The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
34Aggelos Kiayias, Moti Yung Polynomial Reconstruction Based Cryptography. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Feng Bao 0001, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu 0001 Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Emmanuel Bresson, Jacques Stern Efficient Revocation in Group Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Tatsuaki Okamoto, David Pointcheval The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Miodrag J. Mihaljevic, Yuliang Zheng 0001, Hideki Imai A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Jean-François Misarsky How (not) to Design RSA Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Mark Vandenwauver, Frank Jorissen Securing Internet Electronic Mail. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
33Jeff King, André L. M. dos Santos A User-Friendly Approach to Human Authentication of Messages. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Human Cryptography, Authentication
33Adam L. Young, Moti Yung A Space Efficient Backdoor in RSA and Its Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP
33Juan A. Garay, Carl Pomerance Timed Fair Exchange of Standard Signatures: [Extended Abstract]. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Timed-release cryptography, timed commitments, blind signatures, contract signing
33Francesco Sica 0001, Mathieu Ciet, Jean-Jacques Quisquater Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fast performance, efficiently-computable endomorphisms, Elliptic curve cryptography, algebraic number fields
33Daniel R. L. Brown, Robert P. Gallant, Scott A. Vanstone Provably Secure Implicit Certificate Schemes. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF Implicit certificate, postal payment, authentication, provable security, elliptic curve cryptography
33Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson Dynamic Multi-threshold Metering Schemes. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Metering Schemes, Security, Cryptography, Entropy
33Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF non-maximal imaginary quadratic order, non-interactive cryptography, discrete logarithm, identity based cryptosystem
33Yacov Yacobi Risk Management for E-Cash Systems with Partial Real-Time Audit. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF randomized-audit, Cryptography, risk-management, e-cash, economy
33Giuseppe Ateniese, Gene Tsudik Some Open Issues and New Directions in Group Signatures. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Multi-Group Signatures, Sub-Group Signatures, Coalition Attacks, Digital Signatures, Public-key Cryptography, Group Signatures, Revocation
33Yuliang Zheng 0001, Xian-Mo Zhang Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Cryptography, Boolean Function, Nonlinearity, Propagation
33Xian-Mo Zhang, Yuliang Zheng 0001 The Nonhomomorphicity of Boolean Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Nonhomomorphicity, Nonlinear Characteristics, Cryptography, Boolean Functions
33Chris Peikert Some Recent Progress in Lattice-Based Cryptography. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Jonathan Katz Bridging Game Theory and Cryptography: Recent Results and Future Directions. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung Threshold and Proactive Pseudo-Random Permutations. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography
32Friedrich L. Bauer Cryptology - Methods and Maxims. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF cipher systems, computational complexity.Computing Reviews Classification: D.3, cryptography, cryptanalysis, encryption, Cryptology
32Karl Rubin, Alice Silverberg Using Abelian Varieties to Improve Pairing-Based Cryptography. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Abelian varieties, Compression, Elliptic curve cryptography, Elliptic curves, Pairing-based cryptography
32Sandeep S. Kumar, Thomas J. Wollinger, Christof Paar Optimum Digit Serial GF(2^m) Multipliers for Curve-Based Cryptography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF least significant digit multiplier, elliptic/hyperelliptic curve cryptography, public key cryptography, digit serial multiplier, Bit serial multiplier
32Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Yadollah Eslami, Ali Sheikholeslami, P. Glenn Gulak, Shoichi Masui, Kenji Mukaida An area-efficient universal cryptography processor for smart cards. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Pim Tuyls Grey-Box Cryptography: Physical Unclonable Functions. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie Integration of Quantum Cryptography in 802.11 Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Miljan Vuletic, Laura Pozzi, Paolo Ienne Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther, Rajkumar Buyya GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya Cellular Programming and Symmetric Key Cryptography Systems. Search on Bibsonomy GECCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Junhyung Um, Sangwoo Lee, Youngsoo Park, Sungik Jun, Taewhan Kim An efficient inverse multiplier/divider architecture for cryptography systems. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. Search on Bibsonomy ICNP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32David F. J. George, Susan E. George Cellular Automata Cryptography Using Reconfigurable Computing. Search on Bibsonomy IEA/AIE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Gerald Gilbert, Michael Hamrick Secrecy, Computational Loads and Rates in Practical Quantum Cryptography. Search on Bibsonomy Algorithmica The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
