The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase public-key (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1980 (15) 1981-1982 (19) 1983-1984 (30) 1985 (23) 1986-1987 (32) 1988 (19) 1989 (28) 1990 (20) 1991 (19) 1992 (17) 1993 (19) 1994 (23) 1995 (29) 1996 (49) 1997 (69) 1998 (101) 1999 (139) 2000 (151) 2001 (167) 2002 (201) 2003 (252) 2004 (333) 2005 (418) 2006 (418) 2007 (417) 2008 (388) 2009 (325) 2010 (181) 2011 (185) 2012 (184) 2013 (186) 2014 (155) 2015 (168) 2016 (186) 2017 (176) 2018 (228) 2019 (192) 2020 (217) 2021 (190) 2022 (224) 2023 (214) 2024 (100)
Publication types (Num. hits)
article(2045) book(15) incollection(73) inproceedings(4255) phdthesis(57) proceedings(62)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3742 occurrences of 1112 keywords

Results
Found 6507 publication records. Showing 6507 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
116Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
96Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
93Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai Parallel Key-Insulated Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
93Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
93Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha A Lattice Based Public Key Cryptosystem Using Polynomial Representations. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GGH cryptosystem, lattice based public key cryptosystem, polynomial representation
92Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 Authenticated Public Key Distribution Scheme Without Trusted Third Party. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI)
91Ari Juels, Jorge Guajardo RSA Key Generation with Verifiable Randomness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation
88Yi-Ru Liu, Wen-Guey Tzeng Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Broadcast encryption, collusion, polynomial interpolation
86Takeshi Koshiba On Sufficient Randomness for Secure Public-Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
84Satoshi Koga, Kouichi Sakurai A Distributed Online Certificate Status Protocol with a Single Public Key. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
84Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang Tractable Rational Map Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tractable rational maps, digital signature, finite field, public key, multivariate
81Jintai Ding, Christopher Wolf, Bo-Yin Yang l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trapdoor, Encryption, Public Key, Signing
81David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
81Vijay Varadharajan, Rajan Shankaran, Michael Hitchens Security services and public key infrastructure for ATM networks. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services
81Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography
81Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems
80Christopher Wolf, Bart Preneel Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public Key Schemes, Multivariate Quadratic Equations
80Yuliang Zheng 0001 Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF High Order Residues, RSA, Signature, Public Key Encryption, Signcryption
78Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption
76Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval Distributed Public-Key Cryptography from Weak Secrets. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
76Wen-Guey Tzeng, Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF revocation, broadcast encryption, traitor tracing
76Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake An Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Section, Public-key Cryptosystem, Algebraic Surface
76Adam L. Young, Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal
75Jean-Sébastien Coron Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
75Akihiro Yamamura Public-Key Cryptosystems Using the Modular Group. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
75Jintai Ding, Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate
75Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih Fast Multi-computations with Integer Similarity Strategy. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications
75Sattam S. Al-Riyami, Kenneth G. Paterson CBE from CL-PKE: A Generic Construction and Efficient Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings
75Christian Tobias Security Analysis of the MOR Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem
72Eugenio Faldella, Marco Prandini A Novel Approach to On-Line Status Authentication of Public-Key Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks
72Helena Handschuh, Yiannis Tsiounis, Moti Yung Decision Oracles are Equivalent to Matching Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems
71Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung Strong Key-Insulated Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
70Yevgeniy Dodis, Nelly Fazio Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
70Ivan Damgård, Mads Jurik A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
70Eiichiro Fujisaki, Tatsuaki Okamoto How to Enhance the Security of Public-Key Encryption at Minimum Cost. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
70Yair Frankel, Moti Yung Distributed Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
70Feng Bao 0001, Robert H. Deng A Signcryption Scheme with Signature Directly Verifiable by Public Key. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
70Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF discrete logarithm, proof of knowledge, Public key cryptanalysis
70Jintai Ding, Dieter Schmidt Cryptanalysis of HFEv and Internal Perturbation of HFE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials
70Kristian Gjøsteen Symmetric Subgroup Membership Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF subgroup membership problem, standard model, public key encryption, hybrid encryption
70Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
70Marc Joye, Christophe Tymen Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms
70Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
70Michael W. David, Kouichi Sakurai Security Issues for Contactless Smart Cards. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Contactless-card, Standards, Smart-card, Public key, Efficient Implementation
70Yuji Watanabe, Hideki Imai Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
68Adam L. Young, Moti Yung Towards Signature-Only Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST
68Yvo Desmedt, Mike Burmester, Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF data confiscation, key escrow, RIP
