|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3467 occurrences of 1071 keywords
|
|
|
Results
Found 10508 publication records. Showing 10508 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
105 | Olivier Billet, Henri Gilbert |
A Traceable Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 331-346, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance |
92 | Man Y. Rhee |
Research Activities on Cryptology in Korea. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings, pp. 179-193, 1991, Springer, 3-540-57332-1. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
69 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 540-563, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
69 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 216-231, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
67 | Xiaomin Wang, Jiashu Zhang, Wenfang Zhang |
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 270-285, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Nonlinear digital filter, Chaos, Cryptology, Keystream |
61 | Selim G. Akl, Henk Meijer |
A Fast Pseudo Random Permutation Generator With Applications to Cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pp. 269-275, 1984, Springer, 3-540-15658-5. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
59 | Phong Q. Nguyen |
The Two Faces of Lattices in Cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 313, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
59 | Phong Q. Nguyen, Jacques Stern |
The Two Faces of Lattices in Cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CaLC ![In: Cryptography and Lattices, International Conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001, Revised Papers, pp. 146-180, 2001, Springer, 3-540-42488-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
59 | Michael Portz |
On the Use of Interconnection Networks in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 302-315, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
53 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 212-226, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox |
53 | Friedrich L. Bauer |
Cryptology - Methods and Maxims. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982, pp. 31-48, 1982, Springer. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
cipher systems, computational complexity.Computing Reviews Classification: D.3, cryptography, cryptanalysis, encryption, Cryptology |
49 | Ross J. Anderson |
Cryptology: Where Is the New Frontier? ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings, pp. 160, 2011, Springer, 978-3-642-25577-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
49 | Karl Rubin, Alice Silverberg |
Supersingular Abelian Varieties in Cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 336-353, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Cees J. A. Jansen, Dick E. Boekee |
On the Significance of the Directed Acyclic Word Graph in Cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUSCRYPT ![In: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings, pp. 318-326, 1990, Springer, 3-540-53000-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
48 | Andrew Chmora, Stephen B. Wicker (eds.) |
Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![Springer, 3-540-58265-7 The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
48 | Mohssen Alabbadi, Stephen B. Wicker |
Susceptibility of Digital Signature Schemes Based on Error-Correcting Codes to Universal Forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 6-12, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | I. L. Asnis, Sergei V. Fedorenko, E. A. Krouk, E. T. Mironchikov |
Tables of Coverings for Decoding by S-Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 97-102, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Vladimir Sidorenko |
Periodicity of One-Dimensional Tilings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 103-108, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | G. R. Blakley, Gregory Kabatianskii |
Linear Algebra Approach to Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 33-40, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Irina E. Bocharova, Boris D. Kudryashov |
Fast Infinite Response Filtering for Speech Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 109-114, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Miodrag J. Mihaljevic |
On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 13-24, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Uwe Dettmar, Ulrich K. Sorger, Victor V. Zyablov |
Concatenated Codes with Convolutional Inner and Outer Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 80-87, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Ernst M. Gabidulin, Vitaly V. Zanin |
Codes that Correct Two-Dimensional Burst Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 53-62, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Felix A. Taubin |
Reduced-State Decoding for Trellis Coded Modulation on Nonlinear Intersymbol Interference Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 88-96, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Ernst M. Gabidulin, Olaf Kjelsen |
How to Avoid the Sidel'nikov-Shestakov Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 25-32, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Irina E. Bocharova, Victor D. Kolesnik, Victor Yu. Krachkovsky, Boris D. Kudryashov, Eugeny P. Ovsjannikov, Boris K. Troyanovsky |
On Trellis Codes for Linear Predictive Speech Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 115-121, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Tor Helleseth, Torleiv Kløve, Øyvind Ytrehus |
Generalizations of the Griesmer Bound. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 41-52, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Victor V. Zyablov, Alexei E. Ashikhmin |
Partial Unit Memory Codes on the Base of Subcodes of Hadamard Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 69-73, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Victor V. Zyablov, Vladimir Sidorenko |
On Periodic (Partial) Unit Memory Codes with Maximum Free Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 74-79, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | V. A. Artamonov, A. A. Klyachko, V. M. Sidelnikov, V. V. Yashchenko |
Algebraic Aspects of Key Generation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 1-5, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
48 | I. M. Boyarinov |
Self-Checking Decoding Algorithm for Reed-Solomon Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Error Control, Cryptology, and Speech Compression ![In: Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers, pp. 63-68, 1993, Springer, 3-540-58265-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
