|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2125 occurrences of 681 keywords
|
|
|
Results
Found 3211 publication records. Showing 3211 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
54 | Duc-Phong Le, Matthieu Rivain, Chik How Tan |
On Double Exponentiation for Securing RSA against Fault Analysis. |
CT-RSA |
2014 |
DBLP DOI BibTeX RDF |
|
54 | Cyril Arnaud, Pierre-Alain Fouque |
Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL. |
CT-RSA |
2013 |
DBLP DOI BibTeX RDF |
|
54 | Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild |
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations. |
CT-RSA |
2013 |
DBLP DOI BibTeX RDF |
|
54 | Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft |
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. |
CT-RSA |
2012 |
DBLP DOI BibTeX RDF |
|
54 | Marc F. Witteman, Jasper G. J. van Woudenberg, Federico Menarini |
Defeating RSA Multiply-Always and Message Blinding Countermeasures. |
CT-RSA |
2011 |
DBLP DOI BibTeX RDF |
|
54 | Nigel P. Smart |
Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries. |
CT-RSA |
2010 |
DBLP DOI BibTeX RDF |
|
54 | Subhamoy Maitra, Santanu Sarkar 0001 |
Efficient CRT-RSA Decryption for Small Encryption Exponents. |
CT-RSA |
2010 |
DBLP DOI BibTeX RDF |
|
54 | Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won |
Efficient Password-Authenticated Key Exchange Based on RSA. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Mihir Bellare, Gregory Neven |
Identity-Based Multi-signatures from RSA. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Michael J. Beller, Yacov Yacobi |
Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
49 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
49 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese, Nicola Mazzocca |
FPGA-Based Implementation of a Serial RSA Processor. |
DATE |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Permanent Fault Attack on the Parameters of RSA with CRT. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
49 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Attacking Unbalanced RSA-CRT Using SPA. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Benny Chor, Oded Goldreich 0001 |
RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
49 | Oded Goldreich 0001 |
On the Number of Close-and-Equal Pairs of Bits in a String. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
the RSA Scheme, Bit Security, Combinatorial Bounds, Bit-String Properties, Cryptography, Public Key Cryptosystems, Combinatorial Analysis |
49 | David Galindo |
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
non-interactive proofs, standard model, public key encryption, identity-based encryption |
49 | Anna Lisa Ferrara, Matthew Green 0001, Susan Hohenberger, Michael Østergaard Pedersen |
Practical Short Signature Batch Verification. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Manoj Prabhakaran 0001, Rui Xue 0001 |
Statistically Hiding Sets. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
privacy, authenticated key exchange, secret handshakes |
49 | Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang |
A Practical Optimal Padding for Signature Schemes. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Michel Abdalla, Chanathip Namprempre, Gregory Neven |
On the (Im)possibility of Blind Message Authentication Codes. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
blind MACs, provable security, blind signatures |
49 | Huafei Zhu, Feng Bao 0001 |
Stand-Alone and Setup-Free Verifiably Committed Signatures. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
Off-line fair-exchange, Setup-free, Stand-alone property, Verifiably committed signature |
49 | Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai |
A "Medium-Field" Multivariate Public-Key Encryption Scheme. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Michael Scott |
Computing the Tate Pairing. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Elliptic curves, pairing-based cryptosystems |
49 | Markus Jakobsson, Ari Juels, Phong Q. Nguyen |
Proprietary Certificates. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
collateral key, digital rights, fair encryption, proprietary key, certificates |
49 | Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen |
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption |
49 | Marc Fischlin, Roger Fischlin |
The Representation Problem Based on Factoring. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai |
Cryptanalysis of RSA for a special case with d > e. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, LLL algorithm, lattice basis reduction |
48 | Aleksey Koval, Boris S. Verkhovsky |
Analysis of RSA over Gaussian Integers Algorithm. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Gaussian Integers, Gaussian primes, Cryptography, RSA |
48 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
48 | Noboru Kunihiro, Kaoru Kurosawa |
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
RSA, factoring, LLL algorithm |
48 | Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern |
Index Calculation Attacks on RSA Signature and Encryption. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
cryptanalsis, Index Calculation, ISO 9796, RSA, smoothness, signature, forgery |
48 | Christophe Giraud 0001 |
An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Smart cards, RSA, fault injection, public-key cryptosystems, exponentiation, simple power analysis, side channel |
48 | Guilin Wang |
An abuse-free fair contract signing protocol based on the RSA signature. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
security, e-commerce, digital signatures, RSA, cryptographic protocols, fair-exchange, contract signing |
48 | ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon |
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Smart card, RSA, Side channel attack, DPA, CRT, Fault attack |
48 | Alexander May 0001 |
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
Coppersmiths method, RSA |
48 | Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert |
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack |
48 | James Manger |
A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
PKCS, RSA, chosen ciphertext attack, OAEP |
48 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk |
RSA-Based Fail-Stop Signature Schemes. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Fail-Stop Signature Schemes, Proof of Forgery, RSA |
48 | Daniel Bleichenbacher |
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
PKCS, RSA, SSL, chosen ciphertext attack |
48 | Jean-François Misarsky |
A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Multiplicative attack, redundancy, RSA, LLL algorithm |
48 | Dan Boneh, Matthew K. Franklin |
Efficient Generation of Shared RSA Keys (Extended Abstract). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
RSA, Threshold Cryptography, Multiparty computation, Primality testing |
48 | Paul C. Kocher |
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, DSS, RSA, Timing attack, Diffie-Hellman |
48 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
47 | Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern |
RSA-OAEP Is Secure under the RSA Assumption. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
47 | Marc Gysin, Jennifer Seberry |
