The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptographic with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1978 (15) 1979-1981 (24) 1982-1983 (21) 1984 (57) 1985 (53) 1986 (16) 1987 (77) 1988 (54) 1989 (99) 1990 (88) 1991 (86) 1992 (116) 1993 (89) 1994 (90) 1995 (69) 1996 (100) 1997 (101) 1998 (141) 1999 (180) 2000 (212) 2001 (268) 2002 (291) 2003 (399) 2004 (497) 2005 (595) 2006 (654) 2007 (672) 2008 (677) 2009 (564) 2010 (303) 2011 (286) 2012 (259) 2013 (242) 2014 (303) 2015 (302) 2016 (340) 2017 (349) 2018 (357) 2019 (374) 2020 (356) 2021 (360) 2022 (389) 2023 (431) 2024 (157)
Publication types (Num. hits)
article(2702) book(15) data(2) incollection(108) inproceedings(7874) phdthesis(323) proceedings(89)
Venues (Conferences, Journals, ...)
EUROCRYPT(1195) CHES(627) IACR Cryptol. ePrint Arch.(446) CoRR(291) EUROCRYPT (1)(260) CRYPTO(253) EUROCRYPT (2)(248) EUROCRYPT (3)(188) CCS(120) RFC(99) ASIACRYPT(90) INDOCRYPT(60) TCC(58) J. Cryptol.(57) AUSCRYPT(53) CSFW(53) More (+10 of total 1854)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5995 occurrences of 1820 keywords

Results
Found 11113 publication records. Showing 11113 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
78Kazim Yumbul, Erkay Savas Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, computer architecture, public key cryptography, instruction set extensions, cryptographic algorithms, aes
71Wen-Guey Tzeng A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptographic key assignment, secure broadcasting, cryptographic key backup, access control
61Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability
61Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Xianxian Li, Jinpeng Huai Cryptographic protocol security analysis based on bounded constructing algorithm. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic protocol, formal analysis, security verification
50Joan Daemen, René Govaerts, Joos Vandewalle A Hardware Design Model for Cryptographic Algorithms. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions
47Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Symmetric Authentication within a Simulatable Cryptographic Library. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
45David Nowak On Formal Verification of Arithmetic-Based Cryptographic Primitives. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF machine formalization, CSPRBG, semantic security, cryptographic primitives
44Sandro Bartolini, Roberto Giorgi, Enrico Martinelli Instruction Set Extensions for Cryptographic Applications. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Çetin Kaya Koç About Cryptographic Engineering. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Werner Schindler Random Number Generators for Cryptographic Applications. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Jorge Guajardo, Bart Preneel, Pim Tuyls, Ahmad-Reza Sadeghi 09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
44Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls 09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
44Praveen Gauravaram, William Millan, Lauren May CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
43Claus-Peter Schnorr, Serge Vaudenay The Black-Box Model for Cryptographic Primitives. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Generic attacks, Generic attacks, Key words, Cryptographic primitives, Cryptographic primitives
42Jonathan Katz, Steven A. Myers, Rafail Ostrovsky Cryptographic Counters and Applications to Electronic Voting. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Donald Beaver, Stuart Haber Cryptographic Protocols Provably Secure Against Dynamic Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
42Gordon B. Agnew Random Sources for Cryptographic Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
42Michael Backes 0001, Birgit Pfitzmann On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Alfonso De Gregorio Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Dominic Duggan Cryptographic Types. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Justifying a Dolev-Yao Model Under Active Attacks. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Yevgeniy Dodis, Joel Spencer On the (non)Universality of the One-Time Pad. Search on Bibsonomy FOCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40David Sinclair, David Gray, Geoff W. Hamilton Synthesising Attacks on Cryptographic Protocols. Search on Bibsonomy ATVA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, model checking, cryptographic protocols
38Sherman S. M. Chow Verifiable Pairing and Its Applications. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security
38Andrew J. Clark Physical Protection of Cryptographic Devices. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
38Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee Satisfiability-based framework for enabling side-channel attacks on cryptographic software. Search on Bibsonomy DATE Designers' Forum The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38John Patrick McGregor, Ruby B. Lee Protecting cryptographic keys and computations via virtual secure coprocessing. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Mabroka Ali Mayouf, Zarina Shukur Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. Search on Bibsonomy IVIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF possible attacks, animation, active learning, cryptographic protocols, visual metaphor
