|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1395 occurrences of 488 keywords
|
|
|
Results
Found 1931 publication records. Showing 1931 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
106 | T. R. N. Rao, Kil-Hyun Nam |
Private-Key Algebraic-Coded Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 35-48, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
private-key cryptosystems, Algebraic codes, crypto-complexity, Joint Encryption and Error-control Coding, public-key cryptosystems, cryptosystems, chosen-plaintext attack |
62 | Yasuyuki Sakai, Kouichi Sakurai |
A New Attack with Side Channel Leakage During Exponent Recoding Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 298-311, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
exponent recoding, Side channel attack, elliptic curve cryptosystems, RSA cryptosystems |
62 | Amr M. Youssef, Guang Gong |
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 214-222, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Imai and Matsumoto asymmetric cryptosystems, cryptanalysis, Public-key cryptosystems |
61 | Moti Yung |
How to Guard the Guards Themselves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCT ![In: Fundamentals of Computation Theory, 17th International Symposium, FCT 2009, Wroclaw, Poland, September 2-4, 2009. Proceedings, pp. 1-2, 2009, Springer, 978-3-642-03408-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Key Evolving Cryptosystems, Proactive Cryptosystems, Public Key cryptography, Attacks, Leakage, Countermeasures, Physical Security, Threshold cryptosystems, Cryptographic Keys |
60 | Fanyu Kong, Jia Yu 0003, Zhun Cai, Daxing Li |
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 189-198, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Elliptic curve cryptosystems, pairing-based cryptosystems, point multiplication, signed-digit number representations |
56 | Albert Levi, Erkay Savas |
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 1245-1250, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka |
Secure Hyperelliptic Cryptosystems and Their Performances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 164-181, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
54 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 9-23, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
54 | G. R. Blakley |
Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pp. 314-338, 1984, Springer, 3-540-15658-5. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
53 | Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta |
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 382-398, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security |
53 | Toru Akishita, Masanobu Katagi, Izuru Kitamura |
SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 148-159, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
theta divisor, signed binary representation, scalar multiplication, simple power analysis, hyperelliptic curve cryptosystems |
53 | Fangguo Zhang, Shengli Liu 0001, Kwangjo Kim |
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 203-213, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Hyperelliptic curve cryptosystems(HCC), Domain parameters, Jacobian |
53 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 351-368, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
47 | Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano |
Characterization of Elliptic Curve Traces under FR-Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings, pp. 90-108, 2000, Springer, 3-540-41782-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
FR-reduction, trace, elliptic curve cryptosystems, number theory |
46 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 352-369, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
46 | Thomas Plantard, Willy Susilo |
Broadcast Attacks against Lattice-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 456-472, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Broadcast attack, lattice-based cryptosystem, knapsack cryptosystem, intersecting lattice |
46 | Tim Güneysu, Christof Paar, Jan Pelzl |
Attacking elliptic curve cryptosystems with special-purpose hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays, FPGA 2007, Monterey, California, USA, February 18-20, 2007, pp. 207-215, 2007, ACM, 978-1-59593-600-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm |
46 | Peter Ackermann, Martin Kreuzer |
Gröbner Basis Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 17(3-4), pp. 173-194, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (1991) Primary 94A60, Secondary 11T71, 16-08, 13P10 |
46 | Yitao Duan, John F. Canny |
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 244-261, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 383-397, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
46 | Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim |
How to Implement Cost-Effective and Secure Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 73-79, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Secure module in terminal, digital signature/identification, smart cards, public-key cryptosystem, precomputation |
46 | Yasuyuki Sakai, Kouichi Sakurai |
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 80-94, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
46 | Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan |
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 283-298, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
46 | Kouichi Sakurai, Hiroki Shizuya |
Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 341-355, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
45 | Changan Zhao, Dongqing Xie, Fangguo Zhang, Chong-zhi Gao, Jingwei Zhang |
Improved Implementations of Cryptosystems Based on Tate Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 145-151, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
elliptic curves, efficient algorithms, Tate pairing, Identity-based cryptosystems |
45 | Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar 0001 |
