The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Diffie-Hellman (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1990 (18) 1991-1995 (15) 1996-1997 (21) 1998 (19) 1999 (17) 2000 (27) 2001 (32) 2002 (38) 2003 (57) 2004 (90) 2005 (93) 2006 (101) 2007 (97) 2008 (107) 2009 (75) 2010 (33) 2011 (25) 2012 (18) 2013 (28) 2014 (25) 2015-2016 (36) 2017 (28) 2018 (28) 2019 (32) 2020 (22) 2021 (22) 2022 (30) 2023-2024 (14)
Publication types (Num. hits)
article(353) incollection(13) inproceedings(780) phdthesis(2)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(111) CRYPTO(60) EUROCRYPT(56) Public Key Cryptography(42) ASIACRYPT(29) CCS(23) J. Cryptol.(22) ProvSec(21) CoRR(19) CT-RSA(19) RFC(17) INDOCRYPT(16) ACISP(15) ISC(15) ACNS(14) CANS(13) More (+10 of total 348)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 917 occurrences of 351 keywords

Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
51Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authentication, Performance Analysis, Key Distribution, Hybrid Encryption
51Yiannis Tsiounis, Moti Yung On the Security of ElGamal Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
50Marko Hölbl, Tatjana Welzer An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
50Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
50Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sdhp, ffs, nfs, dlp
50Berkant Ustaoglu Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF leaking ephemeral secrets, postponed ephemeral key derivation, pseudo-static keys, Key agreement protocols
50Timo Brecher, Emmanuel Bresson, Mark Manulis Fully Robust Tree-Diffie-Hellman Group Key Exchange. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
50Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF matrix semigroup action, DDH problem, public key cryptosystem, semantically secure
50Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Jin Wook Byun, Dong Hoon Lee 0001 N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50So-Young Park, Sang-Ho Lee Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations. Search on Bibsonomy Human.Society@Internet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Eun-Jun Yoon, Kee-Young Yoo New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Password, Guessing attack
50Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve, Key exchange, Discrete logarithm, Pairing, Cryptosystem
50Kenji Imamoto, Kouichi Sakurai A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
50Christopher Lynch, Catherine Meadows 0001 Sound Approximations to Diffie-Hellman Using Rewrite Rules. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
50Jonathan K. Millen, Vitaly Shmatikov Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Jae Choon Cha, Jung Hee Cheon An Identity-Based Signature from Gap Diffie-Hellman Groups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GDH group, Elliptic curve, Weil pairing, ID-based signature
50Eike Kiltz On the Representation of Boolean Predicates of the Diffie-Hellman Function. Search on Bibsonomy STACS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Jung Hee Cheon, Byungheup Jun A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Non-abelian group, Braid group, Conjugacy Problem
50Emmanuel Bresson, Olivier Chevassut, David Pointcheval Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
50Victor Boyko, Philip D. MacKenzie, Sarvar Patel Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
50Simon Blake-Wilson, Alfred Menezes Authenticated Diffie-Hellman Key Agreement Protocols. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
50Dan Boneh The Decision Diffie-Hellman Problem. Search on Bibsonomy ANTS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
49Seiko Arita, Koji Tsurudome Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption
49Qingfeng Cheng, Chuangui Ma, Xuexian Hu A New Strongly Secure Authenticated Key Exchange Protocol. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Extended Canetti-Krawczyk model, Gap Diffie-Hellman assumption, Random oracle model, Authenticated key exchange
49Song-Hee Lee, Nam-Sup Park, Soo-Kyun Kim, Jin-Young Choi Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IPTV broadcasting, Diffie-Hellman key exchange, Security analysis
49Daniel J. Bernstein Batch Binary Edwards. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF batch throughput, Karatsuba, Toom, binary Edwards curves, differential addition, complete addition formulas, elliptic curves, vectorization, Scalar multiplication, Diffie-Hellman
49Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 Secure universal designated verifier signature without random oracles. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Universal designated verifier signature, Gap Bilinear Diffie Hellman problem, Security analysis, Random oracle
49Eun-Jun Yoon, Kee-Young Yoo Improving the Host Authentication Mechanism for POD Copy Protection System. Search on Bibsonomy New Directions in Intelligent Interactive Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack
49Steven D. Galbraith, Eric R. Verheul An Analysis of the Vector Decomposition Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Vector decomposition problem, generalised discrete logarithm problem, elliptic curves, Diffie-Hellman problem
49Yinxia Sun, Futai Zhang, Joonsang Baek Strongly Secure Certificateless Public Key Encryption Without Pairing. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificateless public key encryption, public key encryption, Computational Diffie-Hellman problem
