|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Aggelos Kiayias, Moti Yung |
Polynomial Reconstruction Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 129-133, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Feng Bao 0001, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu 0001 |
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 153-164, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Emmanuel Bresson, Jacques Stern |
Efficient Revocation in Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 190-206, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Tatsuaki Okamoto, David Pointcheval |
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 104-118, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Miodrag J. Mihaljevic, Yuliang Zheng 0001, Hideki Imai |
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 217-233, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Jean-François Misarsky |
How (not) to Design RSA Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 14-28, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Mark Vandenwauver, Frank Jorissen |
Securing Internet Electronic Mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
State of the Art in Applied Cryptography ![In: State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures, pp. 208-223, 1997, Springer, 3-540-65474-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
33 | Jeff King, André L. M. dos Santos |
A User-Friendly Approach to Human Authentication of Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 225-239, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Human Cryptography, Authentication |
33 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 128-143, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
33 | Juan A. Garay, Carl Pomerance |
Timed Fair Exchange of Standard Signatures: [Extended Abstract]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 190-207, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Timed-release cryptography, timed commitments, blind signatures, contract signing |
33 | Francesco Sica 0001, Mathieu Ciet, Jean-Jacques Quisquater |
Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 21-36, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
fast performance, efficiently-computable endomorphisms, Elliptic curve cryptography, algebraic number fields |
33 | Daniel R. L. Brown, Robert P. Gallant, Scott A. Vanstone |
Provably Secure Implicit Certificate Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 147-156, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
Implicit certificate, postal payment, authentication, provable security, elliptic curve cryptography |
33 | Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson |
Dynamic Multi-threshold Metering Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 130-143, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Metering Schemes, Security, Cryptography, Entropy |
33 | Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber |
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 275-287, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
non-maximal imaginary quadratic order, non-interactive cryptography, discrete logarithm, identity based cryptosystem |
33 | Yacov Yacobi |
Risk Management for E-Cash Systems with Partial Real-Time Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 62-71, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
randomized-audit, Cryptography, risk-management, e-cash, economy |
33 | Giuseppe Ateniese, Gene Tsudik |
Some Open Issues and New Directions in Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 196-211, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Multi-Group Signatures, Sub-Group Signatures, Coalition Attacks, Digital Signatures, Public-key Cryptography, Group Signatures, Revocation |
33 | Yuliang Zheng 0001, Xian-Mo Zhang |
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, pp. 92-105, 1999, Springer, 3-540-67185-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Boolean Function, Nonlinearity, Propagation |
33 | Xian-Mo Zhang, Yuliang Zheng 0001 |
The Nonhomomorphicity of Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 280-295, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Nonhomomorphicity, Nonlinear Characteristics, Cryptography, Boolean Functions |
33 | Chris Peikert |
Some Recent Progress in Lattice-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 72, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Jonathan Katz |
Bridging Game Theory and Cryptography: Recent Results and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 251-272, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung |
Threshold and Proactive Pseudo-Random Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 542-560, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography |
32 | Friedrich L. Bauer |
Cryptology - Methods and Maxims. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982, pp. 31-48, 1982, Springer. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
cipher systems, computational complexity.Computing Reviews Classification: D.3, cryptography, cryptanalysis, encryption, Cryptology |
32 | Karl Rubin, Alice Silverberg |
Using Abelian Varieties to Improve Pairing-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(3), pp. 330-364, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Abelian varieties, Compression, Elliptic curve cryptography, Elliptic curves, Pairing-based cryptography |
32 | Sandeep S. Kumar, Thomas J. Wollinger, Christof Paar |
Optimum Digit Serial GF(2^m) Multipliers for Curve-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(10), pp. 1306-1311, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
least significant digit multiplier, elliptic/hyperelliptic curve cryptography, public key cryptography, digit serial multiplier, Bit serial multiplier |
32 | Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang |
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 129-144, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Yadollah Eslami, Ali Sheikholeslami, P. Glenn Gulak, Shoichi Masui, Kenji Mukaida |
An area-efficient universal cryptography processor for smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 14(1), pp. 43-56, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Pim Tuyls |
