The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptosystem with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1982 (23) 1983-1984 (18) 1985 (16) 1986-1987 (18) 1988 (17) 1989 (18) 1990 (16) 1991 (29) 1992-1993 (19) 1994 (18) 1995-1996 (22) 1997 (28) 1998 (43) 1999 (38) 2000 (30) 2001 (61) 2002 (60) 2003 (86) 2004 (109) 2005 (150) 2006 (144) 2007 (133) 2008 (128) 2009 (114) 2010 (73) 2011 (84) 2012 (65) 2013 (74) 2014 (67) 2015 (97) 2016 (66) 2017 (70) 2018 (115) 2019 (119) 2020 (112) 2021 (112) 2022 (94) 2023 (87) 2024 (24)
Publication types (Num. hits)
article(1164) incollection(28) inproceedings(1396) phdthesis(9)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1345 occurrences of 497 keywords

Results
Found 2597 publication records. Showing 2597 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Kyu B. Doh, Kyeongwha Kim, Jungho Ohn, Ting-C. Poon Information Security Based on Fourier Plane Random Phase Coding and Optical Scanning. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ascensión Hernández Encinas, Ángel Martín del Rey, Gerardo Rodríguez Sánchez Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Kouichi Sakurai, Tsuyoshi Takagi New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Thomas Hardjono, Jennifer Seberry Authentication via Multi-Service Tickets in the Kuperee Server. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
31Birgit Pfitzmann, Andreas Pfitzmann How to Break the Direct RSA-Implementation of Mixes. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
29Jintai Ding, Dieter Schmidt, Fabian Werner Algebraic Attack on HFE Revisited. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gröbner basis, multivariate public key cryptosystem, HFE
29Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, Zhihui Zhang A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internally Perturbed Plus, Encryption Scheme, Quadratic Polynomial, Multivariate Public Key Cryptosystem
29Anja Korsten Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MOR cryptosystem, inner automorphism problem, public key cryptography, discrete logarithm problem, non-abelian group
29Woei-Jiunn Tsaur, Haw-Tyng Pai A new security scheme for on-demand source routing in mobile ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile ad hoc networks, information security, cryptosystem, routing security
29Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
29Helger Lipmaa An Oblivious Transfer Protocol with Log-Squared Communication. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer
29Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR cryptosystem, Gauss period, cubic residue, normal basis, roots of unity
29Katsuyuki Okeya, Tsuyoshi Takagi A More Flexible Countermeasure against Side Channel Attacks Using Window Method. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint
29Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem
29Ingrid Biehl, Bernd Meyer 0002, Volker Müller 0001 Differential Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF differential fault attack, elliptic curve cryptosystem
29Masayuki Abe Robust Distributed Multiplicaton with out Interaction. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Distributed Multiplication, Cramer-Shoup Cryptosystem, Multi-Party Computation, Round Complexity
29Adam L. Young, Moti Yung Finding Length-3 Positive Cunningham Chains. Search on Bibsonomy ANTS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cunningham Chains, Auto-Recoverable and Auto-Certifiable Cryptosystem, ElGamal system, Public-Key Cryptosystems, Primality testing
29Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cryptanalysis, public key cryptosystem, finite automaton
29Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is the Data Encryption Standard a Group? (Preliminary Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox
29G. R. Blakley Information Theory Without the Finiteness Assumption, II: Unfolding the DES. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF Caesar cipher, codomain, polyalphabet, ramp scheme, toroidal matrix, distributivity, composite, product, group, code, continuous, function, position, diffusion, associativity, discrete, message, relation, DES, ring, arithmetic, domain, matrix, galois field, substitution, symbol, commutativity, cryptosystem, replacement, field, vector space, universal algebra, threshold scheme, transposition, symmetric group, confusion, sum, cyclic group, alphabet
28Baocang Wang, Hui Liu, Yupu Hu Cryptanalysis of a Knapsack Public Key Cryptosystem. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Amir Khatib Zadeh, Catherine H. Gebotys Side channel aware leakage management in nanoscale Cryptosystem-on-Chip (CoC). Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Ernst M. Gabidulin Attacks and counter-attacks on the GPT public key cryptosystem. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classifications 11T71, 14G50
28Jin-mei Liu, Shuisheng Qiu, Fei Xiang, Huijuan Xiao A Cryptosystem Based on Multiple Chaotic Maps. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cyptosystem, multiple chaotic maps, encryption, chaos
28MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin Symmetric-key cryptosystem with DNA technology. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF symmetric-key encryption, DNA cryptography, DNA computing
28Xin Ge, Fenlin Liu, Lu Bin, Wang Ping Analysis of Baptista-Type Chaotic Cryptosystem. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Zehui Wang, Zhiguo Zhang XTR + : A Provable Security Public Key Cryptosystem. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key system, Trace function, IND-CCA2, Provable security, Blind signature, XTR
