|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 41555 occurrences of 11846 keywords
|
|
|
Results
Found 61687 publication records. Showing 61608 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Ari Juels, Jorge Guajardo |
RSA Key Generation with Verifiable Randomness. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation |
64 | Charles R. Blair |
On Computer Transcription of Manual Morse. |
J. ACM |
1959 |
DBLP DOI BibTeX RDF |
|
60 | Arshad Noor |
Securing the core with an Enterprise Key Management Infrastructure (EKMI). |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
XML encryption (XENC), XML signature (DSIG), enterprise key management infrastructure (EKMI), symmetric key client library (SKCL), symmetric key management system (SKMS), symmetric key services (SKS), symmetric key services markup language (SKSML), key-management (KM), public key infrastructure (PKI) |
60 | Junzuo Lai, Weidong Kou |
Self-Generated-Certificate Public Key Encryption Without Pairing. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography |
59 | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai |
Parallel Key-Insulated Public Key Encryption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
59 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Insider Attacks, Key Compromise Impersonation |
58 | Michel Abdalla, Pierre-Alain Fouque, David Pointcheval |
Password-Based Authenticated Key Exchange in the Three-Party Setting. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
56 | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai |
Toward Fair International Key Escrow. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party |
55 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
53 | Yvo Desmedt, Mike Burmester, Jennifer Seberry |
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
data confiscation, key escrow, RIP |
52 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
51 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Parallel Key-Insulated Public Key Encryption Without Random Oracles. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
parallel key-insulated encryption, standard model, pairings |
50 | Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews |
Chinese remainder theorem based group key management. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management |
50 | K. C. Reddy, Divya Nalla |
Identity Based Authenticated Group Key Agreement Protocol. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing |
49 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
49 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung |
Strong Key-Insulated Signature Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Rakeshbabu Bobba, Himanshu Khurana |
DLPKH - Distributed Logical Public-Key Hierarchy. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
decentralized key distribution, logical key hierarchy, public-key trees, key agreement, Group key management |
46 | Sven Laur, Sylvain Pasini |
SAS-Based Group Authentication and Key Agreement Protocols. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Groups, key agreement, message authentication, multi-party |
45 | Seyit Ahmet Çamtepe, Bülent Yener |
Combinatorial design of key distribution mechanisms for wireless sensor networks. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
combinatorial design theory, generalized quadrangles (GQ), key pre-distribution (deterministic and hybrid), key-chains, security in wireless sensor networks (WSN), symmetric balanced incomplete block design (BIBD), key management |
44 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens |
Security services and public key infrastructure for ATM networks. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services |
44 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
44 | Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner |
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
44 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Password-Based Group Key Exchange in a Constant Number of Rounds. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Password-based Authentication |
44 | Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha |
A Lattice Based Public Key Cryptosystem Using Polynomial Representations. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
GGH cryptosystem, lattice based public key cryptosystem, polynomial representation |
44 | Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 |
Authenticated Public Key Distribution Scheme Without Trusted Third Party. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI) |
44 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li |
Identity-Based Key-Insulated Signature with Secure Key-Updates. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure |
43 | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson |
Key recovery for the commercial environment. |
Int. J. Inf. Sec. |
2002 |
DBLP DOI BibTeX RDF |
Commercial key recovery, Software key recovery, Key management, Key escrow |
43 | Maurizio Adriano Strangio |
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
key agreement protocols, key compromise impersonation |
43 | Petros Mol, Moti Yung |
Recovering NTRU Secret Key from Inversion Oracles. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis |
42 | Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li |
Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
key material, security, scalability, group communication, group key management |
42 | Kouichi Sakurai, Hiroki Shizuya |
