The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for trapdoor with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1978-1988 (17) 1989-1992 (16) 1994-1997 (19) 1998-1999 (18) 2000-2001 (22) 2002-2003 (37) 2004 (22) 2005 (33) 2006 (26) 2007 (29) 2008 (24) 2009 (33) 2010 (20) 2011 (18) 2012 (18) 2013 (19) 2014 (17) 2015 (16) 2016-2017 (31) 2018 (24) 2019 (32) 2020 (21) 2021 (18) 2022 (20) 2023 (23) 2024 (6)
Publication types (Num. hits)
article(223) incollection(3) inproceedings(350) phdthesis(3)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(91) CRYPTO(41) EUROCRYPT(34) Public Key Cryptography(28) ASIACRYPT(26) J. Cryptol.(17) CoRR(13) TCC(12) FOCS(11) ACNS(10) CT-RSA(10) STOC(8) ICICS(7) ISC(7) ProvSec(7) ACISP(6) More (+10 of total 168)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 287 occurrences of 168 keywords

Results
Found 579 publication records. Showing 579 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
120Dario Catalano, Ivan Visconti Hybrid Trapdoor Commitments and Their Applications. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
102Yevgeniy Dodis, Leonid Reyzin On the Power of Claw-Free Permutations. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
98Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
98Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
95Huafei Zhu, Feng Bao 0001, Robert H. Deng Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Homomorphic trapdoor one-way permutation, sequential aggregate signature, signature scheme
88Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Private information retrieval, Cryptographic primitives, Black-box reductions, Trapdoor functions, One-way permutations
77Kai-Yuen Cheong, Takeshi Koshiba Reducing Complexity Assumptions for Oblivious Transfer. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trapdoor one-way functions, oblivious transfer
77Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow
75Vincent Rijmen, Bart Preneel A Family of Trapdoor Ciphers. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
72Chris Peikert, Brent Waters Lossy trapdoor functions and their applications. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF public key encryption, trapdoor functions
68Alon Rosen, Gil Segev 0001 Chosen-Ciphertext Security via Correlated Products. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
68Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
65Adam L. Young, Moti Yung Towards Signature-Only Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST
63Katja Schmidt-Samoa, Tsuyoshi Takagi Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
63Marc Fischlin On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
61Dong Su, Kewei Lv A New Hard-Core Predicate of Paillier's Trapdoor Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Paillier’s trapdoor function, Hard-core Predicate, Most significant bit
57Dario Catalano, Yevgeniy Dodis, Ivan Visconti Mercurial Commitments: Minimal Assumptions and Efficient Constructions. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
54Eike Kiltz, Krzysztof Pietrzak On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Padding-based encryption, ideal trapdoor permutations, black-box, OAEP
52Bogdan Groza An Extension of the RSA Trapdoor in a KEM/DEM Framework. Search on Bibsonomy SYNASC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Iftach Haitner Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Rosario Gennaro Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52Eyal Kushilevitz, Rafail Ostrovsky One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
52Pascal Paillier A Trapdoor Permutation Equivalent to Factoring. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
49ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng Constructing parallel long-message signcryption scheme from trapdoor permutation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel, signcryption, authenticated encryption, trapdoor permutations
49Edlyn Teske An Elliptic Curve Trapdoor System. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions
49Mihir Bellare, Silvio Micali How to Sign Given Any Trapdoor Permutation. Search on Bibsonomy J. ACM The full citation details ... 1992 DBLP  DOI  BibTeX  RDF cryptography, digital signatures, randomness, trapdoor functions
45Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
45Iftach Haitner, Jonathan J. Hoch, Gil Segev 0001 A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF On-line/off-line signatures, Key exposure, Chameleon hashing
45Gilles Brassard How to Improve Signature Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
43Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka Efficient Non-interactive Universally Composable String-Commitment Schemes. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-interactive string commitment, all-but-one trapdoor functions, homomorphism, universal composability
43Craig Gentry, Chris Peikert, Vinod Vaikuntanathan Trapdoors for hard lattices and new cryptographic constructions. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF lattice-based cryptography, trapdoor functions
