|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 917 occurrences of 351 keywords
|
|
|
Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
51 | Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan |
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
Authentication, Performance Analysis, Key Distribution, Hybrid Encryption |
51 | Yiannis Tsiounis, Moti Yung |
On the Security of ElGamal Based Encryption. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Marko Hölbl, Tatjana Welzer |
An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon |
Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé |
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
sdhp, ffs, nfs, dlp |
50 | Berkant Ustaoglu |
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
leaking ephemeral secrets, postponed ephemeral key derivation, pseudo-static keys, Key agreement protocols |
50 | Timo Brecher, Emmanuel Bresson, Mark Manulis |
Fully Robust Tree-Diffie-Hellman Group Key Exchange. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
matrix semigroup action, DDH problem, public key cryptosystem, semantically secure |
50 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Jin Wook Byun, Dong Hoon Lee 0001 |
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
50 | So-Young Park, Sang-Ho Lee |
Multi-proxy Signatures Based on Diffie-Hellman Problems Allowing Repeated Delegations. |
Human.Society@Internet |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Eun-Jun Yoon, Kee-Young Yoo |
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Password, Guessing attack |
50 | Antoine Joux |
A One Round Protocol for Tripartite Diffie-Hellman. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve, Key exchange, Discrete logarithm, Pairing, Cryptosystem |
50 | Kenji Imamoto, Kouichi Sakurai |
A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Christopher Lynch, Catherine Meadows 0001 |
Sound Approximations to Diffie-Hellman Using Rewrite Rules. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Jonathan K. Millen, Vitaly Shmatikov |
Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Jae Choon Cha, Jung Hee Cheon |
An Identity-Based Signature from Gap Diffie-Hellman Groups. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
GDH group, Elliptic curve, Weil pairing, ID-based signature |
50 | Eike Kiltz |
On the Representation of Boolean Predicates of the Diffie-Hellman Function. |
STACS |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Jung Hee Cheon, Byungheup Jun |
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
Non-abelian group, Braid group, Conjugacy Problem |
50 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Victor Boyko, Philip D. MacKenzie, Sarvar Patel |
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
50 | Simon Blake-Wilson, Alfred Menezes |
Authenticated Diffie-Hellman Key Agreement Protocols. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Dan Boneh |
The Decision Diffie-Hellman Problem. |
ANTS |
1998 |
DBLP DOI BibTeX RDF |
|
49 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
49 | Qingfeng Cheng, Chuangui Ma, Xuexian Hu |
A New Strongly Secure Authenticated Key Exchange Protocol. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Extended Canetti-Krawczyk model, Gap Diffie-Hellman assumption, Random oracle model, Authenticated key exchange |
49 | Song-Hee Lee, Nam-Sup Park, Soo-Kyun Kim, Jin-Young Choi |
Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
IPTV broadcasting, Diffie-Hellman key exchange, Security analysis |
49 | Daniel J. Bernstein |
Batch Binary Edwards. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
batch throughput, Karatsuba, Toom, binary Edwards curves, differential addition, complete addition formulas, elliptic curves, vectorization, Scalar multiplication, Diffie-Hellman |
49 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Secure universal designated verifier signature without random oracles. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Universal designated verifier signature, Gap Bilinear Diffie Hellman problem, Security analysis, Random oracle |
49 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Host Authentication Mechanism for POD Copy Protection System. |
New Directions in Intelligent Interactive Multimedia |
2008 |
DBLP DOI BibTeX RDF |
Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack |
49 | Steven D. Galbraith, Eric R. Verheul |
An Analysis of the Vector Decomposition Problem. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Vector decomposition problem, generalised discrete logarithm problem, elliptic curves, Diffie-Hellman problem |
49 | Yinxia Sun, Futai Zhang, Joonsang Baek |
Strongly Secure Certificateless Public Key Encryption Without Pairing. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
certificateless public key encryption, public key encryption, Computational Diffie-Hellman problem |
49 | Eun-Jun Yoon, Kee-Young Yoo |
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. |
ICCSA (1) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, Network security, Hash function, Password authentication, Diffie-Hellman, Stolen-verifier attack |
49 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Certificateless Designated Verifier Signature Schemes. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
Designated Verifier, Gap Bilinear Diffie-Hellman Problem, Certificateless Cryptography |
49 | Wade Trappe, Yuke Wang, K. J. Ray Liu |
Resource-aware conference key establishment for heterogeneous networks. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