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 269-283, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Elliptic and hyperelliptic curve cryptosystems, divisor addition, divisor doubling, memory, scalar multiplication, explicit formula |
45 | Kristian Gjøsteen |
Homomorphic Cryptosystems Based on Subgroup Membership Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 314-327, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
homomorphic cryptosystems, subgroup membership problem, public key encryption |
45 | Toru Akishita, Tsuyoshi Takagi |
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 346-359, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny |
45 | Pradeep Kumar Mishra |
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 328-342, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Jacobian coordinates, pipelining, Elliptic curve cryptosystems, scalar multiplication |
45 | Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung |
Observability Analysis - Detecting When Improved Cryptosystems Fail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 17-29, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems |
45 | Susan K. Langford |
Weakness in Some Threshold Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 74-82, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems |
40 | Massimo Caboara, Fabrizio Caruso, Carlo Traverso |
Gröbner bases for public key cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Symbolic and Algebraic Computation, International Symposium, ISSAC 2008, Linz/Hagenberg, Austria, July 20-23, 2008, Proceedings, pp. 315-324, 2008, ACM, 978-1-59593-904-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
gröbner basis, lattice, public key cryptosystem, hermite normal form |
40 | Masaaki Shirase, Yasushi Hibino |
An architecture for elliptic curve cryptograph computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 124-133, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Harald Niederreiter |
A Public-Key Cryptosystem based on Shift Register Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 35-39, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
39 | Wen-Shenq Juang |
A Simple and Efficient Conference Scheme for Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 81-95, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys |
39 | Nevine Maurice Ebeid, M. Anwar Hasan |
On Randomizing Private Keys to Counteract DPA Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 58-72, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
binary signed-digit representation, smart cards, Differential power analysis, elliptic curve cryptosystems, scalar multiplication |
38 | Olivier Billet, Gilles Macario-Rat |
Cryptanalysis of the Square Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 451-468, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Yasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako |
Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 935-939, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
knapsack public-key cryptosystem, low-density attack, weight of plaintext, density |
38 | Jintai Ding, John Wagner |
Cryptanalysis of Rational Multivariate Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, pp. 124-136, 2008, Springer, 978-3-540-88402-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Lang Lin, Wayne P. Burleson |
Leakage-based differential power analysis (LDPA) on sub-90nm CMOS cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 252-255, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(1), pp. 51-83, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Akinori Kawachi, Keisuke Tanaka, Keita Xagawa |
Multi-bit Cryptosystems Based on Lattice Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 315-329, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(3), pp. 177-185, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
38 | Lei Hu, Jun-Wu Dong, Dingyi Pei |
Implementation of Cryptosystems Based on Tate Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 20(2), pp. 264-269, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
implementation, elliptic curve, Tate pairing, identity-based cryptosystem |
38 | Michael J. Jacobson Jr. |
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 149-156, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi |
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 345-359, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem |
38 | Wen Ping Ma, Moon Ho Lee |
Group Oriented Cryptosystems Based on Linear Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 370-376, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Group Oriented Cryptosystem, ElGamal Cryptosystem, Vector Space Access Structure, Cryptography, Secret Sharing |
38 | Jean-Charles Faugère, Antoine Joux |
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 44-60, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl |
Asynchronous verifiable secret sharing and proactive cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 88-97, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
model, secret sharing, asynchronous, proactive |
38 | Jonathan Katz, Moti Yung |
Threshold Cryptosystems Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 192-205, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Daniele Micciancio |
Improving Lattice Based Cryptosystems Using the Hermite Normal Form. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CaLC ![In: Cryptography and Lattices, International Conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001, Revised Papers, pp. 126-145, 2001, Springer, 3-540-42488-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Lattices, public-key encryption, trapdoor functions |
38 | Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama |
Quantum Public-Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 147-165, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
38 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 295-310, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Distributed Key Generation, Discrete Logarithm, Threshold Cryptography, VSS |