43Jintai Ding, Christopher Wolf, Bo-Yin Yang l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trapdoor, Encryption, Public Key, Signing
43Kaoru Kurosawa, Katja Schmidt-Samoa New Online/Offline Signature Schemes Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption
43Kaoru Kurosawa, Swee-Huay Heng The Power of Identification Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trapdoor commitment scheme, on-line/off-line, signature scheme, Identification scheme, identity-based
43Jung Youp Lee, Seok Won Jung, Jongin Lim 0001 Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. Search on Bibsonomy TestCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Trapdoor, Smart Card, Timing Analysis, Power Analysis
43Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue Efficient Non-interactive Deniable Authentication Protocols. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations
43Volker Roth 0002, Kai Richter 0002, Rene Freidinger A PIN-entry method resilient against shoulder surfing. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cognitive trapdoor games, ATM, password, PIN, shoulder surfing
43Michel Abdalla, Bogdan Warinschi On the Minimal Assumptions of Group Signature Schemes. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF minimal assumptions, Group signatures, one-way functions, trapdoor permutations
43Jiejun Kong, Xiaoyan Hong ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. Search on Bibsonomy MobiHoc The full citation details ... 2003 DBLP  DOI  BibTeX  RDF trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability
43Daniele Micciancio Improving Lattice Based Cryptosystems Using the Hermite Normal Form. Search on Bibsonomy CaLC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Lattices, public-key encryption, trapdoor functions
43Adi Shamir, Yael Tauman Improved Online/Offline Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF on-line/off-line, trapdoor hash functions, signature schemes
41Jonathan Katz, Arkady Yerukhimovich On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Edward A. Hirsch, Sergey I. Nikolenko A Feebly Secure Trapdoor Function. Search on Bibsonomy CSR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Haim H. Permuter, Paul Cuff, Benjamin Van Roy, Tsachy Weissman Capacity of the Trapdoor Channel With Feedback. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Kingo Kobayashi Capacity Problem of Trapdoor Channel. Search on Bibsonomy GTIT-C The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Louis Granboulan A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham Paillier's Trapdoor Function Hides up to O(n) Bits. Search on Bibsonomy J. Cryptol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Glenn A. Orton A Multiple-Iterated Trapdoor for Dense Compact Knapsacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
41Mihir Bellare, Moti Yung Certifying Cryptographic Tools: The Case of Trapdoor Permutations. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
41Vijay Varadharajan Trapdoor Rings and Their Use in Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
41R. M. F. Goodman, Anthony J. McAuley A New Trapdoor Knapsack Public-Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF cryptography, codes, knapsack problem, public key, ciphers
40Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan 0001 The Relationship between Public Key Encryption and Oblivious Transfer. Search on Bibsonomy FOCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF trapdoor predicates, cryptography, protocols, protocols, public key cryptography, key agreement, public key encryption, public-key encryption, oblivious transfer, secure multi-party computation, primitives, black-box reductions, trapdoor permutations
36Xu An Wang 0001, Yunxuan Su, Jindan Zhang Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. Search on Bibsonomy NaNA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Chen Qian 0002 Lossy trapdoor primitives, zero-knowledge proofs and applications. (Les primitives lossy trapdoor, preuve à divulgation nulle de connaissance et applications). Search on Bibsonomy 2019   RDF
36Mohammad Hajiabadi Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
36Mohammad Hajiabadi Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations. Search on Bibsonomy TCC (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
36Haiyang Xue, Xianhui Lu, Bao Li 0001, Yamin Liu Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
36Yael Gertner, Tal Malkin, Omer Reingold On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates. Search on Bibsonomy FOCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Tatsuaki Okamoto, Katsuyuki Takashima Homomorphic Encryption and Signatures from Vector Decomposition. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Sébastien Canard, Fabien Laguillaumie, Michel Milhau TrapdoorSanitizable Signatures and Their Application to Content Protection. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Benoît Libert, Jean-Jacques Quisquater Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF time capsule signatures, standard model, bilinear maps
34Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Farshid Delgosha, Faramarz Fekri Public-key cryptography using paraunitary matrices. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank Black-box constructions for secure computation. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF theory of cryptography, oblivious transfer, secure computation, black-box reductions
34P. J. Abisha, D. Gnanaraj Thomas, K. G. Subramanian 0001 Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Finitely Presented Groups, Free Partially Commutative Monoids, Thue Systems, Public Key Cryptosystem, Word Problem, Zero Knowledge Protocol
34Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval Key-Privacy in Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama Quantum Public-Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai 4 Move Perfect ZKIP of Knowledge with No Assumption. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
34Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
31Rafael Pass, Hoeteck Wee Black-Box Constructions of Two-Party Protocols from One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation
31Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF double trapdoor decryption mechanism, privacy, public key cryptosystem, semantic security
31Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin A Fast and Secure Implementation of Sflash. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE
29Kenneth G. Paterson, Sriramkrishnan Srinivasan On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60
29Dan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. Search on Bibsonomy FOCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, digital signature, information security
29Dario Catalano, David Pointcheval, Thomas Pornin Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Julien Bringer, Hervé Chabanne, Quoc Dung Do A fuzzy sketch with trapdoor. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Alexander W. Dent, Steven D. Galbraith Hidden Pairings and Trapdoor DDH Groups. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Lan Nguyen, Reihaneh Safavi-Naini Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham Sequential Aggregate Signatures from Trapdoor Permutations. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Philip D. MacKenzie, Ke Yang 0005 On Simulation-Sound Trapdoor Commitments. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Yvo Desmedt, Peter Landrock, Arjen K. Lenstra, Kevin S. McCurley, Andrew M. Odlyzko, Rainer A. Rueppel, Miles E. Smid The Eurocrypt '92 Controversial Issue: Trapdoor Primes and Moduli (Panel). Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
29Valtteri Niemi A New Trapdoor in Knapsacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
29Mihir Bellare, Silvio Micali How To Sign Given Any Trapdoor Function. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
29P. Schöbe, James L. Massey Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
23Sherman S. M. Chow Real Traceable Signatures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures
23Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa Efficient Public Key Encryption Based on Ideal Lattices. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Chunming Tang 0003, Dingyi Pei, Xiaofeng Wang, Zhuojun Liu Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF delegateable signature, non-interactive witness indistinguishable, non-interactive witness hiding, ?-protocol, non-interactive zero-knowledge
23Mike Burmester, Breno de Medeiros, Rossana Motta Robust, anonymous RFID authentication with constant key-lookup. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure protocols, privacy, scalability, RFID, availability, unlinkability
23Iftach Haitner Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Dario Catalano, Dario Fiore 0001, Mariagrazia Messina Zero-Knowledge Sets with Short Proofs. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Huafei Zhu Round Optimal Universally Composable Oblivious Transfer Protocols. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Double trap-door cryptosystems, simulator, oblivious transfer, universally composable
23Qiong Huang 0001, Duncan S. Wong, Yiming Zhao Generic Transformation to Strongly Unforgeable Signatures. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Emmanuel Bresson, Dario Catalano, Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Mark Manulis Democratic group signatures: on an example of joint ventures. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang Tractable Rational Map Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tractable rational maps, digital signature, finite field, public key, multivariate
23Yang Cui 0001, Kazukuni Kobara, Hideki Imai A Generic Conversion with Optimal Redundancy. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Rafael Pass, Alon Rosen New and improved constructions of non-malleable cryptographic protocols. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle
23Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish Versatile padding schemes for joint signature and encryption. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption
Displaying result #1 - #100 of 579 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license