Generalised Cycling Attacks on RSA and Strong RSA Primes. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
47 | Don Coppersmith |
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. |
J. Cryptol. |
1997 |
DBLP DOI BibTeX RDF |
RSA, RSA, Polynomial, Polynomial, Factoring, Factoring, Key words |
47 | Benoît Chevallier-Mames, Marc Joye |
Chosen-Ciphertext Secure RSA-Type Cryptosystems. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
RSA-based encryption schemes, instance-independence assumptions, one-time mappable chameleon hashing, standard model, public-key encryption, Chosen-ciphertext security |
47 | Hossein Ghodosi, Josef Pieprzyk |
An Ideal and Robust Threshold RSA. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Threshold RSA, Robust Systems, Ideal Secret Sharing Schemes |
47 | Chenghuai Lu, André L. M. dos Santos, Francisco R. Pimentel |
Implementation of fast RSA key generation on smart cards. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
RSA key generation, prime finding, smart card, coprocessor |
47 | Johannes Blömer, Alexander May 0001 |
Low Secret Exponent RSA Revisited. |
CaLC |
2001 |
DBLP DOI BibTeX RDF |
Low secret exponent RSA, Coppersmith's method, cryptanalysis, lattice reduction |
47 | Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache |
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
fixed-pattern padding, affine redundancy, RSA signatures |
47 | Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura |
Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
RSA cryptography, residue number systems, Montgomery multiplication, modular exponentiation |
47 | Brian King |
Improved Methods to Perform Threshold RSA. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
threshold RSA, threshold cryptography, threshold secret sharing, cyclotomic polynomials |
43 | Gang Huang 0001, Hong Mei 0001, Qianxiang Wang |
Towards software architecture at runtime. |
ACM SIGSOFT Softw. Eng. Notes |
2003 |
DBLP DOI BibTeX RDF |
runtime software architecture, software architecture, software maintenance, reflection |
42 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
42 | Divesh Aggarwal, Ueli M. Maurer |
Breaking RSA Generically Is Equivalent to Factoring. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Nadia Heninger, Hovav Shacham |
Reconstructing RSA Private Keys from Random Key Bits. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Susan Hohenberger, Brent Waters |
Short and Stateless Signatures from the RSA Assumption. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh |
Systematic design of high-radix Montgomery multipliers for RSA processors. |
ICCD |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon |
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis |
42 | Jonathan Katz |
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). |
SIGACT News |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Ping Li 0034, Yaping Lin |
A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz |
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Ciaran McIvor, Máire McLoone, John V. McCanny |
A high-speed, low latency RSA decryption silicon core. |
ISCAS (4) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Duncan S. Wong, Agnes Hui Chan, Feng Zhu |
More Efficient Password Authenticated Key Exchange Based on RSA. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Johannes Blömer, Alexander May 0001 |
New Partial Key Exposure Attacks on RSA. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Fu-Chi Chang, Chia-Jiu Wang |
Architectural tradeoff in implementing RSA processors. |
SIGARCH Comput. Archit. News |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
42 | Gene Tsudik |
Weak Forward Security in Mediated RSA. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
Universal Padding Schemes for RSA. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Probabilistic Signature Scheme, Provable Security |
42 | Vlastimil Klíma, Tomás Rosa |
Further Results and Considerations on Side Channel Attacks on RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Yair Frankel, Philip D. MacKenzie, Moti Yung |
Adaptive Security for the Additive-Sharing Based Proactive RSA. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Arjen K. Lenstra |
Generating RSA Moduli with a Predetermined Portion. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Roger Fischlin, Claus-Peter Schnorr |
Stronger Security Proofs for RSA and Rabin Bits. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
42 | Mihir Bellare, Phillip Rogaway |
The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
42 | Kenji Koyama |
Fast RSA-type Schemes Based on Singular Cubic Curves y2+axy=m³(mod n). |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
42 | Mark Shand, Jean Vuillemin |
Fast implementations of RSA cryptography. |
IEEE Symposium on Computer Arithmetic |
1993 |
DBLP DOI BibTeX RDF |
|
42 | Ueli M. Maurer |
Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
42 | Holger Sedlak |
The RSA Cryptography Processor. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
42 | Wiebren de Jonge, David Chaum |
Some Variations on RSA Signatures and Their Security. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
41 | Kaoru Kurosawa, Katja Schmidt-Samoa |
New Online/Offline Signature Schemes Without Random Oracles. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption |
41 | Toru Nakanishi 0001, Yuji Sugiyama |
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Membership revocation, Zero-knowledge proof of integer relations, Strong RSA assumption, Group signature scheme |
41 | Elisabeth Oswald (eds.) |
Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Parhat Abla |
Identity-Based Encryption from LWE with More Compact Master Public Key. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Marc Joye |
TFHE Public-Key Encryption Revisited. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Michele Battagliola, Giacomo Borin, Alessio Meneghetti, Edoardo Persichetti |
Cutting the GRASS: Threshold GRoup Action Signature Schemes. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov |
SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Jiali Shi, Guoqiang Liu, Chao Li, Yingxin Li |
Automated-Based Rebound Attacks on ACE Permutation. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer |
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Cécile Delerablée, Lénaïck Gouriou, David Pointcheval |
Attribute-Based Signatures with Advanced Delegation, and Tracing. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Yingfei Yan, Yongjun Zhao 0001, Wen Gao, Baocang Wang |
Lattice-Based Threshold, Accountable, and Private Signature. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Loïc Ferreira |
Computational Security Analysis of the Full EDHOC Protocol. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 |
The Exact Multi-user Security of 2-Key Triple DES. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Islam Faisal |
Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Olivier Blazy, Sayantan Mukherjee |
A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Yusuke Naito 0001 |
The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Tabitha Ogilvie |
Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption. |
CT-RSA |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 3211 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|