The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
83Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF double trapdoor decryption mechanism, privacy, public key cryptosystem, semantic security
83Weichi Yu, Dake He, Shixiong Zhu Study on NTRU Decryption Failures. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decryption Failure, Compensating Algorithm, NTRU
82Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen An Efficient Decryption Method for RSA Cryptosystem. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
74Yang Cui 0001, Kazukuni Kobara, Hideki Imai On Achieving Chosen Ciphertext Security with Decryption Errors. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
66Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm
59Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi NICE - New Ideal Coset Encryption. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF fast decryption, quadratic order, smart card implementation, public-key cryptosystem
58Peter Phuong Vo, Chau Maggie Vo FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption using flipping, shifting operations, mapping
58Palash Sarkar 0001 HEAD: Hybrid Encryption with Delegated Decryption Capability. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, delegated decryption, public key encryption
58Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF compact encryption/decryption implementation, FPGA, Cryptography, AES, DES
58Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow
58Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara A Timed-Release Key Management Scheme for Backward Recovery. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
57Cynthia Dwork, Moni Naor, Omer Reingold Immunizing Encryption Schemes from Decryption Errors. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
57Yi Mu 0001, Vijay Varadharajan, Khanh Quoc Nguyen Delegated Decryption. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
51Sherman S. M. Chow Verifiable Pairing and Its Applications. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security
51Tsuyoshi Takagi Fast RSA-Type Cryptosystem Modulo pkq. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Quisquater-Couvreur method, fast decryption, RSA cryptosystem, factoring algorithm
50Guilhem Castagnos, Fabien Laguillaumie On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography
50Craig Gentry Fully homomorphic encryption using ideal lattices. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fully homomorphic encryption
50Nicolas Gama, Phong Q. Nguyen New Chosen-Ciphertext Attacks on NTRU. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park Fair Threshold Decryption with Semi-Trusted Third Parties. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Qiu-Hua Lin, Fuliang Yin, Hualou Liang A Fast Decryption Algorithm for BSS-Based Image Encryption. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Haeryong Park, Kilsoo Chun Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
49Jun Furukawa 0001 Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Analyzing network traffic to detect self-decrypting exploit code. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF exploit code, static analysis, emulation, detection, polymorphic, decryption
43Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Proof of equality of discrete logarithms (PEQDL), Threshold decryption, Threshold ElGamal, Threshold RSA, Batch verification
43Ivan Damgård, Mads Jurik A Length-Flexible Threshold Cryptosystem with Applications. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF length-flexible, length-invariant, group decryption, self-tallying, perfect ballot secrecy, election, mix-net
43Byoungcheon Lee, Kwangjo Kim Secure Matchmaking Protocol. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF proving the equality or inequality of two discrete logarithms, finding collisions without decryption, public commitment, matchmaking, secure multiparty computation, proof of knowledge
43Markus Jakobsson A Practical Mix. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF privacy, robustness, error detection, Mix-network, decryption
42Xue-Guang Wang, Zhen-Chuan Chai A Provable Security Scheme of ID-Based Threshold Decryption. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Threshold decryption, provable security, ID based cryptography
42Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 Publicly Verifiable Privacy-Preserving Group Decryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography
42Feng Bao 0001 Introducing Decryption Authority into PKI. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF decryption authority, DA, sensitive messages, asymmetric encryption, Internet, electronic commerce, electronic commerce, digital signature, public key cryptography, public key cryptography, PKI, message authentication, Internet security, telecommunication security, online transactions
41Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy Compiler-Assisted Memory Encryption for Embedded Processors. Search on Bibsonomy Trans. High Perform. Embed. Archit. Compil. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Benoît Libert, Damien Vergnaud Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficiency, traceability, Identity-based encryption
41Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy Compiler-Assisted Memory Encryption for Embedded Processors. Search on Bibsonomy HiPEAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai Parallel Key-Insulated Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Detlef Hühnlein Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
40Yi-Ru Liu, Wen-Guey Tzeng Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Broadcast encryption, collusion, polynomial interpolation
40Zhang Dinghui, Gu Qiujie, Pan Yonghua, Zhang Xinghua Discrete Chaotic Encryption and Decryption of Digital Images. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Chien-Pen Chuang, Tin-Ying Huang, Li-Chi Yeh Encryption and Decryption with Space Transformation for Bi-directional Association. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Fuchun Guo, Yi Mu 0001, Zhide Chen, Li Xu 0002 Multi-Identity Single-Key Decryption without Random Oracles. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based Systems, Encryption, Pairing
40Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang Joint Fingerprint Embedding and Decryption for Video Distribution. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2D Von Neumann cellular automata. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF thereshold cryptography, block cipher, secret sharing, shared computation
40John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee A Traitor Tracing Scheme Based on RSA for Fast Decryption. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Ciaran McIvor, Máire McLoone, John V. McCanny A high-speed, low latency RSA decryption silicon core. Search on Bibsonomy ISCAS (4) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte The Impact of Decryption Failures on the Security of NTRU Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption
34G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha Performance Enhancement of CAST-128 Algorithm by modifying its function. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext
34Jen-Chieh Lai, Chia-Hui Wang Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. Search on Bibsonomy PSIVT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD
34Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency
34Eberhard von Faber, R. Hammelrath, F.-P. Heider The Secure Distribution of Digital Contents. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems
33Joseph H. Silverman, William Whyte Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Richard M. Dansereau, S. Jin, Rafik A. Goubran Reducing Packet Loss in CBC Secured VoIP using Interleaved Encryption. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague GBD Threshold Cryptography with an Application to RSA Key Recovery. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33T. M. Barakat, I. I. Ismail, I. A. Ali, N. Abdrabouh Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networks. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Kyu B. Doh, Kyeongwha Kim, Jungho Ohn, Ting-C. Poon Information Security Based on Fourier Plane Random Phase Coding and Optical Scanning. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Kyu B. Doh, Kyeongwha Kim, Ting-C. Poon Computer Generated Holographic Image Processing for Information Security. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33David A. Barr Copy Protection for High-Definition Baseband Video. Search on Bibsonomy ITCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata Stateful identity-based encryption scheme: faster encryption and decryption. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IBE, stateful encryption, cryptography, provable security, ROM
32Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
32André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chameleon encryption, frame-proofness, stream cipher, fingerprinting, broadcast encryption, collusion resistance, spread-spectrum watermarking
32Fouz Sattar, Muid Mufti On Modeling Post Decryption Error Processes in UMTS Air Interface. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 3G Security, Wireless Confidentiality, UMTS Encryption, Markov Modeling, Error probability
32Cécile Delerablée, Pascal Paillier, David Pointcheval Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Weidong Shi, Hsien-Hsin S. Lee Accelerating memory decryption and authentication with frequent value prediction. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message authentication, value prediction, secure processors
32Shengli Liu 0001, Kefei Chen, Weidong Qiu Identity-Based Threshold Decryption Revisited. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Chao-Shen Chen, Rong-Jian Chen Image Encryption and Decryption Using SCAN Methodology. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Peter Linder DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
31Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Kannan Karthik, Dimitrios Hatzinakos Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2007 DBLP  BibTeX  RDF
26Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee Collect and broadcast news in security. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cipher text, plaintext, algorithm, encryption, decryption
26Kun Peng, Colin Boyd, Ed Dawson Batch zero-knowledge proof and verification and its applications. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Batch proof and verification of reencryption, batch proof and verification of decryption, mix network
26Ayman Alfalou, Alain Loussert, Abdulsalam Alkholidi, Rami El Sawda System for Image Compression and Encryption by Spectrum Fusion in Order to Optimize Image Transmission. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Signal and Image Processing, Image Compres- sion/Decompression, Image Encryption/Decryption, Trans- mission, FFT, DCT
26Deholo Nali, Carlisle M. Adams, Ali Miri Hierarchical time-based information release. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Time-Based access control, Constant-length ciphertext, Constant-time Decryption, Forward security, Hierarchical identity-Based encryption
26Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 An Implementation and Evaluation of Online Disk Encryption for Windows Systems. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security
26Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. Search on Bibsonomy ICPADS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow
26Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, Authenticated encryption, security proofs
26Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, authenticated encryption, security proofs, SSH
26Adam L. Young, Moti Yung Towards Signature-Only Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST
26Markus Jakobsson, Ari Juels Addition of ElGamal Plaintexts. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF directed decryption, fast-track, repetition robustness, addition, elgamal
26Kanji Hirabayashi A Method of Formal Verification of Cryptographic Circuits. Search on Bibsonomy J. Electron. Test. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF formal verification, encryption, decryption
26Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system
26George I. Davida, David L. Wells, John B. Kam A Database Encryption System with Subkeys. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF subkeys, databases, encryption, data security, decryption
25Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
25Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Conditional Proxy Broadcast Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption
25Petros Mol, Moti Yung Recovering NTRU Secret Key from Inversion Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis
25Sherman S. M. Chow, Volker Roth 0002, Eleanor Gilbert Rieffel General Certificateless Encryption and Timed-Release Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security-mediated certificateless encryption, standard model, timed-release encryption
25MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin Symmetric-key cryptosystem with DNA technology. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF symmetric-key encryption, DNA cryptography, DNA computing
25Ben Adida, Douglas Wikström How to Shuffle in Public. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Eun-Jun Yoon, Kee-Young Yoo Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Three-party, Authentication, Cryptography, Password, Key agreement, Token
25Chih-Hsu Yen, Bing-Fei Wu Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differential fault attacks, Advanced encryption standard, error control code, CRC
25Peter Y. A. Ryan, Steve A. Schneider Prêt à Voter with Re-encryption Mixes. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Bin B. Zhu, Chun Yuan, Yidong Wang, Shipeng Li 0001 Scalable protection for MPEG-4 fine granularity scalability. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Ran Canetti, Shai Halevi, Jonathan Katz Adaptively-Secure, Non-interactive Public-Key Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Youngho Park 0004, Jung-Hwa Shin, Kyung Hyune Rhee Design of a Secure Digital Contents Delivery System in P2P Networks. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Escrow Service, Key Issuing, P2P, Contents Distribution
25Frank K. Gürkaynak, Andreas Burg, Norbert Felber, Wolfgang Fichtner, D. Gasser, Franco Hug, Hubert Kaeslin A 2 Gb/s balanced AES crypto-chip implementation. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AES, rijndael, ASIC implementation
25Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES
25Ulrich Kühn 0001 Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA encryption, Side-channel attack, ElGamal encryption
25Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater Cerebral Cryptography. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Koji Nakano, Kensuke Kawakami, Koji Shigemoto RSA encryption and decryption using the redundant number system on the FPGA. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1470 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license