The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase bit-security (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-2005 (16) 2006-2009 (16) 2010-2017 (20) 2018-2021 (15) 2022-2023 (12)
Publication types (Num. hits)
article(33) incollection(2) inproceedings(44)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 22 occurrences of 20 keywords

Results
Found 79 publication records. Showing 79 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
40Oded Goldreich 0001 On the Number of Close-and-Equal Pairs of Bits in a String. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF the RSA Scheme, Bit Security, Combinatorial Bounds, Bit-String Properties, Cryptography, Public Key Cryptosystems, Combinatorial Analysis
30Ian F. Blake, Theodoulos Garefalakis, Igor E. Shparlinski On the bit security of the Diffie-Hellman key. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, Bit security, Exponential sums
24Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham The Bit Security of Paillier's Encryption Scheme and Its Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Kaushik Nath 0001, Palash Sarkar 0001 Security and efficiency trade-offs for elliptic curve Diffie-Hellman at the 128-bit and 224-bit security levels. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Igor E. Shparlinski On the Generalised Hidden Number Problem and Bit Security of XTR. Search on Bibsonomy AAECC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Sanjit Chatterjee, Palash Sarkar 0001 Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF parameter size, security, standard model, identity based encryption
17Louis Granboulan A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Paz Morillo, Carla Ràfols The Security of All Bits Using List Decoding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit security, one-way function, list decoding
14Johan Håstad, Mats Näslund The security of all RSA and discrete log bits. Search on Bibsonomy J. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA-encryption, bit-security, complexity, Cryptography, discrete logarithms
14Zahra Jeddi, Ahmed K. F. Khattab, Esmaeil Amini, Magdy A. Bayoumi Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Xavier Boyen Miniature CCA2 PK Encryption: Tight Security Without Redundancy. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Matthew Henricksen Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham Paillier's Trapdoor Function Hides up to O(n) Bits. Search on Bibsonomy J. Cryptol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Decimv2. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar 0001 Improved Time-Memory Trade-Offs with Multiple Data. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time/memory/data trade-off, key sizes, block-cipher
11Léonard Dallot, Damien Vergnaud Provably Secure Code-Based Threshold Ring Signatures. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Vitaly Kiryukhin About "k-bit security" of MACs based on hash function Streebog. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
11Shun Watanabe, Kenji Yasunaga Bit-Security Preserving Hardness Amplification. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
11Marcus de Ree, Georgios Mantas, Jonathan Rodriguez 0001 Bit Security Estimation for Leakage-Prone Key Establishment Schemes. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks. Search on Bibsonomy SAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shun Watanabe, Kenji Yasunaga Unified View for Notions of Bit Security. Search on Bibsonomy ASIACRYPT (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Seyit Camtepe, Jarek Duda 0001, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski 0004, Josef Pieprzyk ANS-based compression and encryption with 128-bit security. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Keewoo Lee Bit Security as Cost to Observe Advantage: Towards the Definition from THE BOOK. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
11M. Rajululkahf BăhÄ"m: A Symmetric Cipher with Provable 128-bit Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
11Shun Watanabe, Kenji Yasunaga Unified View for Notions of Bit Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
11Zihao Song, Junichi Sakamoto, Shigeo Mitsunari, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto Efficient Software Implementation of GMT6-672 and GMT8-542 Pairing-Friendly Curves for a 128-Bit Security Level. Search on Bibsonomy ACNS Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Jinkyu Cho, Yongwoo Lee 0002, ZaHyun Koo, Jong-Seon No, Young-Sik Kim Improving Key Size and Bit-Security of Modified pqsigRM. Search on Bibsonomy ICTC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No Bit Security Estimation Using Various Information-Theoretic Measures. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
11Seyit Camtepe, Jarek Duda 0001, Arash Mahboubi, Pawel Morawiecki, Surya Nepal, Marcin Pawlowski 0004, Josef Pieprzyk ANS-based Compression and Encryption with 128-bit Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
11Shun Watanabe, Kenji Yasunaga Bit Security as Computational Cost for Winning Games with High Probability. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
11Shun Watanabe, Kenji Yasunaga Bit Security as Computational Cost for Winning Games with High Probability. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
11Kaushik Nath 0001, Palash Sarkar 0001 Efficient elliptic curve Diffie-Hellman computation at the 256-bit security level. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
11Narcisse Bang Mbang, Diego de Freitas Aranha, Emmanuel Fouotsa Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
11Narcisse Bang Mbang, Emmanuel Fouotsa, Célestin Lélé Parallel Computation of Optimal Ate Cryptographic Pairings at the 128, 192 and 256-bit security levels using elliptic net algorithm. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
11Dong-Hoon Lee, Young-Sik Kim, Jong-Seon No Bit Security Estimation Using Various Information-Theoretic Measures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
11Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
11Aurore Guillevic A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
