The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptosystems with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1978-1982 (15) 1983-1984 (21) 1985 (15) 1986-1988 (24) 1989 (23) 1990 (19) 1991 (17) 1992-1993 (26) 1994-1995 (23) 1996 (20) 1997 (26) 1998 (49) 1999 (47) 2000 (36) 2001 (62) 2002 (96) 2003 (104) 2004 (117) 2005 (125) 2006 (129) 2007 (97) 2008 (135) 2009 (81) 2010 (45) 2011 (49) 2012 (40) 2013 (54) 2014 (34) 2015 (35) 2016 (39) 2017 (41) 2018 (41) 2019 (36) 2020 (43) 2021 (56) 2022 (45) 2023 (56) 2024 (10)
Publication types (Num. hits)
article(673) book(5) incollection(15) inproceedings(1198) phdthesis(39) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1395 occurrences of 488 keywords

Results
Found 1931 publication records. Showing 1931 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
106T. R. N. Rao, Kil-Hyun Nam Private-Key Algebraic-Coded Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF private-key cryptosystems, Algebraic codes, crypto-complexity, Joint Encryption and Error-control Coding, public-key cryptosystems, cryptosystems, chosen-plaintext attack
62Yasuyuki Sakai, Kouichi Sakurai A New Attack with Side Channel Leakage During Exponent Recoding Computations. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF exponent recoding, Side channel attack, elliptic curve cryptosystems, RSA cryptosystems
62Amr M. Youssef, Guang Gong Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Imai and Matsumoto asymmetric cryptosystems, cryptanalysis, Public-key cryptosystems
61Moti Yung How to Guard the Guards Themselves. Search on Bibsonomy FCT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key Evolving Cryptosystems, Proactive Cryptosystems, Public Key cryptography, Attacks, Leakage, Countermeasures, Physical Security, Threshold cryptosystems, Cryptographic Keys
60Fanyu Kong, Jia Yu 0003, Zhun Cai, Daxing Li New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic curve cryptosystems, pairing-based cryptosystems, point multiplication, signed-digit number representations
56Albert Levi, Erkay Savas Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
54Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka Secure Hyperelliptic Cryptosystems and Their Performances. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
54Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
54G. R. Blakley Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
53Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security
53Toru Akishita, Masanobu Katagi, Izuru Kitamura SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF theta divisor, signed binary representation, scalar multiplication, simple power analysis, hyperelliptic curve cryptosystems
53Fangguo Zhang, Shengli Liu 0001, Kwangjo Kim Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Hyperelliptic curve cryptosystems(HCC), Domain parameters, Jacobian
53Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
47Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano Characterization of Elliptic Curve Traces under FR-Reduction. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF FR-reduction, trace, elliptic curve cryptosystems, number theory
46Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability
46Thomas Plantard, Willy Susilo Broadcast Attacks against Lattice-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Broadcast attack, lattice-based cryptosystem, knapsack cryptosystem, intersecting lattice
46Tim Güneysu, Christof Paar, Jan Pelzl Attacking elliptic curve cryptosystems with special-purpose hardware. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm
46Peter Ackermann, Martin Kreuzer Gröbner Basis Cryptosystems. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (1991) Primary 94A60, Secondary 11T71, 16-08, 13P10
46Yitao Duan, John F. Canny How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
46Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim How to Implement Cost-Effective and Secure Public Key Cryptosystems. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Secure module in terminal, digital signature/identification, smart cards, public-key cryptosystem, precomputation
46Yasuyuki Sakai, Kouichi Sakurai Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
46Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
46Kouichi Sakurai, Hiroki Shizuya Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
45Changan Zhao, Dongqing Xie, Fangguo Zhang, Chong-zhi Gao, Jingwei Zhang Improved Implementations of Cryptosystems Based on Tate Pairing. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elliptic curves, efficient algorithms, Tate pairing, Identity-based cryptosystems
45Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar 0001 Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic and hyperelliptic curve cryptosystems, divisor addition, divisor doubling, memory, scalar multiplication, explicit formula
45Kristian Gjøsteen Homomorphic Cryptosystems Based on Subgroup Membership Problems. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF homomorphic cryptosystems, subgroup membership problem, public key encryption
45Toru Akishita, Tsuyoshi Takagi On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny
45Pradeep Kumar Mishra Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Jacobian coordinates, pipelining, Elliptic curve cryptosystems, scalar multiplication
45Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems
45Susan K. Langford Weakness in Some Threshold Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems
