The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ciphertexts with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1994 (16) 1995-1998 (16) 1999-2000 (20) 2001-2003 (25) 2004-2005 (41) 2006 (22) 2007 (37) 2008 (34) 2009 (31) 2010-2011 (26) 2012 (18) 2013-2014 (24) 2015 (15) 2016 (18) 2017 (20) 2018-2019 (25) 2020-2021 (15) 2022-2023 (31) 2024 (4)
Publication types (Num. hits)
article(141) inproceedings(297)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 225 occurrences of 134 keywords

Results
Found 438 publication records. Showing 438 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
69Brent Waters Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
69Toshihiko Matsuo Proxy Re-encryption Systems for Identity-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy re-encryption system, public key encryption, identity-based encryption
69Eli Biham, Adi Shamir Differential Cryptanalysis of the Full 16-Round DES. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
57Jun Furukawa 0001, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low error rate, biometrics, Fuzzy, identity-based
54Craig Gentry, Brent Waters Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54Dan Boneh, Amit Sahai, Brent Waters Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
54Bodo Möller A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Benoît Libert, Damien Vergnaud Tracing Malicious Proxies in Proxy Re-encryption. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectional proxy re-encryption, transferability issues, collusion detection and traceability
46Christophe Giraud 0001 DFA on AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Jens Groth, Steve Lu 0001 Verifiable Shuffle of Large Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF homomorphic commitment, honest verifier zero-knowledge, homomorphic encryption, Shuffle, mix-net
43Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Nuttapong Attrapadung, Jun Furukawa 0001, Hideki Imai Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Dan Boneh, Craig Gentry, Brent Waters Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Craig Gentry How to Compress Rabin Ciphertexts and Signatures (and More). Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Xiaoliang Che, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang 0001, Xiaoyuan Yang 0002, Tanping Zhou Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Edna Milgo A secure unidirectional proxy re-encryption using identity and secret key exchange. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cipher attacks, proxy, cryptosystems, ciphertexts
34Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong-Sheng Zhou Secure Function Collection with Sublinear Storage. Search on Bibsonomy ICALP (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Alexandra Boldyreva Strengthening Security of RSA-OAEP. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Jens Groth, Yuval Ishai Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF zero-knowledge argument, sub-linear communication, homomorphic encryption, Shuffle, mix-net
34Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks
34Gilles Piret, Jean-Jacques Quisquater A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Block Ciphers, AES, Side-channel Attacks, Fault Attacks
31Lie Liu, Chun Yuan Trace and revoke systems with short ciphertexts. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF revoke, trace, broadcast encryption, ciphertext
31Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based Encryption, Pairing
31Cécile Delerablée, Pascal Paillier, David Pointcheval Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Cécile Delerablée Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Dan Boneh, Eu-Jin Goh, Kobbi Nissim Evaluating 2-DNF Formulas on Ciphertexts. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Markus Jakobsson, Ari Juels Mix and Match: Secure Function Evaluation via Ciphertexts. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Practical ID-based encryption for wireless sensor network. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF online/offline encryption, identity-based encryption, wireless sensor network security
23Nuttapong Attrapadung, Hideki Imai Conjunctive Broadcast and Attribute-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key policy, Revocable ABE, Disjunctive multi-authority ABE, Broadcast encryption, Attribute-based encryption, Ciphertext policy
23Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
23Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Conditional Proxy Broadcast Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption
23David Galindo Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-interactive proofs, standard model, public key encryption, identity-based encryption
23Chong Hee Kim, Jean-Jacques Quisquater New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES key schedule, AES, Fault attack, DFA, Differential Fault Analysis
23Shanqing Guo, Chunhua Zhang Identity-based Broadcast Encryption Scheme with Untrusted PKG. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Goichiro Hanaoka, Kaoru Kurosawa Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Benoît Libert, Damien Vergnaud Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption
23David Cash, Eike Kiltz, Victor Shoup The Twin Diffie-Hellman Problem and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Junko Takahashi, Toshinori Fukunaga Improved Differential Fault Analysis on CLEFIA. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Michael Gorski, Stefan Lucks New Related-Key Boomerang Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
23Jiali Choy, Khoongming Khoo, Chuan-Wen Loe Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF time-memory-data trade-off, block cipher, meet-in-the-middle, triple DES
23Ben Adida, Douglas Wikström How to Shuffle in Public. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Jun Furukawa 0001, Nuttapong Attrapadung Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box
23Akinori Kawachi, Keisuke Tanaka, Keita Xagawa Multi-bit Cryptosystems Based on Lattice Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Hua Chen 0011, Wenling Wu, Dengguo Feng Differential Fault Analysis on CLEFIA. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Generalized Feistel Structure, Differential Fault Attack, Block Cipher
23Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Verifiable shuffles, Paillier public-key system, Privacy, Mix-nets, Formal security model
23Dan Boneh, Brent Waters A fully collusion resistant broadcast, trace, and revoke system. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters Attribute-based encryption for fine-grained access control of encrypted data. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption
23Daniele Micciancio, Saurabh Panjwani Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Adam L. Young, Moti Yung Hiding Information Hiding. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Xavier Boyen, Brent Waters Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Raphael Chung-Wei Phan, Helena Handschuh On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
23Hiroaki Kikuchi Oblivious Counter and Majority Protocol. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Mehmet Emin Dalkiliç, Cengiz Gungor An Interactive Cryptanalysis Algorithm for the Vigenere Cipher. Search on Bibsonomy ADVIS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Matt Blaze, Gerrit Bleumer, Martin Strauss 0001 Divertible Protocols and Atomic Proxy Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Eli Biham, Adi Shamir Differential Fault Analysis of Secret Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
23Don Coppersmith, Matthew K. Franklin, Jacques Patarin, Michael K. Reiter Low-Exponent RSA with Related Messages. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
23Lars R. Knudsen A Key-schedule Weakness in SAFER K-64. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
23Mitsuru Matsui The First Experimental Cryptanalysis of the Data Encryption Standard. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
23Hiroshi Miyano A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
23Jan-Hendrik Evertse Linear Structures in Blockciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
23Yvo Desmedt, Andrew M. Odlyzko A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
20Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi (Inner-Product) Functional Encryption with Updatable Ciphertexts. Search on Bibsonomy J. Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20David Heath, Vladimir Kolesnikov, Lucien K. L. Ng Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
20Enrico Bottazzi Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
20David Heath, Vladimir Kolesnikov, Lucien K. L. Ng Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts. Search on Bibsonomy EUROCRYPT (5) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Xin Wang, Xiaojun Zhang, Xinpeng Zhang, Yinbin Miao, Jingting Xue Enabling Anonymous Authorized Auditing Over Keyword-Based Searchable Ciphertexts in Cloud Storage Systems. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Vivian Maloney, Richard F. Obrecht, Vikram Saraph, Prathibha Rama, Kate Tallaksen High-Resolution Convolutional Neural Networks on Homomorphically Encrypted Data via Sharding Ciphertexts. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Rasoul Akhavan Mahdavi, Abdulrahman Diaa, Florian Kerschbaum HE is all you need: Compressing FHE Ciphertexts using Additive HE. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Na Li Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Chen Qian 0001, Yao Jiang Galteland, Gareth T. Davies Extending Updatable Encryption: Public Key, Tighter Security and Signed Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Junqing Gong 0001, Ji Luo 0002, Hoeteck Wee Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, Damien Stehlé HERMES: Efficient Ring Packing using MLWE Ciphertexts and Application to Transciphering. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Yoshinori Aono, Junji Shikata Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Adam Caulfield, Nabiha Raza, Peizhao Hu X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Keita Emura, Kaisei Kajita, Go Ohtake Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Jörgen Dinnissen, Hugo Araújo A "Mirror for All Traitors". Captured Ciphertexts from a Portuguese Spy in Dutch Brazil (1646). Search on Bibsonomy HistoCrypt The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Junqing Gong 0001, Ji Luo 0002, Hoeteck Wee Traitor Tracing with N1/3-Size Ciphertexts and O(1)-Size Keys from k-Lin. Search on Bibsonomy EUROCRYPT (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ruize Wang, Elena Dubrova A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts. Search on Bibsonomy C2SI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Zhichao Li, Zhexi Lu, Lingshuai Wang, Qiang Wang, Che Bian FDRShare: A Fully Decentralized and Redactable EHRs Sharing Scheme with Constant-Size Ciphertexts. Search on Bibsonomy ICA3PP (7) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Yoshinori Aono, Junji Shikata Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE. Search on Bibsonomy CANS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, Damien Stehlé HERMES: Efficient Ring Packing Using MLWE Ciphertexts and Application to Transciphering. Search on Bibsonomy CRYPTO (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Elonka Dunin, Magnus Ekhall, Konstantin Hamidullin, Nils Kopal, George Lasry, Klaus Schmeh How we set new world records in breaking Playfair ciphertexts. Search on Bibsonomy Cryptologia The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Jianchang Lai, Fuchun Guo, Willy Susilo, Peng Jiang, Guomin Yang, Xinyi Huang 0001 Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Search on Bibsonomy Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Zhuang Xu, Owen Pemberton, Sujoy Sinha Roy, David F. Oswald, Wang Yao, Zhiming Zheng 0001 Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Bhuvnesh Chaturvedi, Anirban Chakraborty 0003, Ayantika Chatterjee, Debdeep Mukhopadhyay Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Qiqi Lai, Feng-Hao Liu, Zhedong Wang New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi (Inner-Product) Functional Encryption with Updatable Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Vanesa Daza, Paz Morillo, Sergi Rovira Leveled Multikey FHE with constant-size ciphertexts from RLWE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Antoine Urban, Matthieu Rambaud Share & Shrink: Ad-Hoc Threshold FHE with Short Ciphertexts and its Application to Almost-Asynchronous MPC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Jörgen Dinnissen, Hugo Araújo Prey to a Privateer. Two Portuguese Ciphertexts from 1649. Search on Bibsonomy HistoCrypt The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Jae-Won Huh, Dong-Guk Han Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Jelle Vos, Daniël Vos, Zekeriya Erkin Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts. Search on Bibsonomy ESORICS (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang Equality Test of Ciphertexts in Certificateless Public Key Systems with an Outsourced Revocation Authority. Search on Bibsonomy GCCE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Sixu Guo, Shen He, Li Su, Xinyue Zhang, Huizheng Geng, Yang Sun A data corruption detection scheme based on ciphertexts in cloud environment. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Bingbing Jiang Two-Party Secure Computation for Any Polynomial Function on Ciphertexts under Different Secret Keys. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 438 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license