32Louis Salvail The Search for the Holy Grail in Quantum Cryptography. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
32Paul D. Townsend Quantum Cryptography on Optical Fiber Networks. Search on Bibsonomy Euro-Par The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
31Naya Nagy, Marius Nagy, Selim G. Akl Quantum Wireless Sensor Networks. Search on Bibsonomy UC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quantum teleportation, entanglement swapping, wireless sensor networks, quantum cryptography
31Isabelle Déchène Arithmetic of Generalized Jacobians. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF generalized Jacobians, semi-abelian varieties, Public-key cryptography, elliptic curves, discrete logarithm problem
31Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 An Identity-Based Grid Security Infrastructure Model. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Identity Cryptography, Public Key Infrastructure, Security Group Communication
31Saurabh Ganeriwal, Mani B. Srivastava Reputation-based framework for high integrity sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF bayesian formulation, security, sensor networks, cryptography, trust, framework, reputation
30Peter Bogetoft, Ivan Damgård, Thomas P. Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Yair Frankel, Moti Yung Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
30Alfred Menezes Supersingular Elliptic Curves in Cryptography. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Richard Walton Uses and Abuses of Cryptography (Invited Paper). Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Svetla Nikova, Ventzislav Nikov Some Applications of Bounds for Designs to the Cryptography. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
29Conrado Porto Lopes Gouvêa, Julio César López-Hernández Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, pairing based cryptography, software implementation
29Piotr Szczechowiak, Anton Kargl, Michael Scott, Martin Collier On the application of pairing based cryptography to wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, implementation, security protocols, pairing-based cryptography
29An Liu, Peng Ning TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TinyECC, ECC, public key cryptography, Wireless sensor network security
29Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad hoc network, network security, key management, certificateless public key cryptography
29Carmen Pellicer-Lostao, Ricardo López-Ruiz Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pseudorandom Bit Generation, Chaotic Cryptography, Security Engineering
29Chao-Wen Chan, Chih-Hao Lin A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secret sharing, key agreement, payment, visual cryptography
29Sining Liu, Brian King, Wei Wang 0003 Hardware Organization to Achieve High-Speed Elliptic Curve Cryptography for Mobile Devices. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptographic hardware organization, elliptic curve cryptography, lookup table
29Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati A data outsourcing architecture combining cryptography and access control. Search on Bibsonomy CSAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF outsourced architecture, access control, cryptography
29Vincent Danjean, Roland Gillard, Serge Guelton, Jean-Louis Roch, Thomas Roche Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography. Search on Bibsonomy PASCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel STL, workstealing, grid computation, symmetric cryptography, adaptive parallelism
29Dan Page, Frederik Vercauteren A Fault Attack on Pairing-Based Cryptography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, identity based encryption, fault attack, Tate pairing
29Selçuk Baktir, Berk Sunar Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, DFT, Finite field multiplication
29Candelaria Hernández-Goya, Amparo Fúster-Sabater Deterministic Analysis of Balancedness in Symmetric Cryptography. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bit-string algorithm, cryptography, Confidentiality, balancedness
29Konstantinos Chalkias, George Stephanides Timed Release Cryptography from Bilinear Pairings Using Hash Chains. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Timed-Release Cryptography, S/Key, bilinear pairings, hash chains, sealed-bid auctions
29Amparo Fúster-Sabater, Pino Caballero-Gil A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bit-string algorithm, cryptography, stream cipher, Confidentiality
29Chip Elliott Quantum Cryptography. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptography, public key, optical, quantum, eavesdrop
29Benoît Libert, Jean-Jacques Quisquater What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF PKIs, pairings, identity based cryptography
