The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for encryptions with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1996 (18) 1998-2001 (16) 2002-2003 (16) 2004-2005 (27) 2006 (23) 2007 (17) 2008 (25) 2009 (22) 2010-2011 (18) 2012-2014 (16) 2015-2016 (16) 2017-2018 (20) 2019-2021 (17) 2022-2024 (19)
Publication types (Num. hits)
article(74) incollection(1) inproceedings(193) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 188 occurrences of 116 keywords

Results
Found 270 publication records. Showing 270 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
76Ivan Damgård, Lars R. Knudsen The Breaking of the AR Hash Function. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
64Lars R. Knudsen, Bart Preneel Hash Functions Based on Block Ciphers and Quaternary Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
61Jens Groth A Verifiable Secret Shuffle of Homomorphic Encryptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
51Xiaorui Sun, Xuejia Lai Improved Integral Attacks on MISTY1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
51Duo Lei, Chao Li, Keqin Feng New Observation on Camellia. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Adam L. Young, Moti Yung Questionable Encryption and Its Applications. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51John Kelsey, Bruce Schneier Key-Schedule Cryptanalysis of DEAL. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
48Huafei Zhu, Feng Bao 0001 Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security
45Yuan Chen 0008, Qingkuan Dong RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
45Seiko Arita, Koji Tsurudome Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption
42R. Elijah Blessing, V. Rhymend Uthariaraj Design of Secure Multicast Models for Mobile Services. Search on Bibsonomy SOFSEM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Basic simple model, Enhanced LeaSel, security, mobile, complexity, Multicast, encryptions, key distribution
42R. Elijah Blessing, V. Rhymend Uthariaraj Evaluation and Analysis of Computational Complexity for Secure Multicast Models. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF LeaSel, security, computational complexity, scalability, Multicast, encryptions, key distribution
38Meiqin Wang, Jorge Nakahara Jr., Yue Sun Cryptanalysis of the Full MMB Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis
38Mridul Nandi Fast and Secure CBC-Type MAC Algorithms. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OMAC, padding rule, prf-security, CBC-MAC
38Bing Sun 0001, Longjiang Qu, Chao Li 0002 New Cryptanalysis of Block Ciphers with Low Algebraic Degree. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interpolation attack, integral attack, block cipher, Feistel cipher
38X. Brian Zhang, Simon S. Lam, Dong-Young Lee, Yang Richard Yang Protocol design for scalable and reliable group rekeying. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adaptive FEC, proactive FEC, reliable multicast, group key management, secure multicast
38Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas Verifiable Rotation of Homomorphic Encryptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Akihiro Yamamura Homomorphic Encryptions of Sums of Groups. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Rui Xue 0001, Dengguo Feng Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Ritesh Mukherjee, J. William Atwood Proxy Encryptions for Secure Multicast Key Management. Search on Bibsonomy LCN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Jonathan Katz, Moti Yung Characterization of Security Notions for Probabilistic Private-Key Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Private-key encryptions, Definitions
29Ran Canetti, Rosario Gennaro Incoercible Multiparty Computation (extended abstract). Search on Bibsonomy FOCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF incoercible multiparty computation, secure multiparty protocols, coercion resilience, computationally bounded adversaries, public communication channels, adaptive security problem, deniable encryptions, protocols, trapdoor permutations
25Mikhail J. Atallah, Keith B. Frikken Securely outsourcing linear algebra computations. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF computational outsourcing, privacy, cryptographic protocols
25Yongzhuang Wei, YuPu Hu New related-key rectangle attacks on reduced AES-192 and AES-256. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack
25Xiaorui Sun, Xuejia Lai The Key-Dependent Attack on Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-Dependent Attack, Block Cipher, IDEA
25Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz Cryptanalysis of C2. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF S-box recovery, Cryptomeria, block cipher, C2, key recovery, boomerang attack
25Dinei A. F. Florêncio, Cormac Herley One-Time Password Access to Any Server without Changing the Server. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF replay resistance, authentication, Passwords, one-time passwords
25Dennis Hofheinz, Dominique Unruh Towards Key-Dependent Message Security in the Standard Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key-dependent message security, symmetric encryption schemes, security proofs