49Eun-Jun Yoon, Kee-Young Yoo Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, Network security, Hash function, Password authentication, Diffie-Hellman, Stolen-verifier attack
49Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Certificateless Designated Verifier Signature Schemes. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Designated Verifier, Gap Bilinear Diffie-Hellman Problem, Certificateless Cryptography
49Wade Trappe, Yuke Wang, K. J. Ray Liu Resource-aware conference key establishment for heterogeneous networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Huffman algorithm, conference key agreement, Diffie-Hellman
49Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication
49Moni Naor, Omer Reingold Number-theoretic constructions of efficient pseudo-random functions. Search on Bibsonomy J. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF constant-depth threshold circuits, decision Diffie-Hellman, natural proofs, factoring, learning theory, Pseudo-random functions
49Kenji Imamoto, Kouichi Sakurai Key-Exchange Protocol Using Pre-agreed Session-ID. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Diffie-Hellman based key exchange protocol, Identity concealment, Pre-shared key model, Pre-Agreed Session ID
49Michael Steiner 0001, Gene Tsudik, Michael Waidner Key Agreement in Dynamic Peer Groups. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF decision Diffie-Hellman problem, dynamic peer groups, key establishment/agreement protocols, cryptography, Collaborative work, multiparty computation, communication system security
49Michael Steiner 0001, Gene Tsudik, Michael Waidner CLIQUES: A New Approach to Group Key Agreement. Search on Bibsonomy ICDCS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Contributory Key Agreement, Distributed Systems, Cryptography, Computer Security, Diffie-Hellman, Dynamic Groups
49Tzonelih Hwang Cryptosystem for Group Oriented Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Diffie-Hellman Key Distribution Scheme, Chinese Remainder Theorem, Threshold Scheme, Lagrange Interpolating Polynomial, Group Oriented Cryptography
42Shunji Kozaki, Taketeru Kutsuma, Kazuto Matsuo Remarks on Cheon's Algorithms for Pairing-Related Problems. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Jan Camenisch, Maria Dubovitskaya, Gregory Neven Oblivious transfer with access control. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, oblivious transfer, anonymous credentials
34Hua-Yi Lin, Tzu-Chiang Chiang Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. Search on Bibsonomy CDVE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cooperative WSNs, DH, RSA, DLP
34Mark Manulis Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Jianhong Zhang, Yixian Yang, Xinxin Niu Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. Search on Bibsonomy ISNN (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Directed signature, CDH problem, DBDH problem, Standard model, ID-based
34Yumin Yuan, Da Li, Liwen Tian, Haishan Zhu Certificateless Signature Scheme without Random Oracles. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious KGC attack, Random oracle, Certificateless signatures
34Susan Hohenberger, Brent Waters Realizing Hash-and-Sign Signatures under Standard Assumptions. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Dan Boneh, Xavier Boyen Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital signatures, Bilinear pairings, Standard model, Strong unforgeability
34Alfred Menezes, Berkant Ustaoglu Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIST SP 800-56A, provable security, security models, key agreement protocols
34Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF standard model, identity-based cryptography, identification scheme
34Elaine Shi, Brent Waters Delegating Capabilities in Predicate Encryption Systems. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Lingling Xu, Mingqiang Wang New ID-Based Signatures without Trusted PKG. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Jing Yang, Zhenfeng Zhang A New Anonymous Password-Based Authenticated Key Exchange Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Password-based AKE, Anonymous authentication
34Jun Furukawa 0001, Frederik Armknecht, Kaoru Kurosawa A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF session ID generation, universal composability, Group key exchange
34Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, signcryption, Identity based cryptography
34Peishun Wang, Huaxiong Wang, Josef Pieprzyk Threshold Privacy Preserving Keyword Searches. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure index, threshold, key distribution, Keyword search
34Fuchun Guo, Yi Mu 0001, Zhide Chen, Li Xu 0002 Multi-Identity Single-Key Decryption without Random Oracles. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based Systems, Encryption, Pairing
34Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Undeniable Signatures, Identity-based, Convertible
34Fuchun Guo, Yi Mu 0001, Zhide Chen Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mutative Identity, ID-based Signature
34Daniel R. L. Brown, Kristian Gjøsteen A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptography, Random Number Generation
34Lan Zhou, Willy Susilo, Yi Mu 0001 New Construction of Group Secret Handshakes Based on Pairings. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pairings, random oracle, Secret Handshake, Credential System
34Michael J. Jacobson Jr., Renate Scheidler, Hugh C. Williams An Improved Real-Quadratic-Field-Based Key Exchange Procedure. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptographic key exchange, Real quadratic field, Reduced principal ideal, NUCOMP