Huffman algorithm, conference key agreement, Diffie-Hellman |
49 | Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication |
49 | Moni Naor, Omer Reingold |
Number-theoretic constructions of efficient pseudo-random functions. |
J. ACM |
2004 |
DBLP DOI BibTeX RDF |
constant-depth threshold circuits, decision Diffie-Hellman, natural proofs, factoring, learning theory, Pseudo-random functions |
49 | Kenji Imamoto, Kouichi Sakurai |
Key-Exchange Protocol Using Pre-agreed Session-ID. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Diffie-Hellman based key exchange protocol, Identity concealment, Pre-shared key model, Pre-Agreed Session ID |
49 | Michael Steiner 0001, Gene Tsudik, Michael Waidner |
Key Agreement in Dynamic Peer Groups. |
IEEE Trans. Parallel Distributed Syst. |
2000 |
DBLP DOI BibTeX RDF |
decision Diffie-Hellman problem, dynamic peer groups, key establishment/agreement protocols, cryptography, Collaborative work, multiparty computation, communication system security |
49 | Michael Steiner 0001, Gene Tsudik, Michael Waidner |
CLIQUES: A New Approach to Group Key Agreement. |
ICDCS |
1998 |
DBLP DOI BibTeX RDF |
Contributory Key Agreement, Distributed Systems, Cryptography, Computer Security, Diffie-Hellman, Dynamic Groups |
49 | Tzonelih Hwang |
Cryptosystem for Group Oriented Cryptography. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Diffie-Hellman Key Distribution Scheme, Chinese Remainder Theorem, Threshold Scheme, Lagrange Interpolating Polynomial, Group Oriented Cryptography |
42 | Shunji Kozaki, Taketeru Kutsuma, Kazuto Matsuo |
Remarks on Cheon's Algorithms for Pairing-Related Problems. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Jan Camenisch, Maria Dubovitskaya, Gregory Neven |
Oblivious transfer with access control. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy, oblivious transfer, anonymous credentials |
34 | Hua-Yi Lin, Tzu-Chiang Chiang |
Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. |
CDVE |
2009 |
DBLP DOI BibTeX RDF |
Cooperative WSNs, DH, RSA, DLP |
34 | Mark Manulis |
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Jianhong Zhang, Yixian Yang, Xinxin Niu |
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. |
ISNN (3) |
2009 |
DBLP DOI BibTeX RDF |
Directed signature, CDH problem, DBDH problem, Standard model, ID-based |
34 | Yumin Yuan, Da Li, Liwen Tian, Haishan Zhu |
Certificateless Signature Scheme without Random Oracles. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Malicious KGC attack, Random oracle, Certificateless signatures |
34 | Susan Hohenberger, Brent Waters |
Realizing Hash-and-Sign Signatures under Standard Assumptions. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Dan Boneh, Xavier Boyen |
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Digital signatures, Bilinear pairings, Standard model, Strong unforgeability |
34 | Alfred Menezes, Berkant Ustaoglu |
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
NIST SP 800-56A, provable security, security models, key agreement protocols |
34 | Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi |
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
standard model, identity-based cryptography, identification scheme |
34 | Elaine Shi, Brent Waters |
Delegating Capabilities in Predicate Encryption Systems. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Lingling Xu, Mingqiang Wang |
New ID-Based Signatures without Trusted PKG. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Jing Yang, Zhenfeng Zhang |
A New Anonymous Password-Based Authenticated Key Exchange Protocol. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Password-based AKE, Anonymous authentication |
34 | Jun Furukawa 0001, Frederik Armknecht, Kaoru Kurosawa |
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
session ID generation, universal composability, Group key exchange |
34 | Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang |
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
provably secure, signcryption, Identity based cryptography |
34 | Peishun Wang, Huaxiong Wang, Josef Pieprzyk |
Threshold Privacy Preserving Keyword Searches. |
SOFSEM |
2008 |
DBLP DOI BibTeX RDF |
secure index, threshold, key distribution, Keyword search |
34 | Fuchun Guo, Yi Mu 0001, Zhide Chen, Li Xu 0002 |
Multi-Identity Single-Key Decryption without Random Oracles. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
ID-based Systems, Encryption, Pairing |
34 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Undeniable Signatures, Identity-based, Convertible |
34 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Mutative Identity, ID-based Signature |
34 | Daniel R. L. Brown, Kristian Gjøsteen |
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptography, Random Number Generation |
34 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
New Construction of Group Secret Handshakes Based on Pairings. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
pairings, random oracle, Secret Handshake, Credential System |
34 | Michael J. Jacobson Jr., Renate Scheidler, Hugh C. Williams |
An Improved Real-Quadratic-Field-Based Key Exchange Procedure. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Cryptographic key exchange, Real quadratic field, Reduced principal ideal, NUCOMP |
34 | Iris Anshel, Michael Anshel, Dorian Goldfeld |
A Linear Time Matrix Key Agreement Protocol Over Small Finite Fields. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Colored Burau matrices, Small finite fields, Key agreement protocol, Linear time |
