|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Aggelos Kiayias, Moti Yung |
Traitor Tracing with Constant Transmission Rate. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Russell, Hong Wang 0002 |
How to Fool an Unbounded Adversary with a Short Key. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Adam J. Elbirt, W. Yip, B. Chetwynd, Christof Paar |
An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists. |
IEEE Trans. Very Large Scale Integr. Syst. |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Yong-Cong Chen, Long-Wen Chang |
A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm. |
ICIP (2) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Cheng-Ta Yang, Long-Wen Chang |
Image Authentication By Watermarking with Error Correction Based on Wavelet Packet Transform. |
ICME |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Jonathan Katz, Steven A. Myers, Rafail Ostrovsky |
Cryptographic Counters and Applications to Electronic Voting. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Ali Saman Tosun, Wu-chi Feng |
Lightweight Security Mechanisms for Wireless Video Transmission. |
ITCC |
2001 |
DBLP DOI BibTeX RDF |
|
19 | David A. Barr |
Copy Protection for High-Definition Baseband Video. |
ITCC |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Helena Handschuh, Howard M. Heys |
A Timing Attack on RC5. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Timing Attacks |
19 | Mariusz H. Jakubowski, Ramarathnam Venkatesan |
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Henk Meijer, Selim G. Akl |
Two New Secret Key Cryptosystems. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
19 | Fahim K. Sufi, Ibrahim Khalil |
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking. |
J. Medical Syst. |
2009 |
DBLP DOI BibTeX RDF |
ECG obfuscation, ECG feature detection, Securing ECG data, ECG encryption, HIPAA |
19 | Meng Ao, Stan Z. Li |
Near Infrared Face Based Biometric Key Binding. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
BioHash, Key Binding, NIR Face, Biometric Encryption, ECC |
19 | Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji |
Biometric Identification over Encrypted Data Made Feasible. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Biometrics, Identification, Searchable Encryption |
19 | Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos Mamoulis |
Secure kNN computation on encrypted databases. |
SIGMOD Conference |
2009 |
DBLP DOI BibTeX RDF |
security, encryption, knn |
19 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
19 | Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana |
Usable secure mailing lists with untrusted servers. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
e-mail list security, usability study, proxy re-encryption |
19 | Dennis Hofheinz, Eike Kiltz |
The Group of Signed Quadratic Residues and Applications. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
Hybrid ElGamal/DHIES, Public-key encryption, chosen-ciphertext security |
19 | Supachai Tangwongsan, Sathaporn Kassuvan |
A highly effective model for security protection against eavesdropping exploits. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
security protection, voice eavesdropping, voice encryption, security model, key exchange |
19 | Martín Abadi, Bogdan Warinschi |
Security analysis of cryptographically controlled access to XML documents. |
J. ACM |
2008 |
DBLP DOI BibTeX RDF |
XML, Access control, authorization, encryption |
19 | Reihaneh Safavi-Naini, Shaoquan Jiang |
Non-interactive conference key distribution and its applications. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
conference key distribution, ring authentication, broadcast encryption, unconditional security |
19 | Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, Sung Y. Shin |
Secure deletion for NAND flash file system. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
secure deletion, encryption, key management, file system, flash memory |
19 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Preserving confidentiality of security policies in data outsourcing. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
encryption policy, security policy protection, privacy, data outsourcing |
19 | Takato Hirano, Koichiro Wada, Keisuke Tanaka |
Public-Key Cryptosystems with Primitive Power Roots of Unity. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism |
19 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
19 | Florian Kerschbaum, Julien Vayssière |
Privacy-preserving data analytics as an outsourced service. |
SWS |
2008 |
DBLP DOI BibTeX RDF |
data analytics, remote auditing, outsourcing, searchable encryption |
