|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 180 occurrences of 148 keywords
|
|
|
Results
Found 385 publication records. Showing 385 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
46 | Lingling Wang, Guoyin Zhang, Chunguang Ma |
ID-based deniable ring authentication with constant-size signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. China ![In: Frontiers Comput. Sci. China 2(1), pp. 106-112, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
deniable ring authentication, constant-size signature, privacy, bilinear pairings, ID-based |
32 | Mikkel Thorup |
On AC0 implementations of fusion trees and atomic heaps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, January 12-14, 2003, Baltimore, Maryland, USA., pp. 699-707, 2003, ACM/SIAM, 0-89871-538-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
27 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 364-378, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Anonymity, Revocable, Ring Signature, Linkable |
27 | Frank Thomson Leighton, Bruce M. Maggs |
Fast algorithms for finding O(congestion+dilation) packet routing schedules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (2) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 555-563, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
packet routing schedules, fixed edge-simple paths, constant-size queues, algorithm parallelization, parallel algorithms, computational complexity, multiprocessor interconnection networks, packet switching, congestion, processor scheduling, telecommunication network routing, fast algorithms, dilation, Lovasz local lemma |
25 | Abbas El Gamal, James P. Mammen, Balaji Prabhakar, Devavrat Shah |
Optimal Throughput-Delay Scaling in Wireless Networks - Part II: Constant-Size Packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 52(11), pp. 5111-5116, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki |
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 215-234, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Huaibo Sun, Hong Luo 0001, Yan Sun 0004 |
Progressive Image Restoration Based on CP-ABE With Constant-Size Ciphertext and Constant Bilinear Calculation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 167032-167054, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Cheng Chen, Zhenfeng Zhang, Dengguo Feng |
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 84-101, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Cécile Delerablée |
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 200-215, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Francisco J. Torres-Rojas, Mustaque Ahamad |
Plausible Clocks: Constant Size Logical Clocks for Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 12(4), pp. 179-195, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Causality detection, Distributed algorithms, Logical clocks |
22 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Practical Compact E-Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 431-445, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
constant-size, bilinear pairings, compact, E-Cash |
22 | Wolfgang Maass 0001, Georg Schnitger, Eduardo D. Sontag |
On the Computational Power of Sigmoid versus Boolean Threshold Circuits ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991, pp. 767-776, 1991, IEEE Computer Society, 0-8186-2445-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
polynomially bounded weights, sigmoid threshold gates, smooth threshold gates, depth 2 circuits, Boolean threshold circuits, constant size circuits, Boolean threshold gates, polynomial size sigmoid threshold circuits, Boolean functions, computational power, constant depth circuits |
21 | Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler |
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 961, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Matteo Campanelli, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler |
sfTestudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATINCRYPT ![In: Progress in Cryptology - LATINCRYPT 2023 - 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings, pp. 331-351, 2023, Springer, 978-3-031-44468-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Nasima Begum, Toru Nakanishi 0001, Nobuo Funabiki |
Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCCE ![In: IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013, Tokyo, Japan, 1-4 October 2013, pp. 530-533, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Xavier Boyen, Brent Waters |
Full-Domain Subgroup Hiding and Constant-Size Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 1-15, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Sanjit Chatterjee, Palash Sarkar 0001 |
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 310-327, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Jichiang Tsai 0001 |
An Efficient Index-Based Checkpointing Protocol with Constant-Size Control Information on Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(4), pp. 287-296, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
domino effect, communication-induced checkpointing, index-based protocols, fault tolerance, Distributed systems |
18 | Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup |
Anonymous Identification in Ad Hoc Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 609-626, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Kazuo Iwama, Eiji Miyano |
Multipacket Routing on 2-D Meshes and Its Application to Fault-Tolerant Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA '99, 7th Annual European Symposium, Prague, Czech Republic, July 16-18, 1999, Proceedings, pp. 53-64, 1999, Springer, 3-540-66251-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Venkatesan Guruswami, Piotr Indyk |
Near-optimal linear-time codes for unique decoding and new list-decodable codes over smaller alphabets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings on 34th Annual ACM Symposium on Theory of Computing, May 19-21, 2002, Montréal, Québec, Canada, pp. 812-821, 2002, ACM, 1-58113-495-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Di Ma |
Practical forward secure sequential aggregate signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 341-352, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