29Jun-Cheol Jeon, Kee-Young Yoo An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. Search on Bibsonomy PRICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Evolutionary Computation, Cellular Automata, Finite Fields, Elliptic Curve Cryptography, Multiplication, Irreducible Polynomial
29Quang Viet Duong, Kaoru Kurosawa Almost Ideal Contrast Visual Cryptography with Reversing. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ideal contrast, perfect black, Visual cryptography
29Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF finite field, elliptic curve cryptography, Massey-Omura multiplier, Gaussian normal basis, critical path delay
29Jörg Rothe Some facets of complexity theory and cryptography: A five-lecture tutorial. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF public-key cryptography, Complexity theory, one-way functions, interactive proof systems, zero-knowledge protocols
29Dewi Utami, Hadi Suwastio, Bambang Sumadjudin FPGA Implementation of Digital Chaotic Cryptography. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF digital filter overflow, FPGA, cryptography, Chaos, fixed point
29Harald Baier Efficient Computation of Singular Moduli with Application in Cryptography. Search on Bibsonomy FCT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF class group, modular function, ring class polynomial, singular modulus, cryptography, elliptic curve, Fourier series, complex multiplication
29Harald Baier Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptography, elliptic curve, complex multiplication, Optimal Extension Field
29Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Weil descent, fast performance, Finite fields, elliptic curve cryptography
29Stefan Droste New Results on Visual Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography
29Tzonelih Hwang Cryptosystem for Group Oriented Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Diffie-Hellman Key Distribution Scheme, Chinese Remainder Theorem, Threshold Scheme, Lagrange Interpolating Polynomial, Group Oriented Cryptography
29Shundong Li, Daoshun Wang, Yiqi Dai Symmetric cryptographic protocols for extended millionaires' problem. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF extended millionaires’ problem, simulation paradigm, cryptography, secure multiparty computation, symmetric cryptography
29Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC)
29Seok-Lae Lee, Bo-Sung Hwang, Joo-Seok Song A Secure Communication Scheme for Mobile Wireless Sensor Networks Using Hamming Distance. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sensor Network, Public-Key Cryptography, Hamming Distance, Symmetric cryptography
29Raphael Overbeck Statistical Decoding Revisited. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF general decoding, public key cryptography, coding theory, McEliece Cryptosystem, code based cryptography
29Raphael Overbeck A New Structural Attack for GPT and Variants. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rank distance codes, Gabidulin codes, public key cryptography, code based cryptography
29IkSu Park, Seung Bae Park, ByeongKyun Oh User Authentication Protocol Based on Human Memorable Password and Using RSA. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication
29IkSu Park, Seung Bae Park, ByeongKyun Oh User Authentication Protocol Based on Human Memorable Password and Using RSA. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Password Dictionary, Authentication, Cryptography, public key cryptography, Password authentication
29Rana Barua, Ratna Dutta, Palash Sarkar 0001 Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF group key agreement, ID based cryptography, pairing based cryptography, authenticated key agreement
29Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Incremental Cryptography, Cryptography, Hash Function
29Michel Abdalla, Sara K. Miner, Chanathip Namprempre Forward-Secure Threshold Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF proactive cryptography, forward security, threshold cryptography, signature schemes
29Ayesha Naureen, Attiya Akram, Tariq Maqsood, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Zhong Xu, Xue Liu 0001, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29David Galindo, Paz Morillo, Carla Ràfols Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption
29Hyungjick Lee, Jim Alves-Foss, Scott Harrison The Use of Encrypted Functions for Mobile Agent Security. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Adam L. Young, Moti Yung Cryptovirology: Extortion-Based Security Threats and Countermeasures. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
28Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu 0008, Mehdi Tibouchi, Masayuki Abe Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone Improved Cryptanalysis of HFERP. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang 0002, Yu Yu 0001, Kaiyi Zhang 0001 sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Shuichi Katsumata, Yi-Fu Lai, Michael Reichle Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Anja Lehmann, Cavit Özbay Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong 0001, Jie Chen 0021 Registered Attribute-Based Signature. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Haruhisa Kosuge, Keita Xagawa Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 18658 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license