|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Aggelos Kiayias, Moti Yung |
Polynomial Reconstruction Based Cryptography. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Feng Bao 0001, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu 0001 |
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Emmanuel Bresson, Jacques Stern |
Efficient Revocation in Group Signatures. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Tatsuaki Okamoto, David Pointcheval |
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Miodrag J. Mihaljevic, Yuliang Zheng 0001, Hideki Imai |
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Jean-François Misarsky |
How (not) to Design RSA Signature Schemes. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Mark Vandenwauver, Frank Jorissen |
Securing Internet Electronic Mail. |
State of the Art in Applied Cryptography |
1997 |
DBLP DOI BibTeX RDF |
|
33 | Jeff King, André L. M. dos Santos |
A User-Friendly Approach to Human Authentication of Messages. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Human Cryptography, Authentication |
33 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
33 | Juan A. Garay, Carl Pomerance |
Timed Fair Exchange of Standard Signatures: [Extended Abstract]. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Timed-release cryptography, timed commitments, blind signatures, contract signing |
33 | Francesco Sica 0001, Mathieu Ciet, Jean-Jacques Quisquater |
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
fast performance, efficiently-computable endomorphisms, Elliptic curve cryptography, algebraic number fields |
33 | Daniel R. L. Brown, Robert P. Gallant, Scott A. Vanstone |
Provably Secure Implicit Certificate Schemes. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
Implicit certificate, postal payment, authentication, provable security, elliptic curve cryptography |
33 | Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson |
Dynamic Multi-threshold Metering Schemes. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
Metering Schemes, Security, Cryptography, Entropy |
33 | Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber |
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
non-maximal imaginary quadratic order, non-interactive cryptography, discrete logarithm, identity based cryptosystem |
33 | Yacov Yacobi |
Risk Management for E-Cash Systems with Partial Real-Time Audit. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
randomized-audit, Cryptography, risk-management, e-cash, economy |
33 | Giuseppe Ateniese, Gene Tsudik |
Some Open Issues and New Directions in Group Signatures. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Multi-Group Signatures, Sub-Group Signatures, Coalition Attacks, Digital Signatures, Public-key Cryptography, Group Signatures, Revocation |
33 | Yuliang Zheng 0001, Xian-Mo Zhang |
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Boolean Function, Nonlinearity, Propagation |
33 | Xian-Mo Zhang, Yuliang Zheng 0001 |
The Nonhomomorphicity of Boolean Functions. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
Nonhomomorphicity, Nonlinear Characteristics, Cryptography, Boolean Functions |
33 | Chris Peikert |
Some Recent Progress in Lattice-Based Cryptography. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Jonathan Katz |
Bridging Game Theory and Cryptography: Recent Results and Future Directions. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung |
Threshold and Proactive Pseudo-Random Permutations. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography |
32 | Friedrich L. Bauer |
Cryptology - Methods and Maxims. |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
cipher systems, computational complexity.Computing Reviews Classification: D.3, cryptography, cryptanalysis, encryption, Cryptology |
32 | Karl Rubin, Alice Silverberg |
Using Abelian Varieties to Improve Pairing-Based Cryptography. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Abelian varieties, Compression, Elliptic curve cryptography, Elliptic curves, Pairing-based cryptography |
32 | Sandeep S. Kumar, Thomas J. Wollinger, Christof Paar |
Optimum Digit Serial GF(2^m) Multipliers for Curve-Based Cryptography. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
least significant digit multiplier, elliptic/hyperelliptic curve cryptography, public key cryptography, digit serial multiplier, Bit serial multiplier |
32 | Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang |
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Yadollah Eslami, Ali Sheikholeslami, P. Glenn Gulak, Shoichi Masui, Kenji Mukaida |
An area-efficient universal cryptography processor for smart cards. |
IEEE Trans. Very Large Scale Integr. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Pim Tuyls |
Grey-Box Cryptography: Physical Unclonable Functions. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
Integration of Quantum Cryptography in 802.11 Networks. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Miljan Vuletic, Laura Pozzi, Paolo Ienne |
Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor. |
FCCM |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther, Rajkumar Buyya |
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya |
Cellular Programming and Symmetric Key Cryptography Systems. |
GECCO |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Junhyung Um, Sangwoo Lee, Youngsoo Park, Sungik Jun, Taewhan Kim |
An efficient inverse multiplier/divider architecture for cryptography systems. |
ISCAS (5) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi |
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. |
ICNP |
2003 |
DBLP DOI BibTeX RDF |
|
32 | David F. J. George, Susan E. George |
