|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 130 occurrences of 91 keywords
|
|
|
Results
Found 165 publication records. Showing 165 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Dan Boneh, Richard J. Lipton |
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
12 | Ivan Damgård |
On the Randomness of Legendre and Jacobi Sequences. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
12 | Emmanuel Bresson, Dario Catalano, Rosario Gennaro |
Improved On-Line/Off-Line Threshold Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Zuhua Shao |
Short Signature Scheme Based on Discrete Logarithms. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
reductionist security proof, discrete logarithm, random oracle model, Short signature |
12 | Damian Weber |
An Implementation of the General Number Field Sieve to Compute Discrete Logarithms mod p. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
9 | Shaoquan Jiang |
Efficient Primitives from Exponentiation in Zp. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
9 | John F. Canny, Stephen Sorkin |
Practical Large-Scale Distributed Key Generation. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
Distributed Key Generation, Random Walk, Linear Algebra, Discrete Logarithm, Threshold Cryptography |
9 | Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Joachim von zur Gathen |
Arithmetic Circuits for Discrete Logarithms. |
LATIN |
2004 |
DBLP DOI BibTeX RDF |
Discrete logarithm, arithmetic circuit, generic algorithm, cyclic group |
9 | Andrea Clementi, Russell Impagliazzo |
Graph Theory and Interactive Protocols for Reachability Problems on Finite Cellular Automata. |
CIAC |
1994 |
DBLP DOI BibTeX RDF |
|
9 | Ivan Damgård |
Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
9 | Neal Koblitz |
CM-Curves with Good Cryptographic Properties. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
6 | Hung-Min Sun, King-Hang Wang, Chien-Ming Chen 0001 |
On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. |
IEEE Trans. Dependable Secur. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
6 | Stanislaw Jarecki, Xiaomin Liu |
Private Mutual Authentication and Conditional Oblivious Transfer. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
6 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures. |
ICDCIT |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
6 | Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko |
Efficient Pseudorandom Generators Based on the DDH Assumption. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
6 | N. R. Sunitha, B. B. Amberker, Prashant Koulgi |
Controlled Delegation in e-cheques Using Proxy Signatures. |
EDOC |
2007 |
DBLP DOI BibTeX RDF |
Se- curity, Digital Signature, Proxy Signature, DSA |
6 | Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas |
Speeding up Exponentiation using an Untrusted Computational Resource. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
6 | Mihir Bellare, Tadayoshi Kohno, Victor Shoup |
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
cryptography, public-key encryption |
6 | Ivan Damgård, Nelly Fazio, Antonio Nicolosi |
Non-interactive Zero-Knowledge from Homomorphic Encryption. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Yang Cui 0001, Kazukuni Kobara, Hideki Imai |
On Achieving Chosen Ciphertext Security with Decryption Errors. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Adam L. Young, Moti Yung |
An Elliptic Curve Backdoor Algorithm for RSASSA. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
6 | David W. Matula, Alex Fit-Florea, Mitchell Aaron Thornton |
Table Lookup Structures for Multiplicative Inverses Modulo 2k. |
IEEE Symposium on Computer Arithmetic |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Damien Vergnaud |
RSA-Based Secret Handshakes. |
WCC |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Benoît Chevallier-Mames |
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Cristopher Moore, Daniel N. Rockmore, Alexander Russell, Leonard J. Schulman |
The power of basis selection in fourier sampling: hidden subgroup problems in affine groups. |
SODA |
2004 |
DBLP BibTeX RDF |
|
6 | Karl Rubin, Alice Silverberg |
Using Primitive Subgroups to Do More with Fewer Bits. |
ANTS |
2004 |
DBLP DOI BibTeX RDF |
|
6 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
Secure Hashed Diffie-Hellman over Non-DDH Groups. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
6 | Masayuki Abe, Serge Fehr |
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
6 | Marten van Dijk, David P. Woodruff |
Asymptotically Optimal Communication for Torus-Based Cryptography. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
6 | Jong-Phil Yang, Sang-Uk Shin, Kyung Hyune Rhee |
A Simplified Approach to User Controllable Threshold Signatures. |
CEC |
2004 |
DBLP DOI BibTeX RDF |
|
6 | Luis von Ahn, Manuel Blum 0001, Nicholas J. Hopper, John Langford 0001 |
CAPTCHA: Using Hard AI Problems for Security. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Dan Boneh, Ilya Mironov, Victor Shoup |