11Kaushik Nath 0001, Palash Sarkar 0001 Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
11Aurore Guillevic A short-list of STNFS-secure pairing-friendly curves at the 128-bit security level. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
11Atil U. Ay, Cuauhtemoc Mancillas-López, Erdinç Öztürk, Francisco Rodríguez-Henríquez, Erkay Savas Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
11Daniele Micciancio, Michael Walter 0001 On the Bit Security of Cryptographic Primitives. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
11Daniele Micciancio, Michael Walter 0001 On the Bit Security of Cryptographic Primitives. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
11Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera Efficient Optimal Ate Pairing at 128-bit Security Level. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
11Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi Secure and Efficient Pairing at 256-Bit Security Level. Search on Bibsonomy ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
11Barak Shani On the Bit Security of Elliptic Curve Diffie-Hellman. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
11Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera Efficient Optimal Ate Pairing at 128-Bit Security Level. Search on Bibsonomy INDOCRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
11Fangguo Zhang Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. Search on Bibsonomy ProvSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
11Loubna Ghammam, Emmanuel Fouotsa On the Computation of the Optimal Ate Pairing at the 192-bit Security Level. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
11Barak Shani On the Bit Security of Elliptic Curve Diffie-Hellman. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
11Masahiro Ishii 0002, Atsuo Inomata, Kazutoshi Fujikawa A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
11Fangguo Zhang Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
11Mingqiang Wang, Tao Zhan, Haibin Zhang Bit Security of the CDH Problems over Finite Fields. Search on Bibsonomy SAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
11Dionathan Nakamura, Routo Terada RSA and Elliptic Curve Least Significant Bit Security. Search on Bibsonomy LATINCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
11Si-Wei Ren, Ke-Wei Lu Bit Security for Lucas-Based One-Way Function. Search on Bibsonomy AsiaJCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
11Marcin Rogawski, Kris Gaj, Ekawat Homsirikamol A high-speed unified hardware architecture for 128 and 256-bit security levels of AES and the SHA-3 candidate Grøstl. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
11Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez Implementing Pairings at the 192-bit Security Level. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
11Diego F. Aranha, Laura Fuentes-Castañeda, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez Implementing Pairings at the 192-Bit Security Level. Search on Bibsonomy Pairing The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
11Zahra Jeddi, Esmaeil Amini, Magdy A. Bayoumi RBS: Redundant Bit Security Algorithm for RFID Systems. Search on Bibsonomy ICCCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
11Dongyoung Roh, Sang Geun Hahn On the bit security of the weak Diffie-Hellman problem. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
11Nicolas Estibals Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
11Nicolas Estibals Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves. Search on Bibsonomy Pairing The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
11Mats Näslund, Igor E. Shparlinski, William Whyte On the Bit Security of NTRUEncrypt. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
11Wen-Ching W. Li, Mats Näslund, Igor E. Shparlinski Hidden Number Problem with the Trace and Bit Security of XTR and LUC. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
11Benny Chor, Oded Goldreich 0001, Shafi Goldwasser The Bit Security of Modular Squaring Given Partial Factorization of the Modulos. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
10Dong Su, Kewei Lv A New Hard-Core Predicate of Paillier's Trapdoor Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Paillier’s trapdoor function, Hard-core Predicate, Most significant bit
10Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator
9Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Sosemanuk, a Fast Software-Oriented Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Johan Håstad, Mats Näslund The Security of Individual RSA Bits. Search on Bibsonomy FOCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
8Yuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF GF(3)-addition, logical instruction, ? T pairing
7Mats Näslund Universal Hash Functions & Hard Core Bits. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
5Deike Priemuth-Schmid, Alex Biryukov Slid Pairs in Salsa20 and Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium
5Omran Ahmadi, Darrel Hankerson, Alfred Menezes Software Implementation of Arithmetic in F3m. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
5Joseph H. Silverman, William Whyte Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
5Hans Ulrich Simon Spectral Norm in Learning Theory: Some Selected Topics. Search on Bibsonomy Discovery Science The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
5Hans Ulrich Simon Spectral Norm in Learning Theory: Some Selected Topics. Search on Bibsonomy ALT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
5Antoine Joux, Frédéric Muller Chosen-Ciphertext Attacks Against MOSQUITO. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
5Igor E. Shparlinski, Arne Winterhof A Nonuniform Algorithm for the Hidden Number Problem in Subgroups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
5Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski Secure Bilinear Diffie-Hellman Bits. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
5Phong Q. Nguyen, Igor E. Shparlinski The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Search on Bibsonomy J. Cryptol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #79 of 79 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license