|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1345 occurrences of 497 keywords
|
|
|
Results
Found 2597 publication records. Showing 2597 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Kyu B. Doh, Kyeongwha Kim, Jungho Ohn, Ting-C. Poon |
Information Security Based on Fourier Plane Random Phase Coding and Optical Scanning. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ascensión Hernández Encinas, Ángel Martín del Rey, Gerardo Rodríguez Sánchez |
Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata. |
KES |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Kouichi Sakurai, Tsuyoshi Takagi |
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Thomas Hardjono, Jennifer Seberry |
Authentication via Multi-Service Tickets in the Kuperee Server. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
31 | Birgit Pfitzmann, Andreas Pfitzmann |
How to Break the Direct RSA-Implementation of Mixes. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
29 | Jintai Ding, Dieter Schmidt, Fabian Werner |
Algebraic Attack on HFE Revisited. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Gröbner basis, multivariate public key cryptosystem, HFE |
29 | Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, Zhihui Zhang |
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Internally Perturbed Plus, Encryption Scheme, Quadratic Polynomial, Multivariate Public Key Cryptosystem |
29 | Anja Korsten |
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
MOR cryptosystem, inner automorphism problem, public key cryptography, discrete logarithm problem, non-abelian group |
29 | Woei-Jiunn Tsaur, Haw-Tyng Pai |
A new security scheme for on-demand source routing in mobile ad hoc networks. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
mobile ad hoc networks, information security, cryptosystem, routing security |
29 | Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner |
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
29 | Helger Lipmaa |
An Oblivious Transfer Protocol with Log-Squared Communication. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer |
29 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
XTR cryptosystem, Gauss period, cubic residue, normal basis, roots of unity |
29 | Katsuyuki Okeya, Tsuyoshi Takagi |
A More Flexible Countermeasure against Side Channel Attacks Using Window Method. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint |
29 | Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai |
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem |
29 | Ingrid Biehl, Bernd Meyer 0002, Volker Müller 0001 |
Differential Fault Attacks on Elliptic Curve Cryptosystems. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
differential fault attack, elliptic curve cryptosystem |
29 | Masayuki Abe |
Robust Distributed Multiplicaton with out Interaction. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
Distributed Multiplication, Cramer-Shoup Cryptosystem, Multi-Party Computation, Round Complexity |
29 | Adam L. Young, Moti Yung |
Finding Length-3 Positive Cunningham Chains. |
ANTS |
1998 |
DBLP DOI BibTeX RDF |
Cunningham Chains, Auto-Recoverable and Auto-Certifiable Cryptosystem, ElGamal system, Public-Key Cryptosystems, Primality testing |
29 | Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam |
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
cryptanalysis, public key cryptosystem, finite automaton |
29 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is the Data Encryption Standard a Group? (Preliminary Abstract). |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox |
29 | G. R. Blakley |
Information Theory Without the Finiteness Assumption, II: Unfolding the DES. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
Caesar cipher, codomain, polyalphabet, ramp scheme, toroidal matrix, distributivity, composite, product, group, code, continuous, function, position, diffusion, associativity, discrete, message, relation, DES, ring, arithmetic, domain, matrix, galois field, substitution, symbol, commutativity, cryptosystem, replacement, field, vector space, universal algebra, threshold scheme, transposition, symmetric group, confusion, sum, cyclic group, alphabet |
28 | Baocang Wang, Hui Liu, Yupu Hu |
Cryptanalysis of a Knapsack Public Key Cryptosystem. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Amir Khatib Zadeh, Catherine H. Gebotys |
Side channel aware leakage management in nanoscale Cryptosystem-on-Chip (CoC). |
ISQED |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Ernst M. Gabidulin |
Attacks and counter-attacks on the GPT public key cryptosystem. |
Des. Codes Cryptogr. |
2008 |
DBLP DOI BibTeX RDF |
AMS Classifications 11T71, 14G50 |
28 | Jin-mei Liu, Shuisheng Qiu, Fei Xiang, Huijuan Xiao |
A Cryptosystem Based on Multiple Chaotic Maps. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
Cyptosystem, multiple chaotic maps, encryption, chaos |
28 | MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin |
Symmetric-key cryptosystem with DNA technology. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
symmetric-key encryption, DNA cryptography, DNA computing |
28 | Xin Ge, Fenlin Liu, Lu Bin, Wang Ping |
Analysis of Baptista-Type Chaotic Cryptosystem. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Zehui Wang, Zhiguo Zhang |
XTR + : A Provable Security Public Key Cryptosystem. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
Public key system, Trace function, IND-CCA2, Provable security, Blind signature, XTR |
28 | Yukio Itakura, Shigeo Tsujii |
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification |
28 | Shengqi Yang, Wayne H. Wolf, Narayanan Vijaykrishnan, Dimitrios N. Serpanos, Yuan Xie 0001 |
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Raphael Overbeck |
Extending Gibson's Attacks on the GPT Cryptosystem. |
WCC |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Heiko Stamer |
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems |
28 | Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen |
An Efficient Decryption Method for RSA Cryptosystem. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Aaram Yun, Jaeheon Kim, Dong Hoon Lee 0002 |
Cryptanalysis of a Divisor Class Group Based Public-Key Cryptosystem. |
ANTS |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Jintai Ding |
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
open-key, perturbation, multivariable, quadratic polynomials |
28 | Thierry P. Berger, Pierre Loidreau |
Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Jin-Hua Hong, Cheng-Wen Wu |
Cellular-array modular multiplier for fast RSA public-key cryptosystem based on modified Booth's algorithm. |
IEEE Trans. Very Large Scale Integr. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Albert Levi, Erkay Savas |
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Philip D. MacKenzie |
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
28 | George Petrides |
Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri |
Cryptosystem Designed for Embedded System Security. |
VLSI Design |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Kouichi Sakurai, Tsuyoshi Takagi |
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack |
28 | GuoJie Hu, ZhengJin Feng, Lin Wang |
Analysis of a type of digital chaotic cryptosystem. |
ISCAS (3) |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen |
Paillier's cryptosystem revisited. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Kenneth J. Giuliani, Guang Gong |
Generating Large Instances of the Gong-Harn Cryptosystem. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Shahrokh Saeednia, Hossein Ghodosi |
A Self-Certified Group-Oriented Cryptosystem Without a Combiner. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Jyh-Huei Guo, Chin-Liang Wang, Hung-Chih Hu |
Design and implementation of an RSA public-key cryptosystem. |
ISCAS (1) |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Octavio A. González, Gunhee Han, José Pineda de Gyvez, Edgar Sánchez-Sinencio |
CMOS cryptosystem using a Lorenz chaotic oscillator. |
ISCAS (5) |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Phong Q. Nguyen, Jacques Stern |
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman |
NTRU: A Ring-Based Public Key Cryptosystem. |
ANTS |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Meng Yuan Huang |
Investigation of the efficiency of the elliptic curve cryptosystem for multi-applications smart card. |
KES (1) |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Ronald Cramer, Victor Shoup |
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Bleichenbacher |
On the Security of the KMOV Public Key Cryptosystem. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
28 | Feng Bao 0004, Yoshihide Igarashi |
Break Finite Automata Public Key Cryptosystem. |
ICALP |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Antoine Joux, Jacques Stern |
Cryptanalysis of Another Knapsack Cryptosystem. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
28 | Eli Biham |
Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
28 | Walter J. Jaburek |
A Generalization of El Gamal's Public Key Cryptosystem. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
28 | George I. Davida, Gilbert G. Walter |
A Public Key Analog Cryptosystem. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
28 | J. C. Lagarias 0001 |
Performance Analysis of Shamir's Attack on the Basic Merkle-Hellman Knapsack Cryptosystem. |
ICALP |
1984 |
DBLP DOI BibTeX RDF |
|
28 | R. M. F. Goodman, Anthony J. McAuley |
A New Trapdoor Knapsack Public-Key Cryptosystem. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
cryptography, codes, knapsack problem, public key, ciphers |
28 | A. Ecker |
Finite Semigroups and the RSA-Cryptosystem. |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
|
27 | Thomas Plantard, Willy Susilo |
Broadcast Attacks against Lattice-Based Cryptosystems. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Broadcast attack, lattice-based cryptosystem, knapsack cryptosystem, intersecting lattice |
27 | Thomas J. Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, Çetin Kaya Koç |
Elliptic and hyperelliptic curves on embedded µP. |
ACM Trans. Embed. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
implementation, Elliptic curves cryptosystem, hyperelliptic curve cryptosystem |
27 | Nicolas Sendrier |
On the Concatenated Structure of a Linear Code. |
Appl. Algebra Eng. Commun. Comput. |
1998 |
DBLP DOI BibTeX RDF |
Code equivalence, Niederreiter cryptosystem, McEliece cryptosystem, Concatenated codes |
26 | Wolfgang Lempken, Tran van Trung, Spyros S. Magliveras, Wandi Wei |
A Public Key Cryptosystem Based on Non-abelian Finite Groups. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Logarithmic signature, Uniform cover, Trapdoor one-way function, Suzuki 2-group, Public-key cryptosystem |
26 | Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen |
A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
Cash payment system, Elliptic curve cryptosystem, Blind signature, Electronic voting system |
26 | Eun-Jun Yoon, Kee-Young Yoo |
Robust Broadcasting Cryptosystem in Computer Networks. |