19 | Jessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen |
A content-driven access control system. |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
access control, secret sharing, revocation, inference control, attribute-based encryption |
19 | Sarah M. Diesburg, Christopher R. Meyers, David M. Lary, An-I Andy Wang |
When cryptography meets storage. |
StorageSS |
2008 |
DBLP DOI BibTeX RDF |
modes of encryption, two-time pads, block ciphers, storage, bloom filters |
19 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
19 | MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin |
Symmetric-key cryptosystem with DNA technology. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
symmetric-key encryption, DNA cryptography, DNA computing |
19 | Ling Cheung, Calvin C. Newport |
Provably secure ciphertext policy ABE. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute-based encryption |
19 | Wei Wang 0015, Dongming Peng, Honggang Wang 0001, Hamid Sharif |
A cross layer resource allocation scheme for secure image delivery in wireless sensor networks. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor network, cross layer optimization, selective encryption, unequal error protection |
19 | G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha |
Performance Enhancement of CAST-128 Algorithm by modifying its function. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext |
19 | Sven Laur, Helger Lipmaa |
A New Protocol for Conditional Disclosure of Secrets and Its Applications. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption |
19 | Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
proxy cryptosystem, certificate-based encryption (CBE), pairing |
19 | Manuel Barbosa, Pooya Farshim |
Randomness Reuse: Extensions and Improvements. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
Randomness Reuse, Multi-Recipient, Hybrid Encryption |
19 | Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert Felber, Matthias Braendli |
Multi-gigabit GCM-AES Architecture Optimized for FPGAs. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Galois/Counter Mode (GCM), hybrid multiplier, Field Programmable Gate Array (FPGA), Very Large Scale Integration (VLSI), Advanced Encryption Standard (AES), high throughput, digit-serial multiplier, bit-parallel multiplier |
19 | Avishay Traeger, Kumar Thangavelu, Erez Zadok |
Round-trip privacy with nfsv4. |
StorageSS |
2007 |
DBLP DOI BibTeX RDF |
NFSv4, round-trip, encryption |
19 | Yehuda Lindell |
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Adaptive chosen-ciphertext attacks, Simulation-sound non-interactive zero-knowledge, Public-key encryption |
19 | Brian Rogers, Milos Prvulovic, Yan Solihin |
Efficient data protection for distributed shared memory multiprocessors. |
PACT |
2006 |
DBLP DOI BibTeX RDF |
DSM multiprocessor, memory encryption and authentication, data security |
19 | Mihir Bellare, Tadayoshi Kohno, Victor Shoup |
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
cryptography, public-key encryption |
19 | Daniel E. Stevenson |
PNG palette permuter. |
ITiCSE |
2006 |
DBLP DOI BibTeX RDF |
compression, encryption, steganography, CS2 |
19 | Tai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson |
DES Decoding Using FPGA and Custom Instructions. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Security, Parallel Processing, Encryption, Encoder, Decoder, DES, Decryption |
19 | Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier |
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. |
ECOWS |
2006 |
DBLP DOI BibTeX RDF |
Secure Service discovery, Web Services, Service Oriented Architectures, Ubiquitous Computing, WS-Discovery, Attribute Based Encryption |
19 | Huafei Zhu, Feng Bao 0001 |
Oblivious Scalar-Product Protocols. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Oblivious scalar-product protocol, homomorphic commitment scheme, homomorphic public key encryption |
19 | Stefan Tillich, Johann Großschädl |
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
embedded RISC processor, SPARC V8 architecture, Advanced Encryption Standard, instruction set extensions, efficient implementation |
19 | Linda Dailey Paulson |
News Briefs. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications |
19 | Changjie Wang, Ho-fung Leung |
A secure voter-resolved approval voting protocol over internet. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
approval voting, universal verification, voter-resolved, security, privacy protection, electronic voting, ElGamal encryption |
19 | Sanjit Chatterjee, Palash Sarkar 0001 |
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
parameter size, security, standard model, identity based encryption |