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Computational number theory, Computational number theory, Securi, Security, Randomness, Randomness, Public-key cryptography, Public-key cryptography, Elliptic curves, Elliptic curves, Key exchange, Key exchange, Discrete logarithm, Discrete logarithm, Key words, Cryptosystem, Cryptosystem |
42 | Satoshi Koga, Kouichi Sakurai |
A Distributed Online Certificate Status Protocol with a Single Public Key. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Yoshinori Aono |
A New Lattice Construction for Partial Key Exposure Attack for RSA. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction |
41 | Yevgeniy Dodis, Moti Yung |
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. |
IEEE Security in Storage Workshop |
2002 |
DBLP DOI BibTeX RDF |
cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman |
41 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
40 | Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval |
Distributed Public-Key Cryptography from Weak Secrets. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Takeshi Koshiba |
On Sufficient Randomness for Secure Public-Key Cryptosystems. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
40 | Jintai Ding, Christopher Wolf, Bo-Yin Yang |
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Trapdoor, Encryption, Public Key, Signing |
40 | Dima Ruinskiy, Adi Shamir, Boaz Tsaban |
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Thompson’s group, Shpilrain-Ushakov, Subgroup distance function, Cryptanalysis, Key agreement |
40 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
39 | Christian Wieschebrink |
An Attack on a Modified Niederreiter Encryption Scheme. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography |
39 | Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang |
Tractable Rational Map Signature. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
tractable rational maps, digital signature, finite field, public key, multivariate |
39 | Jakob Jonsson, Matthew J. B. Robshaw |
Securing RSA-KEM via the AES. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
RSA-KEM, key derivation function, AES |
39 | Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel |
Cryptanalysis of the Tractable Rational Map Cryptosystem. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems |
39 | Mathias Herrmann, Gregor Leander |
A Practical Key Recovery Attack on Basic TCHo. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
TCHo, stream cipher, chosen ciphertext attack |
39 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
39 | Kristin E. Lauter, Anton Mityagin |
Security Analysis of KEA Authenticated Key Exchange Protocol. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Jong-Myoung Kim, Young-Ju Han, Seon-Ho Park, Tai-Myoung Chung |
N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
Wireless sensor networks, key management, key pre- distribution |
38 | Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk |
Achievability of the Key-Capacity in a Scenario of Key Sharing. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
Wire-tap channel, public discussion, key capacity, privacy amplification, Renyi entropy |
38 | Bruce Schneier, Chris Hall |
An Improved E-Mail Security Protocol. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy |
38 | Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed |
A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC) |
38 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
38 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Confidentiality. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
private-key predicate encryption, key confidentiality |
37 | Alan T. Sherman, David A. McGrew |
Key Establishment in Large Dynamic Groups Using One-Way Function Trees. |
IEEE Trans. Software Eng. |
2003 |
DBLP DOI BibTeX RDF |
Dynamic Cryptographic Context Management (DCCM) Project, logical key hierarchy (LKH), one-functions, one-way function chain (OFC), one-way function tree (OFT), secure conferences, secure group applications, cryptography, key management, cryptographic protocols, key agreement, Broadcast encryption, key establishment, group keying, conference keying |
37 | Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake |
An Algebraic Surface Cryptosystem. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Section, Public-key Cryptosystem, Algebraic Surface |
37 | Christopher Wolf, Bart Preneel |
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Public Key Schemes, Multivariate Quadratic Equations |
37 | Yuliang Zheng 0001 |
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
High Order Residues, RSA, Signature, Public Key Encryption, Signcryption |
37 | Yung-Cheng Lee, Chi-Sung Laih |
On the Key Recovery of the Key Escrow System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy |
37 | Chong Hee Kim, Pil Joong Lee |
New Key Recovery in WAKE Protocol. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Pierre-Alain Fouque, Jacques Stern |
One Round Threshold Discrete-Log Key Generation without Private Channels. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
Threshold DLK Generation, Publicly Verifiable Encryption, Adaptive and Concurrent Adversary |
37 | Feng Bao 0001, Robert H. Deng |
A Signcryption Scheme with Signature Directly Verifiable by Public Key. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
37 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
36 | Hyesun Kwak, Seonhong Min, Yongsoo Song |
Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity. |
Public Key Cryptography (4) |
2024 |
DBLP DOI BibTeX RDF |