47 | Mahabir Prasad Jhanwar, Rana Barua |
Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 233-247, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RSA Group, Free Group, Quadratic Residues |
47 | Shahram Khazaei, Willi Meier |
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 15-26, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Self-synchronizing Stream Ciphers, T-functions, Key Recovery |
47 | Souradyuti Paul, Bart Preneel |
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 69-83, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 194-209, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Claus Diem |
The XL-Algorithm and a Conjecture from Commutative Algebra. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 323-337, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Salil P. Vadhan |
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 61-77, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Shujun Li, Xuanqin Mou, Yuanlong Cai |
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 316-329, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
47 | John O. Pliam |
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 67-79, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
47 | Martín Abadi |
Taming the Adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 353-358, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
47 | Gilles Brassard |
Quantum Information Processing: The Good, the Bad and the Ugly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 337-341, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
47 | Jürgen Bierbrauer, K. Gopalakrishnan 0001, Douglas R. Stinson |
Bounds for Resilient Functions and Orthogonal Arrays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, pp. 247-256, 1994, Springer, 3-540-58333-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
47 | Ernest F. Brickell |
A Survey of Hardware Implementation of RSA (Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 368-370, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
47 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 624-627, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
47 | Wyn L. Price |
Progress in Data Security Standardization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 620-623, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
45 | Arto Salomaa |
Caesar and DNA. Views on Cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCT ![In: Fundamentals of Computation Theory, 12th International Symposium, FCT '99, Iasi, Romania, August 30 - September 3, 1999, Proceedings, pp. 39-53, 1999, Springer, 3-540-66412-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
45 | Ernst S. Selmer |
From the Memoirs of a Norwegian Cryptologist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 142-150, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
45 | James L. Massey |
In Memoriam Tore Herlestam (1929 - 1986). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 3-4, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
44 | Jean-Charles Faugère, Ludovic Perret |
High order derivatives and decomposition of multivariate polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Symbolic and Algebraic Computation, International Symposium, ISSAC 2009, Seoul, Republic of Korea, July 29-31, 2009, Proceedings, pp. 207-214, 2009, ACM, 978-1-60558-609-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
gröbner basis, multivariate cryptology, public key cryptography, cryptology, algebraic cryptanalysis, f5 algorithm |
43 | Junfeng Fan, Lejla Batina, Ingrid Verbauwhede |
Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009, pp. 1-6, 2009, IEEE, 978-1-4244-5648-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Bart Preneel |
The Future of Cryptographic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 1-2, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Jean-Charles Faugère |
Interactions between computer algebra (Gröbner bases) and cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Symbolic and Algebraic Computation, International Symposium, ISSAC 2009, Seoul, Republic of Korea, July 29-31, 2009, Proceedings, pp. 383-384, 2009, ACM, 978-1-60558-609-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
gröbner basis, public key, cryptology, algebraic cryptanalysis, multivariate cryptography, f5 algorithm |
38 | Marie-Jeanne Toussaint |
Separating the Specification and Implementation Phases in Cryptology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 77-102, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
knowledge state, protocol execution tree, security, formal verification, cryptographic protocol, cryptology |
36 | Changxiang Shen, Huanguo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang |
Survey of information security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 273-298, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
network security, information security, information hiding, trusted computing, cryptology |
36 | Jesús Adolfo García-Pasquel, José Galaviz |
Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(3), pp. 4, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
classical cryptography, Cryptology |
36 | Wontae Hwang, Dongseung Kim |
Load Balanced Block Lanczos Algorithm over GF(2) for Factorization of Large Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2006, 13th International Conference, Bangalore, India, December 18-21, 2006, Proceedings, pp. 375-386, 2006, Springer, 3-540-68039-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
parallel/cluster computing, RSA key, load balancing, sparse matrix, cryptology |
36 | Jiqiang Lu |
Security Weaknesses in Two Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 466-475, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Public key cryptology, Proxy signature, Forgery attack |
33 | Hwajeong Seo, Suhri Kim (eds.) |
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC (1) ![Springer, 978-981-97-1234-2 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Hwajeong Seo, Suhri Kim (eds.) |
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC (2) ![Springer, 978-981-97-1237-3 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro (eds.) |
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT (1) ![Springer, 978-3-031-56231-0 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro (eds.) |