forward secure sequential aggregate authentication, quality of forward security, MAC, signature |
15 | Arash Farzan, J. Ian Munro |
Dynamic Succinct Ordered Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (1) ![In: Automata, Languages and Programming, 36th International Colloquium, ICALP 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part I, pp. 439-450, 2009, Springer, 978-3-642-02926-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Helger Lipmaa, Roberto Parisella, Janno Siim |
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 173, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
15 | Helger Lipmaa, Roberto Parisella, Janno Siim |
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (6) ![In: Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VI, pp. 34-64, 2024, Springer, 978-3-031-58750-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Felice Ciccarelli, Miriam Di Ianni, Giancarlo Palumbo |
A note on the satisfactory partition problem: Constant size requirement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 179, pp. 106292, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Virginia Ardévol Martínez, Marco Caoduro, Laurent Feuilloley, Jonathan Narboni, Pegah Pournajafi, Jean-Florent Raymond |
A lower bound for constant-size local certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 971, pp. 114068, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Zhaozhe Kang, Jiguo Li 0001, Jian Shen 0001, Jinguang Han, Yuting Zuo, Yichen Zhang 0003 |
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 35(9), pp. 9514-9530, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Taehyung Kwon, Jihoon Ko, Jinhong Jung, Kijung Shin |
NeuKron: Constant-Size Lossy Compression of Sparse Reorderable Matrices and Tensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.04570, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Dan Boneh, Aditi Partap, Brent Waters |
Accountable Multi-Signatures with Constant Size Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1793, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Chloé Hébant, David Pointcheval |
Traceable constant-size multi-authority credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. ![In: Inf. Comput. 293, pp. 105060, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ziqiang Wen, Xiaomei Dong, Chongyang Yang, Ning Zhang |
Short Repudiable Ring Signature: Constant Size and Less Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Web Information Systems and Applications - 20th International Conference, WISA 2023, Chengdu, China, September 15-17, 2023, Proceedings, pp. 371-382, 2023, Springer, 978-981-99-6221-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Taehyung Kwon, Jihoon Ko, Jinhong Jung, Kijung Shin |
NeuKron: Constant-Size Lossy Compression of Sparse Reorderable Matrices and Tensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023, pp. 71-81, 2023, ACM, 978-1-4503-9416-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Giulia Scaffino, Lukas Aumayr, Zeta Avarikioti, Matteo Maffei |
Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 733-750, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Min Li |
LNPB: A Light Node for Public Blockchain with Constant-Size Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Technology and Applications - 19th International Conference, ICIC 2023, Zhengzhou, China, August 10-13, 2023, Proceedings, Part I, pp. 487-498, 2023, Springer, 978-981-99-4754-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Zhichao Li, Zhexi Lu, Lingshuai Wang, Qiang Wang, Che Bian |
FDRShare: A Fully Decentralized and Redactable EHRs Sharing Scheme with Constant-Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP (7) ![In: Algorithms and Architectures for Parallel Processing - 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part VII, pp. 240-252, 2023, Springer, 978-981-97-0861-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Simin Chen, Jiageng Chen, Atsuko Miyaji, Kaiming Chen |
Constant-Size Group Signatures with Message-Dependent Opening from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings, pp. 166-185, 2023, Springer, 978-3-031-45512-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Emanuele Scala, Leonardo Mostarda |
Range Proofs with Constant Size and Trustless Setup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (3) ![In: Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023, Volume 3, pp. 301-310, 2023, Springer, 978-3-031-28693-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Sigurd Eskeland |
Private set intersection using RSA subgroups with constant-size encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 20th Annual International Conference on Privacy, Security and Trust, PST 2023, Copenhagen, Denmark, August 21-23, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-1387-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jianchang Lai, Fuchun Guo, Willy Susilo, Peng Jiang, Guomin Yang, Xinyi Huang 0001 |
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 613, pp. 966-981, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Xiong Li 0002, Tian Liu, Chaoyang Chen 0001, Qingfeng Cheng, Xiaosong Zhang 0001, Neeraj Kumar 0001 |
A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(19), pp. 19227-19237, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Meryem Soysaldi, Sedat Akleylek |
A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B), pp. 9852-9866, November 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Virginia Ardévol Martínez, Marco Caoduro, Laurent Feuilloley, Jonathan Narboni, Pegah Pournajafi, Jean-Florent Raymond |
Lower bound for constant-size local certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.14229, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Cong Deng, Lin You, Xianghong Tang, Gengran Hu, Shuhong Gao |
Cuproof: Range Proof with Constant Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 24(3), pp. 334, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Hien Chu, Dario Fiore 0001, Dimitris Kolonelos, Dominique Schröder |
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 524, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