Grey-Box Cryptography: Physical Unclonable Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, pp. 3-5, 2006, Springer, 978-3-540-69172-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie |
Integration of Quantum Cryptography in 802.11 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 116-123, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Miljan Vuletic, Laura Pozzi, Paolo Ienne |
Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 12th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2004), 20-23 April 2004, Napa, CA, USA, Proceedings, pp. 24-33, 2004, IEEE Computer Society, 0-7695-2230-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther, Rajkumar Buyya |
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 872-877, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya |
Cellular Programming and Symmetric Key Cryptography Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation - GECCO 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part II, pp. 1369-1381, 2003, Springer, 3-540-40603-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Junhyung Um, Sangwoo Lee, Youngsoo Park, Sungik Jun, Taewhan Kim |
An efficient inverse multiplier/divider architecture for cryptography systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS 2003, Bangkok, Thailand, May 25-28, 2003, pp. 149-152, 2003, IEEE, 0-7803-7761-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi |
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 11th IEEE International Conference on Network Protocols (ICNP 2003), 4-7 November 2003, Atlanta, GA, USA, pp. 336-, 2003, IEEE Computer Society, 0-7695-2024-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | David F. J. George, Susan E. George |
Cellular Automata Cryptography Using Reconfigurable Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Developments in Applied Artificial Intelligence, 16th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2003, Laughborough, UK, June 23-26, 2003, Proceedings, pp. 104-111, 2003, Springer, 3-540-40455-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Gerald Gilbert, Michael Hamrick |
Secrecy, Computational Loads and Rates in Practical Quantum Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 34(4), pp. 314-339, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Louis Salvail |
The Search for the Holy Grail in Quantum Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Lectures on Data Security ![In: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, pp. 183-216, 1998, Springer, 3-540-65757-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
32 | Paul D. Townsend |
Quantum Cryptography on Optical Fiber Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par '98 Parallel Processing, 4th International Euro-Par Conference, Southampton, UK, September 1-4, 1998, Proceedings, pp. 35-46, 1998, Springer, 3-540-64952-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
31 | Naya Nagy, Marius Nagy, Selim G. Akl |
Quantum Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UC ![In: Unconventional Computing, 7th International Conference, UC 2008, Vienna, Austria, August 25-28, 2008. Proceedings, pp. 177-188, 2008, Springer, 978-3-540-85193-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
quantum teleportation, entanglement swapping, wireless sensor networks, quantum cryptography |
31 | Isabelle Déchène |
Arithmetic of Generalized Jacobians. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: Algorithmic Number Theory, 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings, pp. 421-435, 2006, Springer, 3-540-36075-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
generalized Jacobians, semi-abelian varieties, Public-key cryptography, elliptic curves, discrete logarithm problem |
31 | Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 |
An Identity-Based Grid Security Infrastructure Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 314-325, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Identity Cryptography, Public Key Infrastructure, Security Group Communication |
31 | Saurabh Ganeriwal, Mani B. Srivastava |
Reputation-based framework for high integrity sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 66-77, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
bayesian formulation, security, sensor networks, cryptography, trust, framework, reputation |
30 | Peter Bogetoft, Ivan Damgård, Thomas P. Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft |
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 142-147, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Yair Frankel, Moti Yung |
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 241-252, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Alfred Menezes |
Supersingular Elliptic Curves in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 293, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal |
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 405-420, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Richard Walton |
Uses and Abuses of Cryptography (Invited Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 125-132, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Svetla Nikova, Ventzislav Nikov |
Some Applications of Bounds for Designs to the Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings, pp. 25-34, 1999, Springer, 3-540-66887-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
29 | Conrado Porto Lopes Gouvêa, Julio César López-Hernández |
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 248-262, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, pairing based cryptography, software implementation |
29 | Piotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier |
On the application of pairing based cryptography to wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 1-12, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, implementation, security protocols, pairing-based cryptography |
29 | An Liu, Peng Ning |
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, April 22-24, 2008, pp. 245-256, 2008, IEEE Computer Society, 978-0-7695-3157-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