Cellular Automata Cryptography Using Reconfigurable Computing. |
IEA/AIE |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Gerald Gilbert, Michael Hamrick |
Secrecy, Computational Loads and Rates in Practical Quantum Cryptography. |
Algorithmica |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Louis Salvail |
The Search for the Holy Grail in Quantum Cryptography. |
Lectures on Data Security |
1998 |
DBLP DOI BibTeX RDF |
|
32 | Paul D. Townsend |
Quantum Cryptography on Optical Fiber Networks. |
Euro-Par |
1998 |
DBLP DOI BibTeX RDF |
|
31 | Naya Nagy, Marius Nagy, Selim G. Akl |
Quantum Wireless Sensor Networks. |
UC |
2008 |
DBLP DOI BibTeX RDF |
quantum teleportation, entanglement swapping, wireless sensor networks, quantum cryptography |
31 | Isabelle Déchène |
Arithmetic of Generalized Jacobians. |
ANTS |
2006 |
DBLP DOI BibTeX RDF |
generalized Jacobians, semi-abelian varieties, Public-key cryptography, elliptic curves, discrete logarithm problem |
31 | Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 |
An Identity-Based Grid Security Infrastructure Model. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
Identity Cryptography, Public Key Infrastructure, Security Group Communication |
31 | Saurabh Ganeriwal, Mani B. Srivastava |
Reputation-based framework for high integrity sensor networks. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
bayesian formulation, security, sensor networks, cryptography, trust, framework, reputation |
30 | Peter Bogetoft, Ivan Damgård, Thomas P. Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft |
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yair Frankel, Moti Yung |
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Alfred Menezes |
Supersingular Elliptic Curves in Cryptography. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal |
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Richard Walton |
Uses and Abuses of Cryptography (Invited Paper). |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Svetla Nikova, Ventzislav Nikov |
Some Applications of Bounds for Designs to the Cryptography. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Conrado Porto Lopes Gouvêa, Julio César López-Hernández |
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, pairing based cryptography, software implementation |
29 | Piotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier |
On the application of pairing based cryptography to wireless sensor networks. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, implementation, security protocols, pairing-based cryptography |
29 | An Liu, Peng Ning |
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. |
IPSN |
2008 |
DBLP DOI BibTeX RDF |
TinyECC, ECC, public key cryptography, Wireless sensor network security |
29 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
Ad hoc network, network security, key management, certificateless public key cryptography |
29 | Carmen Pellicer-Lostao, Ricardo López-Ruiz |
Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Pseudorandom Bit Generation, Chaotic Cryptography, Security Engineering |
29 | Chao-Wen Chan, Chih-Hao Lin |
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
secret sharing, key agreement, payment, visual cryptography |
29 | Sining Liu, Brian King, Wei Wang 0003 |
Hardware Organization to Achieve High-Speed Elliptic Curve Cryptography for Mobile Devices. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
cryptographic hardware organization, elliptic curve cryptography, lookup table |
29 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
A data outsourcing architecture combining cryptography and access control. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
outsourced architecture, access control, cryptography |
29 | Vincent Danjean, Roland Gillard, Serge Guelton, Jean-Louis Roch, Thomas Roche |
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography. |
PASCO |
2007 |
DBLP DOI BibTeX RDF |
parallel STL, workstealing, grid computation, symmetric cryptography, adaptive parallelism |
29 | Dan Page, Frederik Vercauteren |
A Fault Attack on Pairing-Based Cryptography. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, identity based encryption, fault attack, Tate pairing |
29 | Selçuk Baktir, Berk Sunar |
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, DFT, Finite field multiplication |
29 | Candelaria Hernández-Goya, Amparo Fúster-Sabater |
Deterministic Analysis of Balancedness in Symmetric Cryptography. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
bit-string algorithm, cryptography, Confidentiality, balancedness |
29 | Konstantinos Chalkias, George Stephanides |
Timed Release Cryptography from Bilinear Pairings Using Hash Chains. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
Timed-Release Cryptography, S/Key, bilinear pairings, hash chains, sealed-bid auctions |
29 | Amparo Fúster-Sabater, Pino Caballero-Gil |
A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography. |
ICCSA (3) |
2005 |
DBLP DOI BibTeX RDF |
bit-string algorithm, cryptography, stream cipher, Confidentiality |
29 | Chip Elliott |
Quantum Cryptography. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
cryptography, public key, optical, quantum, eavesdrop |
29 | Benoît Libert, Jean-Jacques Quisquater |
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
PKIs, pairings, identity based cryptography |
29 | Jun-Cheol Jeon, Kee-Young Yoo |
An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. |
PRICAI |
2004 |
DBLP DOI BibTeX RDF |
Evolutionary Computation, Cellular Automata, Finite Fields, Elliptic Curve Cryptography, Multiplication, Irreducible Polynomial |
29 | Quang Viet Duong, Kaoru Kurosawa |
Almost Ideal Contrast Visual Cryptography with Reversing. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
