The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RSA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1984 (25) 1985-1986 (23) 1987-1988 (24) 1989 (15) 1990 (18) 1991-1992 (24) 1993-1994 (19) 1995-1996 (37) 1997 (37) 1998 (53) 1999 (63) 2000 (68) 2001 (104) 2002 (115) 2003 (141) 2004 (154) 2005 (192) 2006 (193) 2007 (152) 2008 (171) 2009 (160) 2010 (104) 2011 (83) 2012 (101) 2013 (95) 2014 (99) 2015 (96) 2016 (105) 2017 (99) 2018 (101) 2019 (107) 2020 (105) 2021 (98) 2022 (96) 2023 (94) 2024 (40)
Publication types (Num. hits)
article(917) book(4) data(4) incollection(23) inproceedings(2234) phdthesis(5) proceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2125 occurrences of 681 keywords

Results
Found 3211 publication records. Showing 3211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
54Duc-Phong Le, Matthieu Rivain, Chik How Tan On Double Exponentiation for Securing RSA against Fault Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
54Cyril Arnaud, Pierre-Alain Fouque Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
54Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
54Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. Search on Bibsonomy CT-RSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
54Marc F. Witteman, Jasper G. J. van Woudenberg, Federico Menarini Defeating RSA Multiply-Always and Message Blinding Countermeasures. Search on Bibsonomy CT-RSA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
54Nigel P. Smart Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries. Search on Bibsonomy CT-RSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
54Subhamoy Maitra, Santanu Sarkar 0001 Efficient CRT-RSA Decryption for Small Encryption Exponents. Search on Bibsonomy CT-RSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
54Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won Efficient Password-Authenticated Key Exchange Based on RSA. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
54Mihir Bellare, Gregory Neven Identity-Based Multi-signatures from RSA. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Michael J. Beller, Yacov Yacobi Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
49SeongHan Shin, Kazukuni Kobara, Hideki Imai A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49SeongHan Shin, Kazukuni Kobara, Hideki Imai Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Antonino Mazzeo, Luigi Romano, Giacinto Paolo Saggese, Nicola Mazzocca FPGA-Based Implementation of a Serial RSA Processor. Search on Bibsonomy DATE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Permanent Fault Attack on the Parameters of RSA with CRT. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
49Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard Attacking Unbalanced RSA-CRT Using SPA. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Benny Chor, Oded Goldreich 0001 RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
49Oded Goldreich 0001 On the Number of Close-and-Equal Pairs of Bits in a String. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF the RSA Scheme, Bit Security, Combinatorial Bounds, Bit-String Properties, Cryptography, Public Key Cryptosystems, Combinatorial Analysis
49David Galindo Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-interactive proofs, standard model, public key encryption, identity-based encryption
49Anna Lisa Ferrara, Matthew Green 0001, Susan Hohenberger, Michael Østergaard Pedersen Practical Short Signature Batch Verification. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Manoj Prabhakaran 0001, Rui Xue 0001 Statistically Hiding Sets. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Stanislaw Jarecki, Jihye Kim, Gene Tsudik Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, authenticated key exchange, secret handshakes
49Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang A Practical Optimal Padding for Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Michel Abdalla, Chanathip Namprempre, Gregory Neven On the (Im)possibility of Blind Message Authentication Codes. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF blind MACs, provable security, blind signatures
49Huafei Zhu, Feng Bao 0001 Stand-Alone and Setup-Free Verifiably Committed Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line fair-exchange, Setup-free, Stand-alone property, Verifiably committed signature
49Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai A "Medium-Field" Multivariate Public-Key Encryption Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Michael Scott Computing the Tate Pairing. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Elliptic curves, pairing-based cryptosystems
49Markus Jakobsson, Ari Juels, Phong Q. Nguyen Proprietary Certificates. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF collateral key, digital rights, fair encryption, proprietary key, certificates
49Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen GEM: A Generic Chosen-Ciphertext Secure Encryption Method. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption
49Marc Fischlin, Roger Fischlin The Representation Problem Based on Factoring. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
48Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai Cryptanalysis of RSA for a special case with d > e. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, LLL algorithm, lattice basis reduction
48Aleksey Koval, Boris S. Verkhovsky Analysis of RSA over Gaussian Integers Algorithm. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gaussian Integers, Gaussian primes, Cryptography, RSA
48Adam L. Young, Moti Yung A Timing-Resistant Elliptic Curve Backdoor in RSA. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Twisted elliptic curves, RSA, subliminal channel, kleptography
48Noboru Kunihiro, Kaoru Kurosawa Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, factoring, LLL algorithm
48Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern Index Calculation Attacks on RSA Signature and Encryption. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalsis, Index Calculation, ISO 9796, RSA, smoothness, signature, forgery
48Christophe Giraud 0001 An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards, RSA, fault injection, public-key cryptosystems, exponentiation, simple power analysis, side channel
48Guilin Wang An abuse-free fair contract signing protocol based on the RSA signature. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, e-commerce, digital signatures, RSA, cryptographic protocols, fair-exchange, contract signing
48ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Smart card, RSA, Side channel attack, DPA, CRT, Fault attack
48Alexander May 0001 Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Coppersmiths method, RSA
48Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack
48James Manger A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF PKCS, RSA, chosen ciphertext attack, OAEP
48Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk RSA-Based Fail-Stop Signature Schemes. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Fail-Stop Signature Schemes, Proof of Forgery, RSA
48Daniel Bleichenbacher Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF PKCS, RSA, SSL, chosen ciphertext attack
48Jean-François Misarsky A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Multiplicative attack, redundancy, RSA, LLL algorithm