38 | Kouichi Sakurai, Hiroki Shizuya |
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(1), pp. 29-43, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Computational number theory, Computational number theory, Securi, Security, Randomness, Randomness, Public-key cryptography, Public-key cryptography, Elliptic curves, Elliptic curves, Key exchange, Key exchange, Discrete logarithm, Discrete logarithm, Key words, Cryptosystem, Cryptosystem |
38 | Victor Shoup, Rosario Gennaro |
Securing Threshold Cryptosystems against Chosen Ciphertext Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 1-16, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 264-276, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
38 | Florent Chabaud |
On the Security of Some Cryptosystems Based on Error-correcting Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 131-139, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
38 | Silvio Micali |
Fair Public-Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, pp. 113-138, 1992, Springer, 3-540-57340-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
38 | Rudolf Lidl |
On Cryptosystems Based on Polynomials and Finite Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings, pp. 10-15, 1984, Springer, 3-540-16076-0. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
37 | Guilhem Castagnos, Fabien Laguillaumie |
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 260-277, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography |
37 | Noboru Kunihiro |
New Definition of Density on Knapsack Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 156-173, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Low-Weight Knapsack Cryptosystems, Lattice Attack, (pseudo-)density, Shannon Entropy |
37 | Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp, Christopher Wolf |
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 45-61, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
TA-product, UOV, amended TTS, ECC, hardware implementation, cryptosystems, Rainbow |
37 | Pradeep Kumar Mishra |
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(8), pp. 1000-1010, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
EC-operations, comb methods, Jacobian coordinates, sidechannel attacks, sidechannel atomicity, pipelining, ECC, Elliptic Curve Cryptosystems, scalar multiplication, binary methods |
37 | Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi |
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(1), pp. 48-57, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve scalar multiplication, signed binary representations, Public key cryptosystems, algorithm design and analysis |
37 | Tae Hyun Kim 0003, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim 0001, Jongin Lim 0001 |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 168-181, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Randomized projective coordinate systems, Eta pairing, Side channel attacks, Differential Power Analysis, Pairing based cryptosystems |
37 | Hans Eberle, Sheueling Chang Shantz, Vipul Gupta, Nils Gura, Leonard Rarick, Lawrence Spracklen |
Accelerating Next-Generation Public-Key Cryptosystems on General-Purpose CPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 25(2), pp. 52-59, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Public key cryptosystems, Processor Architectures, Cryptographic controls |
37 | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati |
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 674-678, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key issuing, bilinear pairings, key escrow, secure channel, ID-based cryptosystems |
37 | Fanyu Kong, Daxing Li |
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 223-235, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
signed window algorithm, elliptic curve cryptosystems, point multiplication, signed-digit number representations |
37 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 306-314, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
37 | Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi |
Public-Key Cryptosystems from Lattice Reduction Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 112-131, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Lattice Reduction Problems, Public-Key Cryptosystems |
32 | James A. Davis, Laurent Poinsot |
G-Perfect nonlinear functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 46(1), pp. 83-96, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
11T71, AMS Classifications 05B10 |
32 | Luiza de Macedo Mourelle, Nadia Nedjah |
Reconfigurable Hardware for Addition Chains Based Modular Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 603-607, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto |
Efficient Countermeasures against RPA, DPA, and SPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 343-356, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve exponentiation, ZPA, RPA, DPA, SPA |
32 | Henri Cohen, Atsuko Miyaji, Takatoshi Ono |
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 51-65, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
32 | Phong Q. Nguyen, Jacques Stern |
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 198-212, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
32 | Chae Hoon Lim, Pil Joong Lee |
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 420-434, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
31 | Robert Szerwinski, Tim Güneysu |
Exploiting the Power of GPUs for Asymmetric Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 79-99, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Asymmetric Cryptosystems, Graphics Processing Unit, RSA, ECC, DSA |
31 | Tim Güneysu, Christof Paar |
Ultra High Performance ECC over NIST Primes on Commercial FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 62-78, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
FPGA, High-Performance, Elliptic Curve Cryptosystems |