67Frank Hartung, Bernd Girod Fast Public-Key Watermarking of Compressed Video. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF fast public-key watermarking, pseudo-noise signal, watermark information, practical systems, public decoding, fast compressed-domain embedding technique, on-the-fly compressed-domain public-key watermarking, verification, images, decoding, compressed video, spread-spectrum watermarking
66Hoeteck Wee Public Key Encryption against Related Key Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
66Benoît Libert, Jean-Jacques Quisquater, Moti Yung Parallel Key-Insulated Public Key Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel key-insulated encryption, standard model, pairings
66Philip D. MacKenzie An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
66Kaoru Kurosawa Multi-recipient Public-Key Encryption with Shortened Ciphertext. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
66Kouichi Sakurai, Tsuyoshi Takagi New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
66Kaoru Kurosawa, Takuya Yoshida Linear Code Implies Public-Key Traitor Tracing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
66Kazukuni Kobara, Hideki Imai Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
66Takeshi Koshiba A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
66Rainer Steinwandt Loopholes in Two Public Key Cryptosystems Using the Modular Group. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
66Feng Bao 0001, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu 0001 Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
66Siguna Müller On the Security of Williams Based Public Key Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF (Weak)- Sole-Samplability, Factorization Intractability, Oracle Hashing, Williams' Encryption Scheme, Chosen Ciphertext Security, Plaintext Awareness
66Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima IND-CCA Public Key Schemes Equivalent to Factoring n=pq. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
66Montse Rubia, Juan Carlos Cruellas, Manuel Medina Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
65Giovanni Di Crescenzo, Vishal Saraswat Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption
65Petros Mol, Moti Yung Recovering NTRU Secret Key from Inversion Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis
65Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi A Closer Look at PKI: Security and Efficiency. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Liqun Chen 0002, John Malone-Lee Improved Identity-Based Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
63Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai Toward Fair International Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party
62Eun-Jun Yoon, Kee-Young Yoo Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication
62Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Designated Confirmer Signature, Digital Signature, Fair Exchange
62Craig Gentry, Zulfikar Ramzan Identity-Based Aggregate Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park New Public-Key Cryptosystem Using Braid Groups. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem
62Toru Nakanishi 0001, Hiroki Fujii, Yuta Hira, Nobuo Funabiki Revocable Group Signature Schemes with Constant Costs for Signing and Verifying. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
61Satoshi Hada, Kouichi Sakurai A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Rodrigo Roman, Cristina Alcaraz Applicability of Public Key Infrastructures in Wireless Sensor Networks. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Public Key Cryptography, Public Key Infrastructure
61Shuai Han 0001, Shengli Liu 0001, Dawu Gu More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
61Carlo Brunetta, Hans Heum, Martijn Stam SoK: Public Key Encryption with Openings. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
61Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
61Yao Jiang Galteland, Jiaxin Pan Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
61Carlo Brunetta, Hans Heum, Martijn Stam Multi-instance Secure Public-Key Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
61Antonio Faonio, Dennis Hofheinz, Luigi Russo Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
61Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
61Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
61Dakshita Khurana, Brent Waters On the CCA Compatibility of Public-Key Infrastructure. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
61Netanel Raviv, Ben Langton, Itzhak Tamo Multivariate Public Key Cryptosystem from Sidon Spaces. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
61Pascal Bemmann, Rongmao Chen, Tibor Jager Subversion-Resilient Public Key Encryption with Practical Watchdogs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
61Shifeng Sun 0001, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu Public-Key Puncturable Encryption: Modular and Compact Constructions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
61Romain Gay A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
61Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
61Xiong Fan, Qiang Tang 0005 Making Public Key Functional Encryption Function Private, Distributively. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
61Benedikt Auerbach, Mihir Bellare, Eike Kiltz Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
61Takahiro Matsuda 0002, Jacob C. N. Schuldt Related Randomness Security for Public Key Encryption, Revisited. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
61Lin Lyu 0001, Shengli Liu 0001, Shuai Han 0001, Dawu Gu Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
61Jie Chen 0021, Junqing Gong 0001, Jian Weng 0001 Tightly Secure IBE Under Constant-Size Master Public Key. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
61Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan 0001 On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
61Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou Leakage-Resilient Public-Key Encryption from Obfuscation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
61Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
61Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi On Public Key Encryption from Noisy Codewords. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
61Michel Abdalla, Fabrice Benhamouda, David Pointcheval Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
61Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge On the Selective Opening Security of Practical Public-Key Encryption Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
61Nico Döttling Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 6507 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license