15 | Hanjun Li 0001, Huijia Lin, Ji Luo 0002 |
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 659, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
15 | Katarzyna Kapusta, Matthieu Rambaud, Ferdinand Sibleyras |
Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 427, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
15 | Vanesa Daza, Paz Morillo, Sergi Rovira |
Leveled Multikey FHE with constant-size ciphertexts from RLWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 447, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
15 | Shengyuan Feng, Junqing Gong 0001, Jie Chen 0021 |
Binary Tree Encryption with Constant-Size Public Key in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 65(6), pp. 1489-1511, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Virginia Ardévol Martínez, Marco Caoduro, Laurent Feuilloley, Jonathan Narboni, Pegah Pournajafi, Jean-Florent Raymond |
Lower Bound for Constant-Size Local Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems - 24th International Symposium, SSS 2022, Clermont-Ferrand, France, November 15-17, 2022, Proceedings, pp. 239-253, 2022, Springer, 978-3-031-21016-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Hanjun Li 0001, Huijia Lin, Ji Luo 0002 |
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part I, pp. 680-710, 2022, Springer, 978-3-031-22317-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Xuehou Tan, Rong Chen |
Largest Convex Hulls for Constant Size, Convex-Hull Disjoint Clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation - 17th Annual Conference, TAMC 2022, Tianjin, China, September 16-18, 2022, Proceedings, pp. 128-139, 2022, Springer, 978-3-031-20349-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Hien Chu, Dario Fiore 0001, Dimitris Kolonelos, Dominique Schröder |
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 13th International Conference, SCN 2022, Amalfi, Italy, September 12-14, 2022, Proceedings, pp. 639-662, 2022, Springer, 978-3-031-14790-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Chloé Hébant, David Pointcheval |
Traceable Constant-Size Multi-authority Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 13th International Conference, SCN 2022, Amalfi, Italy, September 12-14, 2022, Proceedings, pp. 411-434, 2022, Springer, 978-3-031-14790-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Shravani Mahesh Patil, B. R. Purushothama |
Pixel co-ordinate-based secret image sharing scheme with constant size shadow images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 89, pp. 106937, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | André F. R. Guarda, Nuno M. M. Rodrigues, Fernando Pereira 0001 |
Constant Size Point Cloud Clustering: A Compact, Non-Overlapping Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 23, pp. 77-91, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Zhishuo Zhang, Wei Zhang 0205, Zhiguang Qin |
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 6676862:1-6676862:16, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Yangyang Wu, Changsong Jiang, Chunxiang Xu, Kefei Chen |
Security Analysis of a Path Validation Scheme With Constant-Size Proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 16, pp. 4246-4248, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Cong Deng, Xianghong Tang, Lin You, Gengran Hu |
Cuproof: A Novel Range Proof with Constant Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 127, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Aoran Lu, Weihai Li, Yuanzhi Yao, Nenghai Yu |
TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Sixth IEEE International Conference on Data Science in Cyberspace, DSC 2021, Shenzhen, China, October 9-11, 2021, pp. 106-113, 2021, IEEE, 978-1-6654-1815-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Alonso González, Alexandros Zacharakis |
Fully-Succinct Publicly Verifiable Delegation from Constant-Size Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I, pp. 529-557, 2021, Springer, 978-3-030-90458-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Xiuhua Wang 0001, Sherman S. M. Chow |
Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021, pp. 748-761, 2021, IEEE, 978-1-7281-8935-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Yang Zhao, Ankang Ruan, Guohang Dan, Jicheng Huang, Yi Ding 0003 |
Efficient Multi-Authority Attribute-based Signcryption with Constant-Size Ciphertext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021, pp. 1-8, 2021, IEEE, 978-1-7281-7534-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Mriganka Mandal |
Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 55, pp. 102666, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Soumya Banerjee 0001, Sandip Roy 0001, Vanga Odelu, Ashok Kumar Das, Samiran Chattopadhyay, Joel J. P. C. Rodrigues, Youngho Park 0005 |
Multi-Authority CP-ABE-Based user access control scheme with constant-size key and ciphertext for IoT deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 53, pp. 102503, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse |
Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cloud Appl. Comput. ![In: Int. J. Cloud Appl. Comput. 10(1), pp. 28-45, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jianhong Zhang, Wenle Bai, Zhengtao Jiang |
On the Security of a Practical Constant-Size Ring Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 22(3), pp. 392-396, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Qin Luo, Chun-Yang Jiang |
A New Constant-Size Group Signature Scheme From Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 10198-10207, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Xiangsong Zhang, Zhenhua Liu 0001, Xu An Wang 0001, Fenghe Wang |
Constant-size ring signature scheme using multilinear maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Embed. Syst. ![In: Int. J. Embed. Syst. 12(2), pp. 206-215, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Katsuyuki Takashima |
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1), pp. 74-106, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki |
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1), pp. 141-149, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Ryo Okishima, Toru Nakanishi 0001 |