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT (2) ![Springer, 978-3-031-56234-1 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![Springer, 978-981-99-8729-0 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![Springer, 978-981-99-8735-1 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VII ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (7) ![Springer, 978-981-99-8738-2 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![Springer, 978-981-99-8720-7 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (3) ![Springer, 978-981-99-8726-9 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (5) ![Springer, 978-981-99-8732-0 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (2) ![Springer, 978-981-99-8723-8 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (8) ![Springer, 978-981-99-8741-2 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Abdelrahaman Aly, Mehdi Tibouchi (eds.) |
Progress in Cryptology - LATINCRYPT 2023 - 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATINCRYPT ![Springer, 978-3-031-44468-5 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Nadia El Mrabet, Luca De Feo, Sylvain Duquesne (eds.) |
Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![Springer, 978-3-031-37678-8 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (4) ![Springer, 978-3-031-38550-6 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![Springer, 978-3-031-38556-8 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![Springer, 978-3-031-38547-6 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part V ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (5) ![Springer, 978-3-031-38553-7 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![Springer, 978-3-031-38544-5 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Vasily Mikhalev, Nils Kopal, Bernhard Esslinger, Michelle Waldispühl, Benedek Láng, Beáta Megyesi |
What is the Code for the Code? Historical Cryptology Terminology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HistoCrypt ![In: Proceedings of the 6th International Conference on Historical Cryptology, HistoCrypt 2023, Munich, Germany, June 20-22, 2023, pp. 130-138, 2023, Linköping University Electronic Press, 978-91-8075-134-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Eunice Kim, Christian Millichap |
Deciphering Secrets Throughout History: An Interdisciplinary Linguistics and Cryptology Course. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HistoCrypt ![In: Proceedings of the 6th International Conference on Historical Cryptology, HistoCrypt 2023, Munich, Germany, June 20-22, 2023, pp. 83-92, 2023, Linköping University Electronic Press, 978-91-8075-134-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Qian Guo 0001, Denis Nabokov, Alexander Nilsson, Thomas Johansson 0001 |
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 203-236, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Andre Esser 0001, Rahul Girme, Arindam Mukherjee 0003, Santanu Sarkar 0001 |
Memory-Efficient Attacks on Small LWE Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 72-105, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont |
Quantitative Fault Injection Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 302-336, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Alain Couvreur, Rocco Mora, Jean-Pierre Tillich |
A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 3-38, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jonas Meers, Julian Nowakowski |
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 39-71, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Alexander May 0001, Julian Nowakowski |
Too Many Hints - When LLL Breaks LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 106-137, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody |
On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 339-368, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Haodong Jiang, Zhi Ma 0001, Zhenfeng Zhang |
Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 434-468, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Dominique Unruh |
Towards Compressed Permutation Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 369-400, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jiaxin Pan, Benedikt Wagner, Runzhi Zeng |
Tighter Security for Generic Authenticated Key Exchange in the QROM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 401-433, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Maxime Plançon |
Exploiting Algebraic Structures in Probing Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 237-267, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Felix Dörre, Jeremias Mechler, Jörn Müller-Quade |
Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 268-301, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Kaijie Jiang, Anyu Wang 0001, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang |
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 167-200, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner |
We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV, pp. 138-166, 2023, Springer, 978-981-99-8729-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No |
Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI, pp. 36-68, 2023, Springer, 978-981-99-8735-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Yi Wang 0055, Rongmao Chen, Xinyi Huang 0001, Moti Yung |
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI, pp. 135-167, 2023, Springer, 978-981-99-8735-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp 0001 |
The Pre-Shared Key Modes of HPKE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI, pp. 329-360, 2023, Springer, 978-981-99-8735-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Srinivasan Raghuraman, Yibin Yang 0001 |
Just How Fair is an Unreactive World? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI, pp. 420-450, 2023, Springer, 978-981-99-8735-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Brice Minaud, Michael Reichle |
Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI, pp. 263-294, 2023, Springer, 978-981-99-8735-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Long Chen 0018, Hui Guo, Ya-Nan Li, Qiang Tang 0005 |
Efficient Secure Storage with Version Control and Key Rotation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI, pp. 168-198, 2023, Springer, 978-981-99-8735-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Antonio Guimarães, Hilder V. L. Pereira, Barry Van Leeuwen |
Amortized Bootstrapping Revisited: Simpler, Asymptotically-Faster, Implemented. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI, pp. 3-35, 2023, Springer, 978-981-99-8735-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Hiroki Okada 0001, Rachel Player, Simon Pohmann |
Homomorphic Polynomial Evaluation Using Galois Structure and Applications to BFV Bootstrapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (6) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI, pp. 69-100, 2023, Springer, 978-981-99-8735-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 10508 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|