|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3742 occurrences of 1112 keywords
|
|
|
Results
Found 6507 publication records. Showing 6507 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
116 | Junzuo Lai, Weidong Kou |
Self-Generated-Certificate Public Key Encryption Without Pairing. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography |
96 | Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner |
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
93 | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai |
Parallel Key-Insulated Public Key Encryption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
93 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
93 | Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha |
A Lattice Based Public Key Cryptosystem Using Polynomial Representations. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
GGH cryptosystem, lattice based public key cryptosystem, polynomial representation |
92 | Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 |
Authenticated Public Key Distribution Scheme Without Trusted Third Party. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI) |
91 | Ari Juels, Jorge Guajardo |
RSA Key Generation with Verifiable Randomness. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation |
88 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
86 | Takeshi Koshiba |
On Sufficient Randomness for Secure Public-Key Cryptosystems. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
84 | Satoshi Koga, Kouichi Sakurai |
A Distributed Online Certificate Status Protocol with a Single Public Key. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
84 | Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang |
Tractable Rational Map Signature. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
tractable rational maps, digital signature, finite field, public key, multivariate |
81 | Jintai Ding, Christopher Wolf, Bo-Yin Yang |
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Trapdoor, Encryption, Public Key, Signing |
81 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
81 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens |
Security services and public key infrastructure for ATM networks. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services |
81 | Christian Wieschebrink |
An Attack on a Modified Niederreiter Encryption Scheme. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography |
81 | Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel |
Cryptanalysis of the Tractable Rational Map Cryptosystem. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems |
80 | Christopher Wolf, Bart Preneel |
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Public Key Schemes, Multivariate Quadratic Equations |
80 | Yuliang Zheng 0001 |
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
High Order Residues, RSA, Signature, Public Key Encryption, Signcryption |
78 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption |
76 | Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval |
Distributed Public-Key Cryptography from Weak Secrets. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
76 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
76 | Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake |
An Algebraic Surface Cryptosystem. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Section, Public-key Cryptosystem, Algebraic Surface |
76 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
75 | Jean-Sébastien Coron |
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
75 | Akihiro Yamamura |
Public-Key Cryptosystems Using the Modular Group. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
75 | Jintai Ding, Jason E. Gower |
Inoculating Multivariate Schemes Against Differential Attacks. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate |
75 | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih |
Fast Multi-computations with Integer Similarity Strategy. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications |
75 | Sattam S. Al-Riyami, Kenneth G. Paterson |
CBE from CL-PKE: A Generic Construction and Efficient Schemes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings |
75 | Christian Tobias |
Security Analysis of the MOR Cryptosystem. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem |
72 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
72 | Helena Handschuh, Yiannis Tsiounis, Moti Yung |
Decision Oracles are Equivalent to Matching Oracles. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems |
71 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung |
Strong Key-Insulated Signature Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
70 | Yevgeniy Dodis, Nelly Fazio |
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
70 | Ivan Damgård, Mads Jurik |
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
70 | Eiichiro Fujisaki, Tatsuaki Okamoto |
How to Enhance the Security of Public-Key Encryption at Minimum Cost. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
70 | Yair Frankel, Moti Yung |
Distributed Public Key Cryptosystems. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
70 | Feng Bao 0001, Robert H. Deng |
A Signcryption Scheme with Signature Directly Verifiable by Public Key. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
70 | Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern |
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
discrete logarithm, proof of knowledge, Public key cryptanalysis |
70 | Jintai Ding, Dieter Schmidt |
Cryptanalysis of HFEv and Internal Perturbation of HFE. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials |
70 | Kristian Gjøsteen |
Symmetric Subgroup Membership Problems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, standard model, public key encryption, hybrid encryption |
70 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
70 | Marc Joye, Christophe Tymen |
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms |
70 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
70 | Michael W. David, Kouichi Sakurai |
Security Issues for Contactless Smart Cards. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
Contactless-card, Standards, Smart-card, Public key, Efficient Implementation |
70 | Yuji Watanabe, Hideki Imai |
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
68 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
68 | Yvo Desmedt, Mike Burmester, Jennifer Seberry |
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
data confiscation, key escrow, RIP |
67 | Frank Hartung, Bernd Girod |
Fast Public-Key Watermarking of Compressed Video. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
fast public-key watermarking, pseudo-noise signal, watermark information, practical systems, public decoding, fast compressed-domain embedding technique, on-the-fly compressed-domain public-key watermarking, verification, images, decoding, compressed video, spread-spectrum watermarking |
66 | Hoeteck Wee |
Public Key Encryption against Related Key Attacks. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