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12), pp. 1381-1392, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Qutaibah M. Malluhi, Vinh Duc Tran, Viet Cuong Trinh |
Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 12(6), pp. 969, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh |
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(2), pp. 74-86, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao |
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 847, pp. 1-16, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Zhen Zhao 0005, Fuchun Guo, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu |
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 809, pp. 73-87, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jochen Könemann, Kanstantsin Pashkovich, Natig Tofigzade |
On the Approximability of the Stable Matching Problem with Ties of Constant Size up to the Integrality Gap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.05228, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Liqing Chen, Jiguo Li 0001, Yichen Zhang 0003 |
Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 24(6), pp. 4589-4606, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Anxiao He, Kai Bu, Yucong Li, Eikoh Chida, Qianping Gu, Kui Ren 0001 |
Atomos: Constant-Size Path Validation Proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 15, pp. 3832-3847, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Masahito Ishizaka, Shinsaku Kiyomoto |
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 595, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
15 | Enhong Chen, Yan Zhu 0010, Changlu Lin, Kewei Lv |
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. ![In: Frontiers Comput. Sci. 14(4), pp. 144806, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Inácio de Sousa Fadigas, Marcos Grilo Rosa, Trazíbulo Henrique, Hernane Borges de Barros Pereira |
FIFA World Cup referees' networks: a constant-size clique approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soc. Netw. Anal. Min. ![In: Soc. Netw. Anal. Min. 10(1), pp. 54, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Dan Feldman, Melanie Schmidt 0001, Christian Sohler |
Turning Big Data Into Tiny Data: Constant-Size Coresets for k-Means, PCA, and Projective Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Comput. ![In: SIAM J. Comput. 49(3), pp. 601-657, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Wenti Yang, Ruimiao Wang, Zhitao Guan, Longfei Wu, Xiaojiang Du, Mohsen Guizani |
A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: 2020 IEEE International Conference on Communications, ICC 2020, Dublin, Ireland, June 7-11, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-5089-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan |
Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings, pp. 644-665, 2020, Springer, 978-3-030-65276-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Sébastien Canard, Adela Georgescu, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré |
Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings, pp. 24-44, 2020, Springer, 978-3-030-62575-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Olivier Blazy, Laura Brouilhet, Céline Chevalier, Neals Fournaise |
Round-optimal Constant-size Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (2) ![In: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020., pp. 213-224, 2020, ScitePress, 978-989-758-446-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Nishant Raj, Alwyn Roshan Pais |
CP-ABE Scheme Satisfying Constant-size Keys based on ECC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (2) ![In: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020., pp. 535-540, 2020, ScitePress, 978-989-758-446-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin |
CSCAC: one constant-size CPABE access control scheme in trusted execution environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Sci. Eng. ![In: Int. J. Comput. Sci. Eng. 19(2), pp. 162-168, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Xiao Zhang 0004, Faguo Wu, Wang Yao, Zhao Wang, Wenhua Wang |
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 31(21), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Yichen Zhang 0003, Jiguo Li 0001, Hao Yan |
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 47982-47990, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Georg Fuchsbauer, Christian Hanser, Daniel Slamanig |
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 32(2), pp. 498-546, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj |
Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1257, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
15 | Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan |
Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1325, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
15 | Xi Jun Lin, Lin Sun 0005, Haipeng Qu, He-Qun Xian |
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 62(8), pp. 1087-1091, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Ryo Okishima, Toru Nakanishi 0001 |
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings, pp. 89-106, 2019, Springer, 978-3-030-26833-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Divyashikha Sethia, Anadi Shakya, Ritik Aggarwal, Saksham Bhayana |
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2019, New York City, NY, USA, October 10-12, 2019, pp. 951-957, 2019, IEEE, 978-1-7281-3885-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Willy Susilo, Guomin Yang, Fuchun Guo, Qiong Huang 0001 |
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 429, pp. 349-360, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Meng-Jun Qin, Yunlei Zhao, Zhoujun Ma |
Practical Constant-Size Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 33(3), pp. 533-541, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Przemyslaw Sadowski |
Quantum distance-based classifier with constant size memory, distributed knowledge and state recycling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1803.00853, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 385 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|