The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
39Benoît Libert, Damien Vergnaud Tracing Malicious Proxies in Proxy Re-encryption. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectional proxy re-encryption, transferability issues, collusion detection and traceability
39Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar An Efficient RSA Public Key Encryption Scheme. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA public encryption scheme, square matrices, general linear group, digital signature scheme
39Robert H. Deng, Jian Weng 0001, Shengli Liu 0001, Kefei Chen Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bilinear pairing, chosen-ciphertext security, Proxy re-encryption
39Chunhua Li, Xinxin Zhou, Yuzhuo Zhong NAL Level Encryption for Scalable Video Coding. Search on Bibsonomy PCM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network Abstractor Layer, Scalable Video Coding, LEX, Selective Encryption
39Qian Li Practice of Video Encryption Algorithms Based on Chaotic Sequence and Scan Pattern. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF scan methodology, difference matrix, difference-compressed matrix, Video encryption, chaotic sequence
39Gregory V. Bard Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Modes of Encryption, Blockwise-Adaptive Chosen-Plaintext Attack, BACPA, MACPA, Online-ness, CBC, CTR, OFB, CFB, IGE, HCBC, HPCBC, XCBC, ABC, ECB
39Chik How Tan Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear map
39Chris McNear, Chrisila C. Pettey A free, readily upgradeable, interactive tool for teaching encryption algorithms. Search on Bibsonomy ACM Southeast Regional Conference (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF teaching aid, simulator, cryptography, encryption, decryption
39Benoît Libert, Jean-Jacques Quisquater Identity Based Encryption Without Redundancy. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ID-based encryption, redundancies, provable security
39Tadayoshi Kohno Attacking and repairing the winZip encryption scheme. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WinZip, Zip, security fixes, compression, encryption, attacks, applied cryptography
39Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES
39Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee 0001 Improved searchable public key encryption with designated tester. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF designated tester, public key encryption with keyword search, searchable encryption
39Kristen Dietiker Deploying PGP whole disk encryption in Mac OS X. Search on Bibsonomy SIGUCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mac OS X, WDE, protected health information, whole disk encryption, encryption, compliance, macintosh, software deployment, HIPAA, PGP
39Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation
39Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
39Mohamed Abo El-Fotouh, Klaus Diepold The Analysis of Windows Vista Disk Encryption Algorithm. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Disk encryption, Windows Vista disk encryption algorithm
39Nikita Borisov, Kazuhiro Minami Single-bit re-encryption with applications to distributed proof systems. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF commutative encryption, distributed proof systems, goldwasser-micali, covert channels, re-encryption
39Thomas Stütz, Andreas Uhl On efficient transparent jpeg2000 encryption. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF format-compliant encryption, transparent encryption, JPEG2000
39Cheng-Kang Chu, Wen-Guey Tzeng Identity-Based Proxy Re-encryption Without Random Oracles. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption, Proxy re-encryption
39David Galindo, Paz Morillo, Carla Ràfols Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption
39Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cramer-Shoup framework, subgroup membership problems, public key encryption, chosen ciphertext security, hybrid encryption
39Guang-Ming Hong, Chun Yuan, Yi Wang 0008, Yuzhuo Zhong A Quality-Controllable Encryption for H.264/AVC Video Coding. Search on Bibsonomy PCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Quality-Controllable Encryption, Partial Encryption, H.264/AVC
39Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen GEM: A Generic Chosen-Ciphertext Secure Encryption Method. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption
39Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is the Data Encryption Standard a Group? (Preliminary Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox
39Virgil D. Gligor, Pompiliu Donescu Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. Search on Bibsonomy ISCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Kaoru Kurosawa, Toshihiko Matsuo How to Remove MAC from DHIES. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, hybrid encryption scheme
37André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chameleon encryption, frame-proofness, stream cipher, fingerprinting, broadcast encryption, collusion resistance, spread-spectrum watermarking
37Shai Halevi, Hugo Krawczyk Security under key-dependent inputs. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF circular encryption, key-dependent input, self encryption
37Peng Wang 0009, Dengguo Feng, Wenling Wu HCTR: A Variable-Input-Length Enciphering Mode. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher
37Sattam S. Al-Riyami, Kenneth G. Paterson CBE from CL-PKE: A Generic Construction and Efficient Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings
37Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo Providing Receipt-Freeness in Mixnet-Based Voting Protocols. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mixnet, Designated-verifier re-encryption proof, Tamper resistant randomizer, Electronic voting, Receipt-freeness, Re-encryption
37Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox
37Barak D. Jolish The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
37Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata Stateful identity-based encryption scheme: faster encryption and decryption. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IBE, stateful encryption, cryptography, provable security, ROM
37Stefan Lucks Two-Pass Authenticated Encryption Faster Than Generic Composition. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF associated data, OMAC, provable security, authenticated encryption
35Emily Shen, Elaine Shi, Brent Waters Predicate Privacy in Encryption Systems. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai Generic Construction of Stateful Identity Based Encryption. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Brent Waters Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Akinori Kawachi, Christopher Portmann On the Power of Quantum Encryption Keys. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Guiliang Zhu, Xiaoqiang Zhang Mixed Image Element Encryption System. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Qiang Tang 0001 Type-Based Proxy Re-encryption and Its Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Shai Halevi Storage Encryption: A Cryptographer's View. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Anil Yekkala, C. E. Veni Madhavan Bit Plane Encoding and Encryption. Search on Bibsonomy PReMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Juan Lan, Tie-Jun Huang 0001, Junhua Qu A Perception-based Scalable Encryption Model for AVS Audio. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Meng-Lin Hsia, Oscal T.-C. Chen Low-Complexity Encryption Using Redundant Bits and Adaptive Frequency Rates in RFID. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Thomas Fuhr 0001, Pascal Paillier Decryptable Searchable Encryption. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Dennis Hofheinz, Eike Kiltz Secure Hybrid Encryption from Weakened Key Encapsulation. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek Separating Sources for Encryption and Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Nuttapong Attrapadung, Jun Furukawa 0001, Hideki Imai Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Jun Liu, Lingling Zou, Changsheng Xie, Hao Huang A Two-Way Selective Encryption Algorithm for MPEG Video. Search on Bibsonomy IWNAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Thomas Stütz, Andreas Uhl On Format-Compliant Iterative Encryption of JPEG2000. Search on Bibsonomy ISM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Kikuko Kamisaka, Saneyasu Yamaguchi, Masato Oguchi Performance Analysis of iSCSI Middleware Optimized for Encryption Processing in a Long-Latency Environment. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Mark Giereth On Partial Encryption of RDF-Graphs. Search on Bibsonomy ISWC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Wei Zhang, Jun Peng, Huaqian Yang, Pengcheng Wei A Digital Image Encryption Scheme Based on the Hybrid of Cellular Neural Network and Logistic Map. Search on Bibsonomy ISNN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Rong-Jian Chen, Wen-Kai Lu, Jui-Lin Lai Image encryption using progressive cellular automata substitution and SCAN. Search on Bibsonomy ISCAS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Jung Yeon Hwang, Dong Hoon Lee 0001, Jongin Lim 0001 Generic Transformation for Scalable Broadcast Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Peter Fairbrother An Improved Construction for Universal Re-encryption. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson Universal Re-encryption for Mixnets. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai Separating Encryption and Key Issuance in Digital Rights Management Systems. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Yan Zong Ding, Michael O. Rabin Hyper-Encryption and Everlasting Security. Search on Bibsonomy STACS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Hugo Krawczyk The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Juan A. Garay, Jessica Staddon, Avishai Wool Long-Lived Broadcast Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Anand Desai The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Richard A. Kemmerer Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
35Jian-Ru Chen, Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang Video JET: packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF (Selective) Encryption, Media hashing, Motion estimation/compensation, Embedding, Packet loss, Error resilience, Error concealment
35Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang Ciphertext verification security of symmetric encryption schemes. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption
35Julien Cathalo, Benoît Libert, Moti Yung Group Encryption: Non-interactive Realization in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group encryption, anonymity, provable security
35Jeffrey B. Lotspiech Broadcast encryption versus public key cryptography in content protection systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tracing traitors, drm, broadcast encryption, content protection
35Viktor Gergely, Gábor Fehér Enhancing Progressive Encryption for Scalable Video Streams. Search on Bibsonomy EUNICE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF progressive encryption, scalable video streaming, wireless networks, stream ciphers
35Haixun Wang, Jian Yin 0002, Chang-Shing Perng, Philip S. Yu Dual encryption for query integrity assurance. Search on Bibsonomy CIKM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF database outsourcing, security, integrity, encryption, audit