66 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Parallel Key-Insulated Public Key Encryption Without Random Oracles. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
parallel key-insulated encryption, standard model, pairings |
66 | Philip D. MacKenzie |
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
66 | Kaoru Kurosawa |
Multi-recipient Public-Key Encryption with Shortened Ciphertext. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
66 | Kouichi Sakurai, Tsuyoshi Takagi |
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
66 | Kaoru Kurosawa, Takuya Yoshida |
Linear Code Implies Public-Key Traitor Tracing. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
66 | Kazukuni Kobara, Hideki Imai |
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
66 | Takeshi Koshiba |
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
66 | Rainer Steinwandt |
Loopholes in Two Public Key Cryptosystems Using the Modular Group. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
66 | Feng Bao 0001, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu 0001 |
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
66 | Siguna Müller |
On the Security of Williams Based Public Key Encryption Scheme. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
(Weak)- Sole-Samplability, Factorization Intractability, Oracle Hashing, Williams' Encryption Scheme, Chosen Ciphertext Security, Plaintext Awareness |
66 | Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima |
IND-CCA Public Key Schemes Equivalent to Factoring n=pq. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
66 | Montse Rubia, Juan Carlos Cruellas, Manuel Medina |
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
65 | Giovanni Di Crescenzo, Vishal Saraswat |
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption |
65 | Petros Mol, Moti Yung |
Recovering NTRU Secret Key from Inversion Oracles. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis |
65 | Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi |
A Closer Look at PKI: Security and Efficiency. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Liqun Chen 0002, John Malone-Lee |
Improved Identity-Based Signcryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai |
Toward Fair International Key Escrow. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party |
62 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication |
62 | Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signature, Digital Signature, Fair Exchange |
62 | Craig Gentry, Zulfikar Ramzan |
Identity-Based Aggregate Signatures. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park |
New Public-Key Cryptosystem Using Braid Groups. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem |
62 | Toru Nakanishi 0001, Hiroki Fujii, Yuta Hira, Nobuo Funabiki |
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Rodrigo Roman, Cristina Alcaraz |
Applicability of Public Key Infrastructures in Wireless Sensor Networks. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Public Key Cryptography, Public Key Infrastructure |
61 | Shuai Han 0001, Shengli Liu 0001, Dawu Gu |
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. |
Public Key Cryptography (4) |
2024 |
DBLP DOI BibTeX RDF |
|
61 | Carlo Brunetta, Hans Heum, Martijn Stam |
SoK: Public Key Encryption with Openings. |
Public Key Cryptography (4) |
2024 |
DBLP DOI BibTeX RDF |
|
61 | Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian |
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions. |
Public Key Cryptography (4) |
2024 |
DBLP DOI BibTeX RDF |
|
61 | Yao Jiang Galteland, Jiaxin Pan |
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption. |
Public Key Cryptography (2) |
2023 |
DBLP DOI BibTeX RDF |
|
61 | Carlo Brunetta, Hans Heum, Martijn Stam |
Multi-instance Secure Public-Key Encryption. |
Public Key Cryptography (2) |
2023 |
DBLP DOI BibTeX RDF |
|
61 | Antonio Faonio, Dennis Hofheinz, Luigi Russo |
Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption. |
Public Key Cryptography (2) |
2023 |
DBLP DOI BibTeX RDF |
|
61 | Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert |
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption. |
Public Key Cryptography (1) |
2023 |
DBLP DOI BibTeX RDF |
|
61 | Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor |
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. |
Public Key Cryptography (2) |
2022 |
DBLP DOI BibTeX RDF |
|
61 | Dakshita Khurana, Brent Waters |
On the CCA Compatibility of Public-Key Infrastructure. |
Public Key Cryptography (2) |
2021 |
DBLP DOI BibTeX RDF |
|
61 | Netanel Raviv, Ben Langton, Itzhak Tamo |
Multivariate Public Key Cryptosystem from Sidon Spaces. |
Public Key Cryptography (1) |
2021 |
DBLP DOI BibTeX RDF |
|
61 | Pascal Bemmann, Rongmao Chen, Tibor Jager |
Subversion-Resilient Public Key Encryption with Practical Watchdogs. |
Public Key Cryptography (1) |
2021 |
DBLP DOI BibTeX RDF |
|
61 | Shifeng Sun 0001, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu |
Public-Key Puncturable Encryption: Modular and Compact Constructions. |
Public Key Cryptography (1) |
2020 |
DBLP DOI BibTeX RDF |
|
61 | Romain Gay |
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials. |
Public Key Cryptography (1) |
2020 |
DBLP DOI BibTeX RDF |
|
61 | Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 |
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
61 | Xiong Fan, Qiang Tang 0005 |
Making Public Key Functional Encryption Function Private, Distributively. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
61 | Benedikt Auerbach, Mihir Bellare, Eike Kiltz |
Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
61 | Takahiro Matsuda 0002, Jacob C. N. Schuldt |
Related Randomness Security for Public Key Encryption, Revisited. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
61 | Lin Lyu 0001, Shengli Liu 0001, Shuai Han 0001, Dawu Gu |
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
61 | Jie Chen 0021, Junqing Gong 0001, Jian Weng 0001 |
Tightly Secure IBE Under Constant-Size Master Public Key. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
61 | Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan 0001 |
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
61 | Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou |
Leakage-Resilient Public-Key Encryption from Obfuscation. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
61 | Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud |
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
61 | Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi |
On Public Key Encryption from Noisy Codewords. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
61 | Michel Abdalla, Fabrice Benhamouda, David Pointcheval |
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
61 | Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge |
On the Selective Opening Security of Practical Public-Key Encryption Schemes. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
61 | Nico Döttling |
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 6507 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|