GPC Workshops |
2009 |
DBLP DOI BibTeX RDF |
Broadcasting cryptosystem, Cryptography, Cryptanalysis, Information security, Key management |
26 | B. Prasanalakshmi, A. Kannammal |
A secure cryptosystem from palm vein biometrics. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
irrevocable key, palm vein, cryptosystem, minutiae, cancelable biometrics |
26 | Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
matrix semigroup action, DDH problem, public key cryptosystem, semantically secure |
26 | Chung-Ping Young, Chung-Chu Chia, Liang-Bi Chen, Ing-Jer Huang |
NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable Cryptosystem. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
multiple cipher, scheduling algorithm, Cryptosystem, operation mode, crypto-coprocessor |
26 | Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo |
A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystem, Threshold Cryptography, Subliminal Channel |
26 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
26 | Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins, William P. Marnane |
An Embedded Processor for a Pairing-Based Cryptosystem. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
ç pairing, genus 2 hyperelliptic, characteristic 2, pairing-based cryptosystem, dedicated processor |
26 | Juan Manuel González Nieto, Colin Boyd, Ed Dawson |
A Public Key Cryptosystem Based On A Subgroup Membership Problem. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, provable security, public key cryptosystem |
26 | Chi-Sung Laih, Min-Jea Gau |
Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. |
IEEE Trans. Computers |
1997 |
DBLP DOI BibTeX RDF |
knapsack cryptosystem, cryptography, cryptanalysis, Public keys |
25 | Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji 0001 |
Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem. |
Int. J. Inf. Secur. Priv. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Kadijeh Bagheri, Mohammad-Reza Sadeghi 0001 |
A new non-associative cryptosystem based on NTOW public key cryptosystem and octonions algebra. |
ACM Commun. Comput. Algebra |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Yasuyuki Murakami, Masao Kasahara |
Hybrid inter-organization cryptosystem using ElGamal cryptosystem. |
ICCE-TW |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Tatsuki Miyamoto, Yasuyuki Murakami |
An implementation of inter-organization cryptosystem based on RSA cryptosystem. |
ICCE-TW |
2015 |
DBLP DOI BibTeX RDF |
|
25 | |
The El-Gamal AA_β Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem |
CoRR |
2010 |
DBLP BibTeX RDF |
|
25 | A. John Prakash, V. Rhymend Uthariaraj |
Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Dynamic Key Revocation, Cryptography, Key Management, Multicast Security |
25 | Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee |
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem. |
Informatica |
2007 |
DBLP BibTeX RDF |
|
25 | Marc Joye, Jean-Jacques Quisquater |
Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. |
Des. Codes Cryptogr. |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Andrej Dujella |
A variant of Wiener's attack on RSA. |
Computing |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) Primary: 94A60, Secondary: 11A55, 11J70 |
24 | Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta |
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security |
24 | Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga |
A public key algorithm for optical communication based on lattice cryptography. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Zhi Guan, Huiping Sun, Zhong Chen 0001, Xianghao Nan |
Efficient Identity-Based Key Issue with TPM. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta |
Leaky Random Oracle (Extended Abstract). |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
hash list, provable security, leakage, standard model, random oracle model |
24 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
24 | Matthieu Finiasz, Serge Vaudenay |
When Stream Cipher Analysis Meets Public-Key Cryptography. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Qianhong Wu, Yi Mu 0001, Willy Susilo, Fangguo Zhang |
Privately Retrieve Data from Large Databases. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Tomoyuki Asano, Kazuya Kamio |
A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Shuanghe Peng, Zhen Han |
Proxy Cryptography for Secure Inter-domain Information Exchanges. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
24 | M. Choudary Gorantla, Ashutosh Saxena |
An Efficient Certificateless Signature Scheme. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Dario Catalano, Phong Q. Nguyen, Jacques Stern |
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
Paillier, Hensel, One-wayness, RSA, Lattice, Discrete logarithm, Public-key |
24 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
24 | Victor Shoup |
Using Hash Functions as a Hedge against Chosen Ciphertext Attack. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Detlef Hühnlein |
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Tsuyoshi Takagi |
Fast RSA-Type Cryptosystems Using N-Adic Expansion. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Joost Meijers, Johan van Tilburg |
Extended Majority Voting and Private-Key Algebraic-Code Encryptions. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung |
Systematic Design of Two-Party Authentication Protocols. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 2597 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|