31 | Jaewook Chung, M. Anwar Hasan |
Low-Weight Polynomial Form Integers for Efficient Modular Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 56(1), pp. 44-57, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mersenne numbers, the Montgomery reduction, the Barrett reduction, Cryptography, RSA, elliptic curve cryptosystems, modular multiplication |
31 | Toru Akishita, Tsuyoshi Takagi |
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 151-164, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication |
31 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Improving the Randomized Initial Point Countermeasure Against DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 459-469, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP |
31 | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih |
Fast Multi-computations with Integer Similarity Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 138-153, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications |
31 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 466-477, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem |
31 | Nele Mentens, Siddika Berna Örs, Bart Preneel |
An FPGA implementation of an elliptic curve processor GF(2m). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 14th ACM Great Lakes Symposium on VLSI 2004, Boston, MA, USA, April 26-28, 2004, pp. 454-457, 2004, ACM, 1-58113-853-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
montgomery modular, FPGA, elliptic curve cryptosystems, multiplication |
31 | Paulo S. L. M. Barreto, Ben Lynn, Michael Scott |
On the Selection of Pairing-Friendly Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 17-25, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
group generators, elliptic curves, Tate pairing, pairing-based cryptosystems |
31 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 129-143, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC) |
31 | Elisabeth Oswald, Manfred Josef Aigner |
Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 39-50, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystems, Power Analysis |
31 | Adam L. Young, Moti Yung |
Finding Length-3 Positive Cunningham Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings, pp. 289-298, 1998, Springer, 3-540-64657-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Cunningham Chains, Auto-Recoverable and Auto-Certifiable Cryptosystem, ElGamal system, Public-Key Cryptosystems, Primality testing |
30 | Dong-Guk Han, Sung-Kyoung Kim, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 |
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 238-253, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
left-to-right, right-to-left, Side channel attacks, elliptic curve cryptosystems, pairing-based cryptosystems |
30 | Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi |
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 1-9, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems |
30 | Antoine Joux, Jacques Stern |
Lattice Reduction: A Toolbox for the Cryptanalyst. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(3), pp. 161-185, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Knapsack cryptosystems, Knapsack cryptosystems, Cryptanalysis, Cryptanalysis, Lattices, Lattices, Key words |
30 | Huafei Zhu, Feng Bao 0001 |
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 418-429, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security |
30 | Chris Peikert |
Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 333-342, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptography, lattices |
30 | Xiaolei Dong, Zhenfu Cao, Licheng Wang |
New designing of cryptosystems based on quadratic fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(8), pp. 1106-1116, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
quadratic field cryptography, quadratic fields, provable security, public key cryptosystem |
30 | Guilhem Castagnos |
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 92-108, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Homomorphic Scheme, Paillier Cryptosystem, Quadratic Fields, IND-CPA and IND-CCA2 security, Standard Model, Generic Construction, Probabilistic Encryption |
30 | Yi Wang 0016, Douglas L. Maskell, Jussipekka Leiwo, Thambipillai Srikanthan |
Unified Signed-Digit Number Adder for RSA and ECC Public-key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCCAS ![In: IEEE Asia Pacific Conference on Circuits and Systems 2006, APCCAS 2006, Singapore, 4-7 December 2006, pp. 1655-1658, 2006, IEEE, 1-4244-0387-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Patrick Felke |
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCC ![In: Coding and Cryptography, International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers, pp. 229-241, 2005, Springer, 978-3-540-35481-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
nonassociative algebra, mixed centralizer, finite fields, affine transformations, branches, HFE |
30 | Yuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai |
Similar Keys of Multivariate Quadratic Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 211-222, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
MQ, similar key, digital signature, public key cryptosystem, multivariate |
30 | Salil P. Vadhan |
Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 17(1), pp. 43-77, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Everlasting security, Space-bounded adversaries, Averaging samplers, Expander graphs, Extractors, Unconditional security, Bounded-storage model |
30 | Sashisu Bajracharya, Chang Shu 0003, Kris Gaj, Tarek A. El-Ghazawi |
Implementation of Elliptic Curve Cryptosystems over GF(2n) in Optimal Normal Basis on a Reconfigurable Computer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 14th International Conference , FPL 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings, pp. 1001-1005, 2004, Springer, 3-540-22989-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1931 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|