ideal contrast, perfect black, Visual cryptography |
29 | Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong |
Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
finite field, elliptic curve cryptography, Massey-Omura multiplier, Gaussian normal basis, critical path delay |
29 | Jörg Rothe |
Some facets of complexity theory and cryptography: A five-lecture tutorial. |
ACM Comput. Surv. |
2002 |
DBLP DOI BibTeX RDF |
public-key cryptography, Complexity theory, one-way functions, interactive proof systems, zero-knowledge protocols |
29 | Dewi Utami, Hadi Suwastio, Bambang Sumadjudin |
FPGA Implementation of Digital Chaotic Cryptography. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
digital filter overflow, FPGA, cryptography, Chaos, fixed point |
29 | Harald Baier |
Efficient Computation of Singular Moduli with Application in Cryptography. |
FCT |
2001 |
DBLP DOI BibTeX RDF |
class group, modular function, ring class polynomial, singular modulus, cryptography, elliptic curve, Fourier series, complex multiplication |
29 | Harald Baier |
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
cryptography, elliptic curve, complex multiplication, Optimal Extension Field |
29 | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 |
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Weil descent, fast performance, Finite fields, elliptic curve cryptography |
29 | Stefan Droste |
New Results on Visual Cryptography. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography |
29 | Tzonelih Hwang |
Cryptosystem for Group Oriented Cryptography. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Diffie-Hellman Key Distribution Scheme, Chinese Remainder Theorem, Threshold Scheme, Lagrange Interpolating Polynomial, Group Oriented Cryptography |
29 | Shundong Li, Daoshun Wang, Yiqi Dai |
Symmetric cryptographic protocols for extended millionaires' problem. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
extended millionaires’ problem, simulation paradigm, cryptography, secure multiparty computation, symmetric cryptography |
29 | Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed |
A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC) |
29 | Seok-Lae Lee, Bo-Sung Hwang, Joo-Seok Song |
A Secure Communication Scheme for Mobile Wireless Sensor Networks Using Hamming Distance. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
Sensor Network, Public-Key Cryptography, Hamming Distance, Symmetric cryptography |
29 | Raphael Overbeck |
Statistical Decoding Revisited. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
general decoding, public key cryptography, coding theory, McEliece Cryptosystem, code based cryptography |
29 | Raphael Overbeck |
A New Structural Attack for GPT and Variants. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
rank distance codes, Gabidulin codes, public key cryptography, code based cryptography |
29 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
29 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
29 | Rana Barua, Ratna Dutta, Palash Sarkar 0001 |
Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
group key agreement, ID based cryptography, pairing based cryptography, authenticated key agreement |
29 | Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah |
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Incremental Cryptography, Cryptography, Hash Function |
29 | Michel Abdalla, Sara K. Miner, Chanathip Namprempre |
Forward-Secure Threshold Signature Schemes. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
proactive cryptography, forward security, threshold cryptography, signature schemes |
29 | Ayesha Naureen, Attiya Akram, Tariq Maqsood, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed |
Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Zhong Xu, Xue Liu 0001, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu |
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
29 | David Galindo, Paz Morillo, Carla Ràfols |
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption |
29 | Hyungjick Lee, Jim Alves-Foss, Scott Harrison |
The Use of Encrypted Functions for Mobile Agent Security. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Adam L. Young, Moti Yung |
Cryptovirology: Extortion-Based Security Threats and Countermeasures. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
28 | Qiang Tang, Vanessa Teague (eds.) |
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Qiang Tang, Vanessa Teague (eds.) |
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III |
Public Key Cryptography (3) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Qiang Tang, Vanessa Teague (eds.) |
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II |
Public Key Cryptography (2) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Qiang Tang, Vanessa Teague (eds.) |
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV |
Public Key Cryptography (4) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu 0008, Mehdi Tibouchi, Masayuki Abe |
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone |
Improved Cryptanalysis of HFERP. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang 0002, Yu Yu 0001, Kaiyi Zhang 0001 |
sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Shuichi Katsumata, Yi-Fu Lai, Michael Reichle |
Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Anja Lehmann, Cavit Özbay |
Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy |
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong 0001, Jie Chen 0021 |
Registered Attribute-Based Signature. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Haruhisa Kosuge, Keita Xagawa |
Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 18658 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|