28Yukio Itakura, Shigeo Tsujii Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification
28Shengqi Yang, Wayne H. Wolf, Narayanan Vijaykrishnan, Dimitrios N. Serpanos, Yuan Xie 0001 Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Raphael Overbeck Extending Gibson's Attacks on the GPT Cryptosystem. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Heiko Stamer Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems
28Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen An Efficient Decryption Method for RSA Cryptosystem. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Aaram Yun, Jaeheon Kim, Dong Hoon Lee 0002 Cryptanalysis of a Divisor Class Group Based Public-Key Cryptosystem. Search on Bibsonomy ANTS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Jintai Ding A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF open-key, perturbation, multivariable, quadratic polynomials
28Thierry P. Berger, Pierre Loidreau Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Jin-Hua Hong, Cheng-Wen Wu Cellular-array modular multiplier for fast RSA public-key cryptosystem based on modified Booth's algorithm. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Albert Levi, Erkay Savas Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Philip D. MacKenzie An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28George Petrides Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri Cryptosystem Designed for Embedded System Security. Search on Bibsonomy VLSI Design The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Kouichi Sakurai, Tsuyoshi Takagi A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack
28GuoJie Hu, ZhengJin Feng, Lin Wang Analysis of a type of digital chaotic cryptosystem. Search on Bibsonomy ISCAS (3) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen Paillier's cryptosystem revisited. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Kenneth J. Giuliani, Guang Gong Generating Large Instances of the Gong-Harn Cryptosystem. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Shahrokh Saeednia, Hossein Ghodosi A Self-Certified Group-Oriented Cryptosystem Without a Combiner. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Jyh-Huei Guo, Chin-Liang Wang, Hung-Chih Hu Design and implementation of an RSA public-key cryptosystem. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Octavio A. González, Gunhee Han, José Pineda de Gyvez, Edgar Sánchez-Sinencio CMOS cryptosystem using a Lorenz chaotic oscillator. Search on Bibsonomy ISCAS (5) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Phong Q. Nguyen, Jacques Stern Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman NTRU: A Ring-Based Public Key Cryptosystem. Search on Bibsonomy ANTS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Meng Yuan Huang Investigation of the efficiency of the elliptic curve cryptosystem for multi-applications smart card. Search on Bibsonomy KES (1) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Ronald Cramer, Victor Shoup A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Daniel Bleichenbacher On the Security of the KMOV Public Key Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
28Feng Bao 0004, Yoshihide Igarashi Break Finite Automata Public Key Cryptosystem. Search on Bibsonomy ICALP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
28Antoine Joux, Jacques Stern Cryptanalysis of Another Knapsack Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
28Eli Biham Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
28Walter J. Jaburek A Generalization of El Gamal's Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
28George I. Davida, Gilbert G. Walter A Public Key Analog Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
28J. C. Lagarias 0001 Performance Analysis of Shamir's Attack on the Basic Merkle-Hellman Knapsack Cryptosystem. Search on Bibsonomy ICALP The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
28R. M. F. Goodman, Anthony J. McAuley A New Trapdoor Knapsack Public-Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF cryptography, codes, knapsack problem, public key, ciphers
28A. Ecker Finite Semigroups and the RSA-Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
27Thomas Plantard, Willy Susilo Broadcast Attacks against Lattice-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Broadcast attack, lattice-based cryptosystem, knapsack cryptosystem, intersecting lattice
27Thomas J. Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, Çetin Kaya Koç Elliptic and hyperelliptic curves on embedded µP. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF implementation, Elliptic curves cryptosystem, hyperelliptic curve cryptosystem
27Nicolas Sendrier On the Concatenated Structure of a Linear Code. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Code equivalence, Niederreiter cryptosystem, McEliece cryptosystem, Concatenated codes
26Wolfgang Lempken, Tran van Trung, Spyros S. Magliveras, Wandi Wei A Public Key Cryptosystem Based on Non-abelian Finite Groups. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Logarithmic signature, Uniform cover, Trapdoor one-way function, Suzuki 2-group, Public-key cryptosystem
26Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cash payment system, Elliptic curve cryptosystem, Blind signature, Electronic voting system