34 | Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng |
The security of the FDH variant of Chaum's undeniable signature scheme. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Changshe Ma |
Efficient Short Signcryption Scheme with Public Verifiability. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
provable security, Signcryption, tight reduction |
34 | Damien Vergnaud |
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Password-Based Group Key Exchange in a Constant Number of Rounds. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Password-based Authentication |
34 | Kristin E. Lauter, Anton Mityagin |
Security Analysis of KEA Authenticated Key Exchange Protocol. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Seung Geol Choi, Kunsoo Park, Moti Yung |
Short Traceable Signatures Based on Bilinear Pairings. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures |
34 | Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong |
ID-Based Ring Signature Scheme Secure in the Standard Model. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Jeong-Mi Lim, Chang-Seop Park |
Session Key Agreement Protocol for End-to-End Security in MANET. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Sébastien Kunz-Jacques, David Pointcheval |
About the Security of MTI/C0 and MQV. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Nuttapong Attrapadung, Jun Furukawa 0001, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002 |
Efficient Identity-Based Encryption with Tight Security Reduction. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Niansheng Liu, Donghui Guo |
Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
34 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Haeryong Park, Kilsoo Chun |
Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Mihir Bellare, Gregory Neven |
Transitive signatures: new schemes and proofs. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Prateek Gupta, Vitaly Shmatikov |
Towards computationally sound symbolic analysis of key exchange protocols. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
protocol logic, cryptographic protocols, symbolic analysis, computational soundness |
34 | Levent Ertaul, Weimin Lu |
ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I). |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Helger Lipmaa, Guilin Wang, Feng Bao 0001 |
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
Designated verifier signature scheme, non-delegatability, non-programmable random oracle model, signature scheme |
34 | Depeng Li 0002, Srinivas Sampalli |
An efficient group key establishment in location-aided mobile ad hoc networks. |
PE-WASUN |
2005 |
DBLP DOI BibTeX RDF |
key tree, group key management, maximum matching |
34 | Jun Furukawa 0001, Hideki Imai |
An Efficient Group Signature Scheme from Bilinear Maps. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Brent Waters |
Efficient Identity-Based Encryption Without Random Oracles. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Man Ho Au, Sherman S. M. Chow, Willy Susilo |
Short E-Cash. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Coin-traceability, Bilinear Pairing, E-cash |
34 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Yongdae Kim, Adrian Perrig, Gene Tsudik |
Tree-based group key agreement. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
security, group communication, cryptographic protocols, communication complexity, group key agreement |
34 | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik |
Secure Group Communication Using Robust Contributory Key Agreement. |
IEEE Trans. Parallel Distributed Syst. |
2004 |
DBLP DOI BibTeX RDF |
contributory group key agreement, fault tolerance, distributed systems, group communication, cryptographic protocols, network protocols, Security and protection |
34 | Matthias Enzmann, Marc Fischlin, Markus Schneider 0002 |
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Mark Manulis, Jörg Schwenk |
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik |
Secret Handshakes from CA-Oblivious Encryption. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Lan Nguyen, Reihaneh Safavi-Naini |
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Chameleon Hashing Without Key Exposure. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi |
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem |
34 | Sherman S. M. Chow |
Verifiable Pairing and Its Applications. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security |
34 | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik |
Brief announcement: secret handshakes from CA-oblivious encryption. |
PODC |
2004 |
DBLP DOI BibTeX RDF |
privacy, authentication, anonymity, encryption |
34 | Benoît Libert, Jean-Jacques Quisquater |
Identity Based Undeniable Signatures. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
provable security, pairings, undeniable signatures, ID-based cryptography |
34 | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin |
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Su-Mi Lee, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Efficient Password-Based Group Key Exchange. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic |
A Derivation System for Security Protocols and its Logical Formalization. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Xinjun Du, Ying Wang 0057, Jianhua Ge, Yumin Wang |
A Group Key Establishment Scheme for Ad Hoc Networks. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1148 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|