40Massimo Caboara, Fabrizio Caruso, Carlo Traverso Gröbner bases for public key cryptography. Search on Bibsonomy ISSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF gröbner basis, lattice, public key cryptosystem, hermite normal form
40Masaaki Shirase, Yasushi Hibino An architecture for elliptic curve cryptograph computation. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Harald Niederreiter A Public-Key Cryptosystem based on Shift Register Sequences. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
39Wen-Shenq Juang A Simple and Efficient Conference Scheme for Mobile Communications. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys
39Nevine Maurice Ebeid, M. Anwar Hasan On Randomizing Private Keys to Counteract DPA Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF binary signed-digit representation, smart cards, Differential power analysis, elliptic curve cryptosystems, scalar multiplication
38Olivier Billet, Gilles Macario-Rat Cryptanalysis of the Square Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Yasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF knapsack public-key cryptosystem, low-density attack, weight of plaintext, density
38Jintai Ding, John Wagner Cryptanalysis of Rational Multivariate Public Key Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Lang Lin, Wayne P. Burleson Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Akinori Kawachi, Keisuke Tanaka, Keita Xagawa Multi-bit Cryptosystems Based on Lattice Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
38Lei Hu, Jun-Wu Dong, Dingyi Pei Implementation of Cryptosystems Based on Tate Pairing. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF implementation, elliptic curve, Tate pairing, identity-based cryptosystem
38Michael J. Jacobson Jr. The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem
38Wen Ping Ma, Moon Ho Lee Group Oriented Cryptosystems Based on Linear Access Structures. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Group Oriented Cryptosystem, ElGamal Cryptosystem, Vector Space Access Structure, Cryptography, Secret Sharing
38Jean-Charles Faugère, Antoine Joux Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl Asynchronous verifiable secret sharing and proactive cryptosystems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model, secret sharing, asynchronous, proactive
38Jonathan Katz, Moti Yung Threshold Cryptosystems Based on Factoring. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
38Daniele Micciancio Improving Lattice Based Cryptosystems Using the Hermite Normal Form. Search on Bibsonomy CaLC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Lattices, public-key encryption, trapdoor functions
38Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama Quantum Public-Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
38Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Distributed Key Generation, Discrete Logarithm, Threshold Cryptography, VSS
38Kouichi Sakurai, Hiroki Shizuya A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Computational number theory, Computational number theory, Securi, Security, Randomness, Randomness, Public-key cryptography, Public-key cryptography, Elliptic curves, Elliptic curves, Key exchange, Key exchange, Discrete logarithm, Discrete logarithm, Key words, Cryptosystem, Cryptosystem
38Victor Shoup, Rosario Gennaro Securing Threshold Cryptosystems against Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
38Adam L. Young, Moti Yung The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log
38Florent Chabaud On the Security of Some Cryptosystems Based on Error-correcting Codes. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
38Silvio Micali Fair Public-Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
38Rudolf Lidl On Cryptosystems Based on Polynomials and Finite Fields. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
37Guilhem Castagnos, Fabien Laguillaumie On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography
37Noboru Kunihiro New Definition of Density on Knapsack Cryptosystems. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Low-Weight Knapsack Cryptosystems, Lattice Attack, (pseudo-)density, Shannon Entropy
37Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp, Christopher Wolf Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TA-product, UOV, amended TTS, ECC, hardware implementation, cryptosystems, Rainbow
37Pradeep Kumar Mishra Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems (Extended Version). Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EC-operations, comb methods, Jacobian coordinates, sidechannel attacks, sidechannel atomicity, pipelining, ECC, Elliptic Curve Cryptosystems, scalar multiplication, binary methods
37Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, signed binary representations, Public key cryptosystems, algorithm design and analysis
37Tae Hyun Kim 0003, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim 0001, Jongin Lim 0001 Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Randomized projective coordinate systems, Eta pairing, Side channel attacks, Differential Power Analysis, Pairing based cryptosystems
37Hans Eberle, Sheueling Chang Shantz, Vipul Gupta, Nils Gura, Leonard Rarick, Lawrence Spracklen Accelerating Next-Generation Public-Key Cryptosystems on General-Purpose CPUs. Search on Bibsonomy IEEE Micro The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public key cryptosystems, Processor Architectures, Cryptographic controls
37Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key issuing, bilinear pairings, key escrow, secure channel, ID-based cryptosystems
37Fanyu Kong, Daxing Li A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF signed window algorithm, elliptic curve cryptosystems, point multiplication, signed-digit number representations
37Adam L. Young, Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal
37Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi Public-Key Cryptosystems from Lattice Reduction Problems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Lattice Reduction Problems, Public-Key Cryptosystems
32James A. Davis, Laurent Poinsot G-Perfect nonlinear functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 11T71, AMS Classifications 05B10
32Luiza de Macedo Mourelle, Nadia Nedjah Reconfigurable Hardware for Addition Chains Based Modular Exponentiation. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
32Henri Cohen, Atsuko Miyaji, Takatoshi Ono Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
32Phong Q. Nguyen, Jacques Stern Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
32Chae Hoon Lim, Pil Joong Lee Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
31Robert Szerwinski, Tim Güneysu Exploiting the Power of GPUs for Asymmetric Cryptography. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Asymmetric Cryptosystems, Graphics Processing Unit, RSA, ECC, DSA
31Tim Güneysu, Christof Paar Ultra High Performance ECC over NIST Primes on Commercial FPGAs. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA, High-Performance, Elliptic Curve Cryptosystems
31Jaewook Chung, M. Anwar Hasan Low-Weight Polynomial Form Integers for Efficient Modular Multiplication. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mersenne numbers, the Montgomery reduction, the Barrett reduction, Cryptography, RSA, elliptic curve cryptosystems, modular multiplication
31Toru Akishita, Tsuyoshi Takagi Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication
31Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Improving the Randomized Initial Point Countermeasure Against DPA. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP
31Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih Fast Multi-computations with Integer Similarity Strategy. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications
31Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem
31Nele Mentens, Siddika Berna Örs, Bart Preneel An FPGA implementation of an elliptic curve processor GF(2m). Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF montgomery modular, FPGA, elliptic curve cryptosystems, multiplication
31Paulo S. L. M. Barreto, Ben Lynn, Michael Scott On the Selection of Pairing-Friendly Groups. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF group generators, elliptic curves, Tate pairing, pairing-based cryptosystems
31Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC)
31Elisabeth Oswald, Manfred Josef Aigner Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystems, Power Analysis
31Adam L. Young, Moti Yung Finding Length-3 Positive Cunningham Chains. Search on Bibsonomy ANTS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cunningham Chains, Auto-Recoverable and Auto-Certifiable Cryptosystem, ElGamal system, Public-Key Cryptosystems, Primality testing
30Dong-Guk Han, Sung-Kyoung Kim, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF left-to-right, right-to-left, Side channel attacks, elliptic curve cryptosystems, pairing-based cryptosystems
30Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems
30Antoine Joux, Jacques Stern Lattice Reduction: A Toolbox for the Cryptanalyst. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Knapsack cryptosystems, Knapsack cryptosystems, Cryptanalysis, Cryptanalysis, Lattices, Lattices, Key words
30Huafei Zhu, Feng Bao 0001 Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security
30Chris Peikert Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, lattices
30Xiaolei Dong, Zhenfu Cao, Licheng Wang New designing of cryptosystems based on quadratic fields. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quadratic field cryptography, quadratic fields, provable security, public key cryptosystem
30Guilhem Castagnos Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Homomorphic Scheme, Paillier Cryptosystem, Quadratic Fields, IND-CPA and IND-CCA2 security, Standard Model, Generic Construction, Probabilistic Encryption
30Yi Wang 0016, Douglas L. Maskell, Jussipekka Leiwo, Thambipillai Srikanthan Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Patrick Felke On the Affine Transformations of HFE-Cryptosystems and Systems with Branches. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF nonassociative algebra, mixed centralizer, finite fields, affine transformations, branches, HFE
30Yuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai Similar Keys of Multivariate Quadratic Public Key Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MQ, similar key, digital signature, public key cryptosystem, multivariate
30Salil P. Vadhan Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Everlasting security, Space-bounded adversaries, Averaging samplers, Expander graphs, Extractors, Unconditional security, Bounded-storage model
30Sashisu Bajracharya, Chang Shu 0003, Kris Gaj, Tarek A. El-Ghazawi Implementation of Elliptic Curve Cryptosystems over GF(2n) in Optimal Normal Basis on a Reconfigurable Computer. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1931 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license