48Dan Boneh, Matthew K. Franklin Efficient Generation of Shared RSA Keys (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF RSA, Threshold Cryptography, Multiparty computation, Primality testing
48Paul C. Kocher Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptanalysis, DSS, RSA, Timing attack, Diffie-Hellman
48Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
47Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern RSA-OAEP Is Secure under the RSA Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
47Marc Gysin, Jennifer Seberry Generalised Cycling Attacks on RSA and Strong RSA Primes. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
47Don Coppersmith Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities. Search on Bibsonomy J. Cryptol. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF RSA, RSA, Polynomial, Polynomial, Factoring, Factoring, Key words
47Benoît Chevallier-Mames, Marc Joye Chosen-Ciphertext Secure RSA-Type Cryptosystems. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA-based encryption schemes, instance-independence assumptions, one-time mappable chameleon hashing, standard model, public-key encryption, Chosen-ciphertext security
47Hossein Ghodosi, Josef Pieprzyk An Ideal and Robust Threshold RSA. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Threshold RSA, Robust Systems, Ideal Secret Sharing Schemes
47Chenghuai Lu, André L. M. dos Santos, Francisco R. Pimentel Implementation of fast RSA key generation on smart cards. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA key generation, prime finding, smart card, coprocessor
47Johannes Blömer, Alexander May 0001 Low Secret Exponent RSA Revisited. Search on Bibsonomy CaLC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Low secret exponent RSA, Coppersmith's method, cryptanalysis, lattice reduction
47Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fixed-pattern padding, affine redundancy, RSA signatures
47Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF RSA cryptography, residue number systems, Montgomery multiplication, modular exponentiation
47Brian King Improved Methods to Perform Threshold RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF threshold RSA, threshold cryptography, threshold secret sharing, cyclotomic polynomials
43Gang Huang 0001, Hong Mei 0001, Qianxiang Wang Towards software architecture at runtime. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2003 DBLP  DOI  BibTeX  RDF runtime software architecture, software architecture, software maintenance, reflection
42Adam L. Young, Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone
42Divesh Aggarwal, Ueli M. Maurer Breaking RSA Generically Is Equivalent to Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Nadia Heninger, Hovav Shacham Reconstructing RSA Private Keys from Random Key Bits. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Susan Hohenberger, Brent Waters Short and Stateless Signatures from the RSA Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh Systematic design of high-radix Montgomery multipliers for RSA processors. Search on Bibsonomy ICCD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis
42Jonathan Katz Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). Search on Bibsonomy SIGACT News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Ping Li 0034, Yaping Lin A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Ciaran McIvor, Máire McLoone, John V. McCanny A high-speed, low latency RSA decryption silicon core. Search on Bibsonomy ISCAS (4) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Duncan S. Wong, Agnes Hui Chan, Feng Zhu More Efficient Password Authenticated Key Exchange Based on RSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Johannes Blömer, Alexander May 0001 New Partial Key Exposure Attacks on RSA. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Fu-Chi Chang, Chia-Jiu Wang Architectural tradeoff in implementing RSA processors. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
42Gene Tsudik Weak Forward Security in Mediated RSA. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier Universal Padding Schemes for RSA. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Probabilistic Signature Scheme, Provable Security
42Vlastimil Klíma, Tomás Rosa Further Results and Considerations on Side Channel Attacks on RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Yair Frankel, Philip D. MacKenzie, Moti Yung Adaptive Security for the Additive-Sharing Based Proactive RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Arjen K. Lenstra Generating RSA Moduli with a Predetermined Portion. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Roger Fischlin, Claus-Peter Schnorr Stronger Security Proofs for RSA and Rabin Bits. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
42Mihir Bellare, Phillip Rogaway The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
42Kenji Koyama Fast RSA-type Schemes Based on Singular Cubic Curves y2+axy=m³(mod n). Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
42Mark Shand, Jean Vuillemin Fast implementations of RSA cryptography. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
42Ueli M. Maurer Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
42Holger Sedlak The RSA Cryptography Processor. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
42Wiebren de Jonge, David Chaum Some Variations on RSA Signatures and Their Security. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
41Kaoru Kurosawa, Katja Schmidt-Samoa New Online/Offline Signature Schemes Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption
41Toru Nakanishi 0001, Yuji Sugiyama A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Membership revocation, Zero-knowledge proof of integer relations, Strong RSA assumption, Group signature scheme
41Elisabeth Oswald (eds.) Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Parhat Abla Identity-Based Encryption from LWE with More Compact Master Public Key. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Marc Joye TFHE Public-Key Encryption Revisited. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Michele Battagliola, Giacomo Borin, Alessio Meneghetti, Edoardo Persichetti Cutting the GRASS: Threshold GRoup Action Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Jiali Shi, Guoqiang Liu, Chao Li, Yingxin Li Automated-Based Rebound Attacks on ACE Permutation. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Cécile Delerablée, Lénaïck Gouriou, David Pointcheval Attribute-Based Signatures with Advanced Delegation, and Tracing. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Yingfei Yan, Yongjun Zhao 0001, Wen Gao, Baocang Wang Lattice-Based Threshold, Accountable, and Private Signature. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Loïc Ferreira Computational Security Analysis of the Full EDHOC Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 The Exact Multi-user Security of 2-Key Triple DES. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Islam Faisal Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Olivier Blazy, Sayantan Mukherjee A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Yusuke Naito 0001 The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
41Tabitha Ogilvie Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 3211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license