35Eric J. Wharton, Karen Panetta, Sos S. Agaian Simultaneous Encryption/Compression of Images Using Alpha Rooting. Search on Bibsonomy DCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Alpha Rooting, Image Processing, Compression, Encryption, Image Enhancement
35Varad Kirtane, C. Pandu Rangan RSA-TBOS signcryption with proxy re-encryption. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signcryption, proxy re-encryption
35Sherman S. M. Chow, Siu-Ming Yiu Timed-Release Encryption Revisited. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF release-time confidentiality, Timed-release encryption
35Ayman Alfalou, Alain Loussert, Abdulsalam Alkholidi, Rami El Sawda System for Image Compression and Encryption by Spectrum Fusion in Order to Optimize Image Transmission. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Signal and Image Processing, Image Compres- sion/Decompression, Image Encryption/Decryption, Trans- mission, FFT, DCT
35Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart Escrow-free encryption supporting cryptographic workflow. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Workflow, Pairings, Identity based encryption
35Chih-Hsu Yen, Bing-Fei Wu Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differential fault attacks, Advanced encryption standard, error control code, CRC
35Pedro R. M. Inácio, Marek Hajduczenia, Mário M. Freire, Henrique J. A. da Silva, Paulo P. Monteiro Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ethernet Passive Optical Networks, encryption mechanism, EPON frame preamble, Security, privacy, EPON
35Craig Gentry Practical Identity-Based Encryption Without Random Oracles. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Identity Based Encryption
35Xiaojian Tian, Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MT-authenticator, BCK-model, CK-model, Verifiable Encryption
35Peter Phuong Vo, Chau Maggie Vo FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption using flipping, shifting operations, mapping
35Eun-Jun Yoon, Kee-Young Yoo Robust Authenticated Encryption Scheme with Message Linkages. Search on Bibsonomy KES (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Message linkage, Cryptography, Signature, Authenticated encryption
35Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Security Weaknesses of Certain Broadcast Encryption Schemes. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-memory-data trade-off, cryptanalysis, key management, broadcast encryption
35Bharat K. Bhargava, Changgui Shi, Sheng-Yih Wang MPEG Video Encryption Algorithms. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multimedia data security, MPEG video encryption, MPEG codec
35Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish Versatile padding schemes for joint signature and encryption. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption
35Phillip Rogaway Authenticated-encryption with associated-data. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption
35Máire McLoone, John V. McCanny Single-Chip FPGA Implementation of the Advanced Encryption Standard Algorithm. Search on Bibsonomy FPL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Encryption, AES, Rijndael, FPGA Implementation
35Lakshminath R. Dondeti, Ashok Samal, Sarit Mukherjee A Dual Encryption Protocol for Scalable Secure Multicasting. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Scalable Key Distribution Dual Encryption, Secure Group Communication, Secure Multicasting
35Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao Attribute based proxy re-encryption with delegating capabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key delegation, attribute based encryption, proxy re-encryption
35Liming Fang 0001, Willy Susilo, Chunpeng Ge, Jiandong Wang A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public key encryption with keyword search, without random oracle, searchable encryption
35David Lubicz, Thomas Sirvent Attribute-Based Broadcast Encryption Scheme Made Efficient. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Public-key broadcast encryption, Generic model of groups with pairing, Attribute-based encryption
35YiWei Zhang, YuMin Wang, XuBang Shen A chaos-based image encryption algorithm using alternate structure. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chaotic encryption, general cat-map, OCML, image encryption
35Ran Canetti, Susan Hohenberger Chosen-ciphertext secure proxy re-encryption. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption, obfuscation, chosen-ciphertext security, re-encryption
35Matthew Green 0001, Giuseppe Ateniese Identity-Based Proxy Re-encryption. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity-based encryption, bilinear maps, proxy re-encryption
35Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography
35Andreas Uhl, Andreas Pommer Are parameterised biorthogonal wavelet filters suited (better) for selective encryption? Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF biorthogonal wavelet filters, filter parameterisation, image compression, image encryption, selective encryption
34Thomas Ristenpart, Phillip Rogaway How to Enrich the Message Space of a Cipher. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Deterministic encryption, enciphering scheme, length-preserving encryption, multipermutation, symmetric encryption
33Rui Xue 0001, Dengguo Feng Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Takeshi Koshiba On Sufficient Randomness for Secure Public-Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33David P. Anderson, P. Venkat Rangan High-Performance Interface Architectures for Cryptographic Hardware. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 21739 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license