|
36 | Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen |
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
36 | Florian Böhl, Gareth T. Davies, Dennis Hofheinz |
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Hoeteck Wee |
Public Key Encryption against Related Key Attacks. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
36 | Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo |
Privacy for Private Key in Signatures. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack |
36 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation |
36 | Ganapathi Padmavathi, Samukutty Annadurai |
Improved Key Management Technique for Secure Multicasting over IP. |
J. Netw. Syst. Manag. |
2005 |
DBLP DOI BibTeX RDF |
rekeying and logical key hierarchy, Multicasting, key management, group key |
36 | Lei Wang 0015, Zhiping Chen 0002, Xinhua H. Jiang |
Researches on scheme of pairwise key establishment for distributed sensor networks. |
WMuNeP |
2005 |
DBLP DOI BibTeX RDF |
hierarchical hypercube model, key pool, sensor networks, key predistribution, pairwise key |
36 | Roberto Di Pietro, Antonio Durante, Luigi V. Mancini |
A Reliable Key Authentication Schema for Secure Multicast Communications. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management |
36 | Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park |
New Public-Key Cryptosystem Using Braid Groups. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem |
36 | Eiji Okamoto, K. Nakamura |
Lifetimes of Keys in Cryptographic Key Management Systems. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
36 | Yuji Watanabe, Hideki Imai |
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Jie Zhou, Yong-hao Ou |
Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Group Key Distribution Scheme, Key tree, Group member subtree, root ID algorithm, Chinese Remainder Theorem |
36 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
Ad hoc network, network security, key management, certificateless public key cryptography |
36 | Jintai Ding, Jason E. Gower |
Inoculating Multivariate Schemes Against Differential Attacks. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate |
36 | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih |
Fast Multi-computations with Integer Similarity Strategy. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications |
36 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption |
36 | Sattam S. Al-Riyami, Kenneth G. Paterson |
CBE from CL-PKE: A Generic Construction and Efficient Schemes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings |
36 | Christian Tobias |
Security Analysis of the MOR Cryptosystem. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem |
36 | Helena Handschuh, Yiannis Tsiounis, Moti Yung |
Decision Oracles are Equivalent to Matching Oracles. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems |
36 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval |
The Twist-AUgmented Technique for Key Exchange. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Jean-Sébastien Coron |
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Emmanuel Bresson, Dario Catalano |
Constant Round Authenticated Group Key Agreement via Distributed Computation. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
New Security Results on Encrypted Key Exchange. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Simon Blake-Wilson, Alfred Menezes |
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Masahiro Mambo, Hiroki Shizuya |
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Shoichi Hirose, Susumu Yoshida |
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Akihiro Yamamura |
Public-Key Cryptosystems Using the Modular Group. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
35 | Donggang Liu, Peng Ning, Rongfang Li |
Establishing pairwise keys in distributed sensor networks. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
Sensor networks, key management, key predistribution, pairwise key |
35 | Youngsook Lee, Junghyun Nam, Dongho Won |
An Inter-domain Key Agreement Protocol Using Weak Passwords. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
authentication, password, Key exchange, public key |
35 | Fengguang An, Xiuzhen Cheng 0001, Jose Manny Rivera, Jiang Li 0009, Z. Cheng |
PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
security, Sensor networks, key management, key distribution |
35 | Sahar Mohamed Ghanem, Hussein M. Abdel-Wahab |
A Simple XOR-Based Technique for Distributing Group Key in Secure Multicasting. |
ISCC |
2000 |
DBLP DOI BibTeX RDF |
Logical Hierarchical Key Tree, Key Distribution Center, Secure Multicasting |
35 | Quazi Ehsanul Kabir Mamun, Sita Ramakrishnan |
SecCOSEn - A Key Management Scheme for Securing Chain Oriented Sensor Networks. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
partial key, WSN, Key management, key pre-distribution, symmetric cryptography |
35 | Chi-Sung Laih, Lein Harn, Jau-Yien Lee |
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
recursive generation, single-key-lock mechanism, access matrix, computer protection system, key selection, lock values, Newton interpolating polynomial, user/file, key positions, user-hierarchy structure, interpolation, polynomials, security of data, information resources, computational load |
35 | Akitoshi Izumi, Yoshifumi Ueshige |
A proposal of efficient scheme of key management using ID-based encryption and Biometrics. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 61608 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|