36Jay A. McCarthy, Shriram Krishnamurthi Minimal backups of cryptographic protocol runs. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cppl, cryptographic protocols, coq, strand spaces
36Shouhuai Xu, Ravi S. Sandhu A Scalable and Secure Cryptographic Service. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptographic service, compromise detection, compromise confinement, security, scalability, availability
36Jacopo Giorgetti, Giuseppe Scotti, Andrea Simonetti, Alessandro Trifiletti Analysis of data dependence of leakage current in CMOS cryptographic hardware. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF leakage power consumption, side channel analysis, cryptographic hardware
36Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda Cryptographic Protocol to Establish Trusted History of Interactions. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust management framework, cryptographic protocol, Identity based encryption
36Manuel Barbosa, Pooya Farshim Secure Cryptographic Workflow in the Standard Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption
36Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. Search on Bibsonomy PPDP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resolution strategies, verification, cryptographic protocols, horn clauses
36Alaaeddine Fellah, John Mullins Admissible Interference by Typing for Cryptographic Protocols. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Admissible interference, Type systems, Process Algebra, Cryptographic Protocols, Security Properties
36Phillip Rogaway, Thomas Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance
36Jean Goubault-Larrecq, Slawomir Lasota 0001, David Nowak, Yu Zhang Complete Lax Logical Relations for Cryptographic Lambda-Calculi. Search on Bibsonomy CSL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cryptographic lambda-calculus, Subscone, Monads, Logical relations
36Marcin Gomulkiewicz, Miroslaw Kutylowski Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware
36Karl Brincat, Chris J. Mitchell Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptographic API, cryptanalysis, Message Authentication Code
36Ahmad-Reza Sadeghi, Michael Steiner 0001 Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptographic Assumptions, Square Exponent, Inverse Exponent, Discrete Logarithms, Complexity Theory, Diffie-Hellman, Generic Algorithms
36Hideki Imai, Atsuhiro Yamagishi CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptographic technology, asymmmetric ciphers, evaluation, symmetric ciphers
36T. H. Tse, Zhiquan Zhou, Tsong Yueh Chen Testing of Large Number Multiplication Functions in Cryptographic Systems. Search on Bibsonomy APAQS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptographic systems, large number multiplication, software testing
36Roberto M. Amadio, Sanjiva Prasad The Game of the Name in Cryptographic Tables. Search on Bibsonomy ASIAN The full citation details ... 1999 DBLP  DOI  BibTeX  RDF $pi$-calculus, verification, cryptographic protocols
36Jaeheung Lee, Junyoung Heo, Jaemin Park, Yookun Cho, Jiman Hong, Minkyu Park Buffer Cache Level Encryption for Embedded Secure Operating System. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Linux, Buffer Cache, Embedded Operating System, Cryptographic File System
36Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside Cryptography as an operating system service: A case study. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, digital signatures, Encryption, hash functions, cryptographic protocols
35Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls (eds.) Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009 Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
35Subhamoy Maitra On the Studies Related to Linear Codes in Generalized Construction of Resilient Functions with Very High Nonlinearity. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Svetla Nikova, Ventzislav Nikov Secret Sharing and Error Correcting. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Rafael Álvarez, Gary McGuire S-Boxes, APN Functions and Related Codes. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Peter Beelen, Gregor Leander Reconstruction of Highly Non Linear Sboxes from Linear Codes. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Miodrag J. Mihaljevic A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Tor Helleseth, Michal Hojsík, Sondre Rønjom Algebraic Attacks on Filter and Combiner Generators. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Oleg A. Logachev, Alexei A. Salnikov, Stanislav V. Smyshlyaev, Valery V. Yashchenko Symbolic Dynamics, Codes, and Perfectly Balanced Functions. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Cees J. A. Jansen Linearities in Cascade Jump Controlled Stream Ciphers. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Agnes Andics Algebraic Immunity of Boolean Power Functions with Kasami and Niho Exponents. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Stefka Bouyuklieva Self-Dual Codes with Some Applications to Cryptography. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Panagiotis Rizomiliotis New Results on the Algebraic Immunity of Boolean Functions. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Sebastiaan Indesteege, Bart Preneel Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Svetlana Topalova, Stela Zhelezova Classification of Doubly Resolvable Designs and Orthogonal Resolutions. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Stefan M. Dodunekov Applications of Near MDS Codes in Cryptography. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Tor E. Bjørstad, Matthew Geoffrey Parker Equivalence Between Certain Complementary Pairs of Types I and III. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Marco Baldi LDPC Codes in the McEliece Cryptosystem: Attacks and Countermeasures. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Claude Carlet On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Joan Daemen, Vincent Rijmen Codes and Provable Security of Ciphers - Extended abstract. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Yuliang Zheng 0001 Coded Modulation and the Arrival of Signcryption. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Yves Edel, Alexander Pott On the Equivalence of Nonlinear Functions. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Gohar M. Kyureghyan, Yin Tan On a Family of Planar Mappings. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Tsonka Baicheva Linear Codes of Good Error Control Performance. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Yuri L. Borissov, Nikolai L. Manev Some Comments on Bossert-Mahr-Heilig Scheme. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Henk van Tilborg Authentication Codes from Error-Correcting Codes; An Overview. Search on Bibsonomy Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Pankaj Rohatgi Improved Techniques for Side-Channel Analysis. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Werner Schindler Evaluation Criteria for Physical Random Number Generators. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Serdar Süer Erdem, Tugrul Yanik, Çetin Kaya Koç Fast Finite Field Multiplication. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35François-Xavier Standaert Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Marc Joye Basics of Side-Channel Analysis. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Colin D. Walter Randomized Exponentiation Algorithms. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Pankaj Rohatgi Electromagnetic Attacks and Countermeasures. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Onur Aciiçmez, Çetin Kaya Koç Microarchitectural Attacks and Countermeasures. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Erkay Savas, Çetin Kaya Koç Efficient Unified Arithmetic for Hardware Cryptography. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Debrup Chakraborty, Francisco Rodríguez-Henríquez Block Cipher Modes of Operation from a Hardware Implementation Perspective. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Colin D. Walter Leakage from Montgomery Multiplication. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Berk Sunar True Random Number Generators for Cryptography. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Kris Gaj, Pawel Chodowiec FPGA and ASIC Implementations of AES. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Nigel Boston, Matthew Darnall Elliptic and Hyperelliptic Curve Cryptography. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Gökay Saldamli, Çetin Kaya Koç Spectral Modular Arithmetic for Cryptography. Search on Bibsonomy Cryptographic Engineering The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Darko Kirovski Anti-Counterfeiting: Mixing the Physical and the Digital World. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
35Boris Skoric, Marc X. Makkes Simplification of Controlled PUF primitives. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
35Philippe Teuwen How to Make Smartcards Resistant to Hackers' Lightsabers? Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
35Patrick Schaumont Engineering On-Chip Thermal Effects. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
35Boris Skoric, Pim Tuyls An efficient fuzzy extractor for limited noise. Search on Bibsonomy Foundations for Forgery-Resilient Cryptographic Hardware The full citation details ... 2009 DBLP  BibTeX  RDF
35Ed Dawson, Wolfgang Klemm (eds.) Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
35Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock Improvements to the RAK Factoring Algorithm. Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
35Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
35Hossein Ghodosi, Josef Pieprzyk A Modification to the 'Authentication of Concast Communication'. Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
35Mike Bond, Jolyon Clulow Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
35Matthew Henricksen, Ming Yao, Ernest Foo An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
35Jaimee Brown, Ed Dawson, Juan Manuel González Nieto Implementation of the GBD Cryptosystem. Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
35Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew J. Clark A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
35Lan Nguyen, Reihaneh Safavi-Naini An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. Search on Bibsonomy Cryptographic Algorithms and their Uses The full citation details ... 2004 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 11113 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license