A Secure Signature Scheme from Bilinear Maps. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Dorit Aharonov, Amnon Ta-Shma |
Adiabatic quantum state generation and statistical zero knowledge. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
quantum adiabatic computation, quantum sampling, spectral gap, state generation, statistical zero knowledge, Markov chains, Hamiltonian |
6 | Karl Rubin, Alice Silverberg |
Torus-Based Cryptography. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Eric Allender, Harry Buhrman, Michal Koucký 0001, Dieter van Melkebeek, Detlef Ronneburger |
Power from Random Strings. |
FOCS |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Masayuki Abe, Ronald Cramer, Serge Fehr |
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Aggelos Kiayias, Moti Yung |
Traitor Tracing with Constant Transmission Rate. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Markus Jakobsson, Ari Juels, Phong Q. Nguyen |
Proprietary Certificates. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
collateral key, digital rights, fair encryption, proprietary key, certificates |
6 | Mihir Bellare, Adriana Palacio |
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Manindra Agrawal |
Pseudo-Random Generators and Structure of Complete Degrees. |
CCC |
2002 |
DBLP DOI BibTeX RDF |
Completeness, Reductions, Pseudo-random Generators |
6 | Silvio Micali, Kazuo Ohta, Leonid Reyzin |
Accountable-subgroup multisignatures: extended abstract. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
digital signature, multisignature |
6 | Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen |
Paillier's cryptosystem revisited. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
|
6 | Markus Jakobsson, David Pointcheval |
Mutual Authentication for Low-Power Mobile Devices. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
gap problem, Low power, medical informatics, mutual authentication |
6 | Zhi Li, John Higgins, Mark J. Clement |
Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. |
MASCOTS |
2001 |
DBLP DOI BibTeX RDF |
ElGamel, Encryption, Elliptic Curve, normal basis, polynomial basis |
6 | Nicolas T. Courtois |
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication |
6 | Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Adaptive Security for Threshold Cryptosystems. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
6 | Dan Boneh, Matthew K. Franklin |
An Efficient Public Key Traitor Tracing Scheme. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
6 | Adam L. Young, Moti Yung |
Finding Length-3 Positive Cunningham Chains. |
ANTS |
1998 |
DBLP DOI BibTeX RDF |
Cunningham Chains, Auto-Recoverable and Auto-Certifiable Cryptosystem, ElGamal system, Public-Key Cryptosystems, Primality testing |
6 | Matt Blaze, Gerrit Bleumer, Martin Strauss 0001 |
Divertible Protocols and Atomic Proxy Cryptography. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
6 | Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung |
Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols. |
STACS |
1998 |
DBLP DOI BibTeX RDF |
|
6 | Ronald Cramer, Ivan Damgård |
Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
6 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
RSA-Based Undeniable Signatures. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
6 | Dan Boneh, Richard J. Lipton |
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
6 | Susan K. Langford |
Weakness in Some Threshold Cryptosystems. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems |
6 | Chae Hoon Lim, Pil Joong Lee |
Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
6 | Matthew K. Franklin, Michael K. Reiter |
Verifiable Signature Sharing. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
6 | Peter de Rooij |
Efficient Exponentiation using Procomputation and Vector Addition Chains. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
6 | Matthew K. Franklin, Moti Yung |
Secure and Efficient Off-Line Digital Money (Extended Abstract). |
ICALP |
1993 |
DBLP DOI BibTeX RDF |
|
6 | Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai |
4 Move Perfect ZKIP of Knowledge with No Assumption. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
6 | Uriel Feige, Adi Shamir |
Zero Knowledge Proofs of Knowledge in Two Rounds. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
6 | David Chaum, Hans Van Antwerpen |
Undeniable Signatures. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
6 | Ivan Damgård |
Collision Free Hash Functions and Public Key Signature Schemes. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
6 | Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi |
Secure Audio Teleconference. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
identification, signature, bridging, secrecy |
6 | David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta 0001 |
Demonstrating Possession of a Discrete Logarithm Without Revealing It. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #165 of 165 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |
|