19 | Hao Yin, Chuang Lin 0002, Sebastien Berton, Xiaowen Chu 0001 |
A novel secure wireless video surveillance system based on Intel IXP425 network processor. |
WMuNeP |
2005 |
DBLP DOI BibTeX RDF |
video selective encryption, wireless network, network processor, ad-hoc network security |
19 | Raphael Chung-Wei Phan, Bok-Min Goi |
On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
tweakable schemes, disk encryption, security bounds, Block cipher, modes of operation, distinguisher |
19 | Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen |
Securing Publish/Subscribe for Multi-domain Systems. |
Middleware |
2005 |
DBLP DOI BibTeX RDF |
attribute encryption, message confidentiality, trust, role-based access control, publish/subscribe, content- based routing, loosely coupled applications |
19 | Xixiang Lv, Bo Yang, Changxing Pei |
Efficient Traitor Tracing Scheme Based On NTRU. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
Information Security, Copyright Protection, Broadcast Encryption, Traitor Tracing |
19 | Chang N. Zhang, Honglan Zhong |
An Integrated Approach for Database Security and Fault Tolerance. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
database encryption, redundant residue number, fault tolerance, authentication, error detection, error correction |
19 | Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
Strong Authentication for RFID Systems Using the AES Algorithm. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES) |
19 | François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. |
FPGA |
2003 |
DBLP DOI BibTeX RDF |
AES RIJNDAEL, high encryption rates, FPGA, cryptography, reconfigurable hardware |
19 | Marco Casassa Mont, Keith Harrison, Martin Sadler |
The HP time vault service: exploiting IBE for timed release of confidential information. |
WWW |
2003 |
DBLP DOI BibTeX RDF |
disclosure policies, identifier-based encryption, timed-release, security, web service, privacy |
19 | Miodrag J. Mihaljevic |
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
stateless receivers, time varying schemes, heterogeneous structures, tree graphs, reconfigurability, key management, broadcast encryption |
19 | Nick A. Moldovyan |
On Cipher Design Based on Switchable Controlled Operations. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
Fast Encryption, Hardware-Oriented Ciphers, Switchable Operations, Controlled Operations, Data-Dependent Operations |
19 | Wenjun Zeng, Jiangtao Wen, Mike Severa |
Format-Compliant Selective Scrambling for Multimedia Access Control. |
ITCC |
2002 |
DBLP DOI BibTeX RDF |
selective scrambling, format compliant, access control, digital rights management, shuffling, selective encryption |
19 | Zhi Li, John Higgins, Mark J. Clement |
Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. |
MASCOTS |
2001 |
DBLP DOI BibTeX RDF |
ElGamel, Encryption, Elliptic Curve, normal basis, polynomial basis |
19 | Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Wonil Lee, Okyeon Yi |
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Pseudorandom Function Family, Symmetric Encryption Schemes, Modes of Operation, Concrete Security |
19 | Eric Filiol, Caroline Fontaine |
A New Ultrafast Stream Cipher Design: COS Ciphers. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register |
19 | Moni Naor, Benny Pinkas |
Efficient Trace and Revoke Schemes. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation |
19 | Olivier Baudron, David Pointcheval, Jacques Stern |
Extended Notions of Security for Multicast Public Key Cryptosystems. |
ICALP |
2000 |
DBLP DOI BibTeX RDF |
Multicast encryption, semantic security, non-malleability |
19 | John Patrick McGregor, Ruby B. Lee |
Performance Impact of Data Compression on Virtual Private Network Transactions. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s |
19 | Feng Bao 0001, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan |
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
provable security, fair exchange, multi-party protocol, verifiable encryption |
19 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
19 | Tim Wilkinson, Dave Hearn, Simon R. Wiseman |
Trustworthy Access Control with Untrustworthy Web Servers. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
access control, web, encryption |
19 | Hongxue Wang, Vijay Varadharajan, Yan Zhang 0003 |
A Secure Communication Scheme for Multiagent Systems. |
PRIMA |
1998 |
DBLP DOI BibTeX RDF |
security, communication, cryptography, cooperation, encryption, Multiagent |
19 | Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee |
IAuth: An authentication system for Internet applications. |
COMPSAC |
1997 |
DBLP DOI BibTeX RDF |
IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys |
19 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
19 | Chooi-Tian Lee, Jack W. Harris |
Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. |
LCN |
1996 |
DBLP DOI BibTeX RDF |
virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program |
19 | Yanjiang Yang, Youcheng Zhang |
A Generic Scheme for Secure Data Sharing in Cloud. |
ICPP Workshops |
2011 |
DBLP DOI BibTeX RDF |
cloud computing, attribute-based encryption, proxy re-encryption, user revocation, fine grained access control |
19 | Faisal T. Ammari, Joan Lu |
Advanced XML Security: Framework for Building Secure XML Management System (SXMS). |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
xml encryption, xml security, encryption standards, data cleansing |
19 | Yossef Oren, Martin Feldhofer |
A low-resource public-key identification scheme for RFID tags and sensor nodes. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
rabin encryption, rfid technology, public-key encryption, hardware implementation |
19 | Dulce B. Ponceleon, Julian A. Cerruti |
Multimedia content protection. |
ACM Multimedia |
2006 |
DBLP DOI BibTeX RDF |
AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy |
19 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
Securely Utilizing External Computing Power. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
program encryption, circuit encryption, Boolean circuit, secure function evaluation, biometric identification |
19 | Lein Harn, David Huang |
A Protocol for Establishing Secure Communication Channels in a Large Network. |
IEEE Trans. Knowl. Data Eng. |
1994 |
DBLP DOI BibTeX RDF |
secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange |
18 | Noriaki Hashimoto, Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya |
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Yi Mu 0001, Willy Susilo, Yan-Xia Lin, Chun Ruan |
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. |
ASIAN |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Carlos Cid |
Some Algebraic Aspects of the Advanced Encryption Standard. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Enrico Buonanno, Jonathan Katz, Moti Yung |
Incremental Unforgeable Encryption. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen |
Differential Cryptanalysis of the ICE Encryption Algorithm. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Mitsuru Matsui |
New Block Encryption Algorithm MISTY. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
18 | Helena Handschuh, Henri Gilbert |
x2 Cryptanalysis of the SEAL Encryption Algorithm. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Sanjeev Ghosh, Sangeeta Mishra, Payal Saha |
Chaos based encryption technique for digital images. |
ICWET |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. |
Des. Codes Cryptogr. |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
16 | J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten |
Lest we remember: cold-boot attacks on encryption keys. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jun Peng, Du Zhang, Xiaofeng Liao 0001 |
Design of a novel image block encryption algorithm based on chaotic systems. |
IEEE ICCI |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Bai Zhongying, Qin Jiancheng |
Webpage Encryption Based on Polymorphic Javascript Algorithm. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Tetsu Iwata, Kan Yasuda |
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode |
16 | Fangchao Wang, Sen Bai, Guibin Zhu, Zhenghui Song |
An Image Encryption Algorithm Based on N-Dimension Affine Transformation. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Craig Gentry, Shai Halevi |
Hierarchical Identity Based Encryption with Polynomially Many Levels. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Edna Milgo |
A secure unidirectional proxy re-encryption using identity and secret key exchange. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
cipher attacks, proxy, cryptosystems, ciphertexts |
16 | Nigel P. Smart, Bogdan Warinschi |
Identity Based Group Signatures from Hierarchical Identity-Based Encryption. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Xiangyi Hu, Guifen Zhao, Guanning Xu |
Security Scheme for Online Banking Based on Secret Key Encryption. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa |
Efficient Public Key Encryption Based on Ideal Lattices. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan |
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. |
ICIC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad, Janet Jackel |
Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy. |
UC |
2009 |
DBLP DOI BibTeX RDF |
|
|
|