26Eun-Jun Yoon, Kee-Young Yoo Robust Broadcasting Cryptosystem in Computer Networks. Search on Bibsonomy GPC Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Broadcasting cryptosystem, Cryptography, Cryptanalysis, Information security, Key management
26B. Prasanalakshmi, A. Kannammal A secure cryptosystem from palm vein biometrics. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF irrevocable key, palm vein, cryptosystem, minutiae, cancelable biometrics
26Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF matrix semigroup action, DDH problem, public key cryptosystem, semantically secure
26Chung-Ping Young, Chung-Chu Chia, Liang-Bi Chen, Ing-Jer Huang NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode Reconfigurable Cryptosystem. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple cipher, scheduling algorithm, Cryptosystem, operation mode, crypto-coprocessor
26Yuhua Xie, Xingming Sun, Lingyun Xiang, Gang Luo A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystem, Threshold Cryptography, Subliminal Channel
26Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure
26Robert Ronan, Colm O'hEigeartaigh, Colin C. Murphy, Michael Scott, Tim Kerins, William P. Marnane An Embedded Processor for a Pairing-Based Cryptosystem. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ç pairing, genus 2 hyperelliptic, characteristic 2, pairing-based cryptosystem, dedicated processor
26Juan Manuel González Nieto, Colin Boyd, Ed Dawson A Public Key Cryptosystem Based On A Subgroup Membership Problem. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF subgroup membership problem, provable security, public key cryptosystem
26Chi-Sung Laih, Min-Jea Gau Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1997 DBLP  DOI  BibTeX  RDF knapsack cryptosystem, cryptography, cryptanalysis, Public keys
25Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji 0001 Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Kadijeh Bagheri, Mohammad-Reza Sadeghi 0001 A new non-associative cryptosystem based on NTOW public key cryptosystem and octonions algebra. Search on Bibsonomy ACM Commun. Comput. Algebra The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Yasuyuki Murakami, Masao Kasahara Hybrid inter-organization cryptosystem using ElGamal cryptosystem. Search on Bibsonomy ICCE-TW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Tatsuki Miyamoto, Yasuyuki Murakami An implementation of inter-organization cryptosystem based on RSA cryptosystem. Search on Bibsonomy ICCE-TW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25 The El-Gamal AA_β Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
25A. John Prakash, V. Rhymend Uthariaraj Multicast Cryptosystem: A Cryptosystem for Secure Multicast Communication. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dynamic Key Revocation, Cryptography, Key Management, Multicast Security
25Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem. Search on Bibsonomy Informatica The full citation details ... 2007 DBLP  BibTeX  RDF
25Marc Joye, Jean-Jacques Quisquater Reducing the Elliptic Curve Cryptosystem of Meyer-Müuller to the Cryptosystem of Rabin-Williams. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Andrej Dujella A variant of Wiener's attack on RSA. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) Primary: 94A60, Secondary: 11A55, 11J70
24Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security
24Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga A public key algorithm for optical communication based on lattice cryptography. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Zhi Guan, Huiping Sun, Zhong Chen 0001, Xianghao Nan Efficient Identity-Based Key Issue with TPM. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta Leaky Random Oracle (Extended Abstract). Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash list, provable security, leakage, standard model, random oracle model
24Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
24Matthieu Finiasz, Serge Vaudenay When Stream Cipher Analysis Meets Public-Key Cryptography. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Qianhong Wu, Yi Mu 0001, Willy Susilo, Fangguo Zhang Privately Retrieve Data from Large Databases. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Tomoyuki Asano, Kazuya Kamio A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Shuanghe Peng, Zhen Han Proxy Cryptography for Secure Inter-domain Information Exchanges. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24M. Choudary Gorantla, Ashutosh Saxena An Efficient Certificateless Signature Scheme. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Dario Catalano, Phong Q. Nguyen, Jacques Stern The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Paillier, Hensel, One-wayness, RSA, Lattice, Discrete logarithm, Public-key
24Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
24Victor Shoup Using Hash Functions as a Hedge against Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Detlef Hühnlein Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Tsuyoshi Takagi Fast RSA-Type Cryptosystems Using N-Adic Expansion. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
24Joost Meijers, Johan van Tilburg Extended Majority Voting and Private-Key Algebraic-Code Encryptions. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
24Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung Systematic Design of Two-Party Authentication Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 2597 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license