34Iris Anshel, Michael Anshel, Dorian Goldfeld A Linear Time Matrix Key Agreement Protocol Over Small Finite Fields. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Colored Burau matrices, Small finite fields, Key agreement protocol, Linear time
34Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng The security of the FDH variant of Chaum's undeniable signature scheme. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Changshe Ma Efficient Short Signcryption Scheme with Public Verifiability. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF provable security, Signcryption, tight reduction
34Damien Vergnaud New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval Password-Based Group Key Exchange in a Constant Number of Rounds. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Group Key Exchange, Password-based Authentication
34Kristin E. Lauter, Anton Mityagin Security Analysis of KEA Authenticated Key Exchange Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Seung Geol Choi, Kunsoo Park, Moti Yung Short Traceable Signatures Based on Bilinear Pairings. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures
34Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong ID-Based Ring Signature Scheme Secure in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Jeong-Mi Lim, Chang-Seop Park Session Key Agreement Protocol for End-to-End Security in MANET. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Sébastien Kunz-Jacques, David Pointcheval About the Security of MTI/C0 and MQV. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Nuttapong Attrapadung, Jun Furukawa 0001, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002 Efficient Identity-Based Encryption with Tight Security Reduction. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Niansheng Liu, Donghui Guo Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34SeongHan Shin, Kazukuni Kobara, Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Haeryong Park, Kilsoo Chun Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Mihir Bellare, Gregory Neven Transitive signatures: new schemes and proofs. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Prateek Gupta, Vitaly Shmatikov Towards computationally sound symbolic analysis of key exchange protocols. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol logic, cryptographic protocols, symbolic analysis, computational soundness
34Levent Ertaul, Weimin Lu ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I). Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Helger Lipmaa, Guilin Wang, Feng Bao 0001 Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Designated verifier signature scheme, non-delegatability, non-programmable random oracle model, signature scheme
34Depeng Li 0002, Srinivas Sampalli An efficient group key establishment in location-aided mobile ad hoc networks. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key tree, group key management, maximum matching
34Jun Furukawa 0001, Hideki Imai An Efficient Group Signature Scheme from Bilinear Maps. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Brent Waters Efficient Identity-Based Encryption Without Random Oracles. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Man Ho Au, Sherman S. M. Chow, Willy Susilo Short E-Cash. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Coin-traceability, Bilinear Pairing, E-cash
34Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Yongdae Kim, Adrian Perrig, Gene Tsudik Tree-based group key agreement. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, group communication, cryptographic protocols, communication complexity, group key agreement
34Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik Secure Group Communication Using Robust Contributory Key Agreement. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF contributory group key agreement, fault tolerance, distributed systems, group communication, cryptographic protocols, network protocols, Security and protection
34Matthias Enzmann, Marc Fischlin, Markus Schneider 0002 A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Mark Manulis, Jörg Schwenk Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik Secret Handshakes from CA-Oblivious Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Lan Nguyen, Reihaneh Safavi-Naini Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim Chameleon Hashing Without Key Exposure. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem
34Sherman S. M. Chow Verifiable Pairing and Its Applications. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security
34Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik Brief announcement: secret handshakes from CA-oblivious encryption. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, authentication, anonymity, encryption
34Benoît Libert, Jean-Jacques Quisquater Identity Based Undeniable Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF provable security, pairings, undeniable signatures, ID-based cryptography
34Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee 0001 Efficient Password-Based Group Key Exchange. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic A Derivation System for Security Protocols and its Logical Formalization. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Xinjun Du, Ying Wang 0057, Jianhua Ge, Yumin Wang A Group Key Establishment Scheme for Ad Hoc Networks. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1148 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license