemes. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Linear secret sharing, function sharing, threshold cryptography |
21 | Kazukuni Kobara, Kirill Morozov, Raphael Overbeck |
Coding-Based Oblivious Transfer. |
MMICS |
2008 |
DBLP DOI BibTeX RDF |
permuted kernel problem, Oblivious transfer, McEliece cryptosystem, coding-based cryptography |
21 | Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Rosario Gennaro |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Yugeng Sun, Juwei Zhang, Hao Ji, Ting Yang |
KMSGC: A Key Management Scheme for Clustered Wireless Sensor Networks Based on Group-oriented Cryptography. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Ping Yu 0006, Stephen R. Tate |
Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
Online/Offline Signing, Devices with Limited Computing Capabilities, Digital Signature, Standard Model, Strong RSA Assumption |
21 | Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret |
Cryptanalysis of MinRank. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Ronald Cramer, Ivan Damgård, Robbert de Haan |
Atomic Secure Multi-party Multiplication with Low Communication. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Noam Kogan, Tamir Tassa |
Improved efficiency for revocation schemes via Newton interpolation. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Newton interpolation, secret sharing, broadcast encryption, User revocation |
21 | Håvard Molland, Tor Helleseth |
Linear Properties in T-Functions. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 |
Generic On-Line/Off-Line Threshold Signatures. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic |
21 | Guofu Gui, Ling-ge Jiang, Chen He 0001 |
A new watermarking system for joint ownership verification. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoyu Ruan, Rajendra S. Katti |
Left-to-Right Optimal Signed-Binary Representation of a Pair of Integers. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
elliptic scalar multiplication, recoding of integers, joint sparse form, elliptic curve cryptography, Public-key cryptography |
21 | Nicolas T. Courtois, Magnus Daum, Patrick Felke |
On the Security of HFE, HFEv- and Quartz. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields |
21 | Souradyuti Paul, Bart Preneel |
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Ching-Nung Yang, Hsu-Tun Teng |
An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment. |
CEC |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Ayako Maeda, Atsuko Miyaji, Mitsuru Tada |
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Peter Landrock |
A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). |
Security Protocols Workshop |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini |
Secret Sharing in Multilevel and Compartmented Groups. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security |
21 | Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini |
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
cryptography, computer security, secret sharing, threshold schemes, group oriented cryptography |
21 | David Naccache |
Can O.S.S. be Repaired? Proposal for a New Practical Signature Scheme. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Jacques Patarin, Pascal Chauvaud |
Improved Algorithms for the Permuted Kernel Problem. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Jacques Stern |
A New Identification Scheme Based on Syndrome Decoding. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Alexander Shen |
IP = PSPACE: Simplified Proof. |
J. ACM |
1992 |
DBLP DOI BibTeX RDF |
interactive proofs, PSPACE |
21 | Cynthia Dwork, Moni Naor |
Pricing via Processing or Combatting Junk Mail. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
21 | Lars R. Knudsen |
Iterative Characteristics of DES and s²-DES. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
21 | Hiroshi Miyano |
A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
21 | Xuejia Lai, James L. Massey, Sean Murphy |
Markov Ciphers and Differential Cryptanalysis. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
21 | Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker 0001 |
A General Zero-Knowledge Scheme (Extended Abstract). |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi |
Secure Audio Teleconference. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
identification, signature, bridging, secrecy |
21 | Gustavus J. Simmons |
The Subliminal Channel and Digital Signature. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
21 | James A. Davis, Diane B. Holdridge, Gustavus J. Simmons |
Status Report on Factoring (At the Sandia National Laboratories). |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
19 | Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst |
Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1953 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|