TinyECC, ECC, public key cryptography, Wireless sensor network security |
29 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings, pp. 116-126, 2008, Springer, 978-3-540-88139-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ad hoc network, network security, key management, certificateless public key cryptography |
29 | Carmen Pellicer-Lostao, Ricardo López-Ruiz |
Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II, pp. 784-796, 2008, Springer, 978-3-540-69840-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pseudorandom Bit Generation, Chaotic Cryptography, Security Engineering |
29 | Chao-Wen Chan, Chih-Hao Lin |
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 467-476, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secret sharing, key agreement, payment, visual cryptography |
29 | Sining Liu, Brian King, Wei Wang 0003 |
Hardware Organization to Achieve High-Speed Elliptic Curve Cryptography for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 12(4), pp. 271-279, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptographic hardware organization, elliptic curve cryptography, lookup table |
29 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
A data outsourcing architecture combining cryptography and access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 63-69, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
outsourced architecture, access control, cryptography |
29 | Vincent Danjean, Roland Gillard, Serge Guelton, Jean-Louis Roch, Thomas Roche |
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASCO ![In: Parallel Symbolic Computation, PASCO 2007, International Workshop, 27-28 July 2007, University of Western Ontario, London, Ontario, Canada, pp. 33-42, 2007, ACM, 978-1-59593-741-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
parallel STL, workstealing, grid computation, symmetric cryptography, adaptive parallelism |
29 | Dan Page, Frederik Vercauteren |
A Fault Attack on Pairing-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(9), pp. 1075-1080, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, identity based encryption, fault attack, Tate pairing |
29 | Selçuk Baktir, Berk Sunar |
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 991-1001, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, DFT, Finite field multiplication |
29 | Candelaria Hernández-Goya, Amparo Fúster-Sabater |
Deterministic Analysis of Balancedness in Symmetric Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 1011-1020, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bit-string algorithm, cryptography, Confidentiality, balancedness |
29 | Konstantinos Chalkias, George Stephanides |
Timed Release Cryptography from Bilinear Pairings Using Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 130-140, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Timed-Release Cryptography, S/Key, bilinear pairings, hash chains, sealed-bid auctions |
29 | Amparo Fúster-Sabater, Pino Caballero-Gil |
A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 719-728, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
bit-string algorithm, cryptography, stream cipher, Confidentiality |
29 | Chip Elliott |
Quantum Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 57-61, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cryptography, public key, optical, quantum, eavesdrop |
29 | Benoît Libert, Jean-Jacques Quisquater |
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 57-70, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PKIs, pairings, identity based cryptography |
29 | Jun-Cheol Jeon, Kee-Young Yoo |
An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2004: Trends in Artificial Intelligence, 8th Pacific Rim International Conference on Artificial Intelligence, Auckland, New Zealand, August 9-13, 2004, Proceedings, pp. 241-250, 2004, Springer, 3-540-22817-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Evolutionary Computation, Cellular Automata, Finite Fields, Elliptic Curve Cryptography, Multiplication, Irreducible Polynomial |
29 | Quang Viet Duong, Kaoru Kurosawa |
Almost Ideal Contrast Visual Cryptography with Reversing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 353-365, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ideal contrast, perfect black, Visual cryptography |
29 | Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong |
Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 76-91, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
finite field, elliptic curve cryptography, Massey-Omura multiplier, Gaussian normal basis, critical path delay |
29 | Jörg Rothe |
Some facets of complexity theory and cryptography: A five-lecture tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 34(4), pp. 504-549, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
public-key cryptography, Complexity theory, one-way functions, interactive proof systems, zero-knowledge protocols |
29 | Dewi Utami, Hadi Suwastio, Bambang Sumadjudin |
FPGA Implementation of Digital Chaotic Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EurAsia-ICT ![In: EurAsia-ICT 2002: Information and Communication Technology, First EurAsian Conference, Shiraz, Iran, October 29-31, 2002, Proceedings, pp. 239-247, 2002, Springer, 3-540-00028-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
digital filter overflow, FPGA, cryptography, Chaos, fixed point |
29 | Harald Baier |
Efficient Computation of Singular Moduli with Application in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCT ![In: Fundamentals of Computation Theory, 13th International Symposium, FCT 2001, Riga, Latvia, August 22-24, 2001, Proceedings, pp. 71-82, 2001, Springer, 3-540-42487-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
class group, modular function, ring class polynomial, singular modulus, cryptography, elliptic curve, Fourier series, complex multiplication |
29 | Harald Baier |
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 99-107, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
cryptography, elliptic curve, complex multiplication, Optimal Extension Field |
29 | Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 |