25Michael Gorski, Stefan Lucks New Related-Key Boomerang Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
25Jie Chen 0055, YuPu Hu, Yueyu Zhang Impossible differential cryptanalysis of Advanced Encryption Standard. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis
25Andrey Bogdanov Linear Slide Attacks on the KeeLoq Block Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks
25Eli Biham, Orr Dunkelman, Nathan Keller A Simple Related-Key Attack on the Full SHACAL-1. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Michael Hutter, Stefan Mangard, Martin Feldhofer Power and EM Attacks on Passive 13.56 MHz RFID Devices. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF EM Attacks, RFID, AES, Side-Channel Attacks, DPA, Power Analysis, DEMA
25Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky Efficient Arguments without Short PCPs. Search on Bibsonomy CCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Duo Lei, Chao Li, Keqin Feng Square Like Attack on Camellia. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Square attack, Block Cipher, Camellia
25Eli Biham, Orr Dunkelman, Nathan Keller New Cryptanalytic Results on IDEA. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Guan Jie, Zhang Zhongya Improved Collision Attack on Reduced Round Camellia. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Block cipher, Collision attack, Camellia
25X. Brian Zhang, Simon S. Lam, Huaiyu Liu Efficient Group Rekeying Using Application-Layer Multicast. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee 0002 Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CIKS-1, Related Key differential attack, Data-dependent rotation, SPECTR-H64
25Jen-Chiun Lin, Chien-Hua Tzeng, Feipei Lai, Hung-Chang Lee Optimizing Centralized Secure Group Communications with Binary Key Tree Recomposition. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Sung Yong Kim, Jin Wook Shin, Sun Young Sim, Dong Sun Park New Mechanisms for End-to-End Security Using IPSec in NAT-Based Private Networks. Search on Bibsonomy Human.Society@Internet 2003 The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel Attack on Six Rounds of Crypton. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Stefan Lucks Attacking Triple Encryption. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Phong Q. Nguyen, Jacques Stern Cryptanalysis of the Ajtai-Dwork Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Don Coppersmith Finding a Small Root of a Univariate Modular Equation. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
25Johan van Tilburg Two Chosen Plaintext Attacks on the Li-Wang Joint Authentication and Encryption Scheme. Search on Bibsonomy AAECC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
22Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Fouzia El Azzaby, Nabil El Akkad, Khalid Sabour The coupling of a multiplicative group and the theory of chaos in the encryptions of images. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Xiao Yang, Chengru Zhang, Haiyang Xue, Man Ho Au Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Gérald Gavin, Sandrine Tainturier Designing homomorphic encryptions with rational functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
22Ziqi Zhu, Jiangtao Li, Kai Zhang 0016, Junqing Gong 0001, Haifeng Qian Registered Functional Encryptions from Pairings. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
22Duy Nguyen Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
22ZaHyun Koo, Joon-Woo Lee, Jong-Seon No, Young-Sik Kim Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing Error. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Anit Kumar Ghosal, Dipanwita Roychowdhury Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Kyosuke Yamashita, Keisuke Hara On the Black-Box Separation Between Ring Signatures and Public Key Encryptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Chao Chen, Fangguo Zhang Verifiable delay functions and delay encryptions from hyperelliptic curves. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Sigurd Eskeland Private set intersection using RSA subgroups with constant-size encryptions. Search on Bibsonomy PST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Mridul Nandi, Tapas Pandit Efficient fully CCA-secure predicate encryptions from pair encodings. Search on Bibsonomy Adv. Math. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Jing Pan, Jiang Zhang, Fangguo Zhang, Xiaofeng Chen 0001, Willy Susilo Lattice-based group encryptions with only one trapdoor. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Ranganath Ponnaboyina, Ramesh Makala, Chinnam Subbarao, Venkata Ramana Gupta Nallagattla An effective text compression-encryption using tight and indirect encryptions. Search on Bibsonomy Soft Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
22Yi Deng 0002, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie Promise Σ-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
22Anit Kumar Ghosal, Dipanwita Roychowdhury Continuously Non-malleable Codes from Authenticated Encryptions in 2-Split-State Model. Search on Bibsonomy ATIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Shokofeh VahidianSadegh, Lena Wiese, Michael Brenner 0003 SeCCA: Towards Privacy-Preserving Biclustering Algorithm with Homomorphic Encryptions. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Zi Wang 0006, Benjamin Carrión Schäfer Locking the Re-usability of Behavioral IPs: Discriminating the Search Space through Partial Encryptions. Search on Bibsonomy DATE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Yi Deng 0002, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie Promise $\varSigma $-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. Search on Bibsonomy ASIACRYPT (4) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Jing Pan, Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo Forward-Secure Group Encryptions from Lattices. Search on Bibsonomy ACISP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22V. Vani, S. R. Anantha Lakshmi Soft computing approaches for character credential and word prophecy analysis with stone encryptions. Search on Bibsonomy Soft Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Huige Wang, Kefei Chen, Tianyu Pan, Yunlei Zhao Practical CCA-Secure Functional Encryptions for Deterministic Functions. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Tapas Pal, Ratna Dutta Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Sébastien Carré, Sylvain Guilley, Olivier Rioul Persistent Fault Analysis With Few Encryptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Shotaro Sawataishi, Rei Ueno, Naofumi Homma Unified Hardware for High-Throughput AES-Based Authenticated Encryptions. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Sébastien Carré, Sylvain Guilley, Olivier Rioul Persistent Fault Analysis with Few Encryptions. Search on Bibsonomy COSADE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Miodrag J. Mihaljevic, Frédérique E. Oggier Security evaluation and design elements for a class of randomised encryptions. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Marwan Majeed Nayyef, Ali Makki Sagheer Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Yuan Chen 0008, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2019 DBLP  BibTeX  RDF
22Tapas Pal, Ratna Dutta Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
22Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei 0001, Hai Zhou 0001 SigAttack: New High-level SAT-based Attack on Logic Encryptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
22Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei 0001, Hai Zhou 0001 SigAttack: New High-level SAT-based Attack on Logic Encryptions. Search on Bibsonomy DATE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Xiong Fan Attribute-based Encryptions and Formal Verification of Lattice-based Cryptography. Search on Bibsonomy 2019   RDF
22Binbin Tu, Yu Chen 0003, Xueli Wang Threshold and Revocation Encryptions via Threshold Trapdoor Function. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
22Yuanqi Shen, Amin Rezaei 0001, Hai Zhou 0001 SAT-based bit-flipping attack on logic encryptions. Search on Bibsonomy DATE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Yuanqi Shen, Amin Rezaei 0001, Hai Zhou 0001 A comparative investigation of approximate attacks on logic encryptions. Search on Bibsonomy ASP-DAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Jiangtao Li 0003, Junqing Gong 0001 Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext. Search on Bibsonomy ACNS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Xin Wang, Bei Liang, Shimin Li, Rui Xue 0001 On Constructing Pairing-Free Identity-Based Encryptions. Search on Bibsonomy ISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Mostapha Derfouf, Mohsine Eleuldj Cloud Secured Protocol based on Partial Homomorphic Encryptions. Search on Bibsonomy Cloudtech The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Dan Yamamoto, Wakaha Ogata Multi-Divisible On-Line/Off-Line Encryptions. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Y. Sreenivasa Rao, Ratna Dutta Computational friendly attribute-based encryptions with short ciphertext. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Kwangsu Lee Efficient Hidden Vector Encryptions and Its Applications. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
22Fanbao Liu, Fengmei Liu Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
22Yuanqi Shen, Amin Rezaei 0001, Hai Zhou 0001 A Comparative Investigation of Approximate Attacks on Logic Encryptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
22Yusuke Naito 0001 Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
22Hai Zhou 0001, Ruifeng Jiang, Shuyu Kong CycSAT: SAT-Based Attack on Cyclic Logic Encryptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
22Yuanqi Shen, Amin Rezaei 0001, Hai Zhou 0001 SAT-based Bit-flipping Attack on Logic Encryptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
22Yusuke Naito 0001 Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Rainer Schnell, Anke Richter, Christian Borgs A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving Record Linkage using Real-world Mammography Data. Search on Bibsonomy HEALTHINF The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Hai Zhou 0001, Ruifeng Jiang, Shuyu Kong CycSAT: SAT-based attack on cyclic logic encryptions. Search on Bibsonomy ICCAD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 270 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license