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 108-116, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Weil descent, fast performance, Finite fields, elliptic curve cryptography |
29 | Stefan Droste |
New Results on Visual Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 401-415, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography |
29 | Tzonelih Hwang |
Cryptosystem for Group Oriented Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 352-360, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
Diffie-Hellman Key Distribution Scheme, Chinese Remainder Theorem, Threshold Scheme, Lagrange Interpolating Polynomial, Group Oriented Cryptography |
29 | Shundong Li, Daoshun Wang, Yiqi Dai |
Symmetric cryptographic protocols for extended millionaires' problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(6), pp. 974-982, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
extended millionaires’ problem, simulation paradigm, cryptography, secure multiparty computation, symmetric cryptography |
29 | Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed |
A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 692-701, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC) |
29 | Seok-Lae Lee, Bo-Sung Hwang, Joo-Seok Song |
A Secure Communication Scheme for Mobile Wireless Sensor Networks Using Hamming Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 900-911, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Sensor Network, Public-Key Cryptography, Hamming Distance, Symmetric cryptography |
29 | Raphael Overbeck |
Statistical Decoding Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 283-294, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
general decoding, public key cryptography, coding theory, McEliece Cryptosystem, code based cryptography |
29 | Raphael Overbeck |
A New Structural Attack for GPT and Variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 50-63, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
rank distance codes, Gabidulin codes, public key cryptography, code based cryptography |
29 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 527-536, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
29 | IkSu Park, Seung Bae Park, ByeongKyun Oh |
User Authentication Protocol Based on Human Memorable Password and Using RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 698-707, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication |
29 | Rana Barua, Ratna Dutta, Palash Sarkar 0001 |
Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 205-217, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
group key agreement, ID based cryptography, pairing based cryptography, authenticated key agreement |
29 | Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah |
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 50-61, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Incremental Cryptography, Cryptography, Hash Function |
29 | Michel Abdalla, Sara K. Miner, Chanathip Namprempre |
Forward-Secure Threshold Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 441-456, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
proactive cryptography, forward security, threshold cryptography, signature schemes |
29 | Ayesha Naureen, Attiya Akram, Tariq Maqsood, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed |
Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 67th IEEE Vehicular Technology Conference, VTC Spring 2008, 11-14 May 2008, Singapore, pp. 163-167, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Zhong Xu, Xue Liu 0001, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu |
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China, pp. 489-494, 2008, IEEE Computer Society, 978-0-7695-3173-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | David Galindo, Paz Morillo, Carla Ràfols |
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 81-91, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption |
29 | Hyungjick Lee, Jim Alves-Foss, Scott Harrison |
The Use of Encrypted Functions for Mobile Agent Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Adam L. Young, Moti Yung |
Cryptovirology: Extortion-Based Security Threats and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 129-140, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
28 | Qiang Tang, Vanessa Teague (eds.) |
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![Springer, 978-3-031-57720-8 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Qiang Tang, Vanessa Teague (eds.) |
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (3) ![Springer, 978-3-031-57724-6 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Qiang Tang, Vanessa Teague (eds.) |
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![Springer, 978-3-031-57721-5 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Qiang Tang, Vanessa Teague (eds.) |
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (4) ![Springer, 978-3-031-57727-7 The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu 0008, Mehdi Tibouchi, Masayuki Abe |
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 387-412, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone |
Improved Cryptanalysis of HFERP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 413-440, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang 0002, Yu Yu 0001, Kaiyi Zhang 0001 |
sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 229-258, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Shuichi Katsumata, Yi-Fu Lai, Michael Reichle |
Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 319-351, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Anja Lehmann, Cavit Özbay |
Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 196-228, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy |
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 163-195, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong 0001, Jie Chen 0021 |
Registered Attribute-Based Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 133-162, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Haruhisa Kosuge, Keita Xagawa |
Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 259-288, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 18658 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|