The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Toshinori Araki Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Junpei Kawamoto, Qiang Ma 0001, Masatoshi Yoshikawa Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Farnaz Gharibian, Kenneth B. Kent An embedded decryption/decompression engine using Handel-C. Search on Bibsonomy SIES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24David Oranchak Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF codebreaking, homophonic substitution, zodiac killer, zodiac murder ciphers, genetic algorithms, cryptography, evolutionary computing, constraint satisfaction
24Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy cryptosystem, certificate-based encryption (CBE), pairing
24André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Zhenchuan Chai, Zhenfu Cao, Yuan Zhou Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Nadia Nedjah, Luiza de Macedo Mourelle A Versatile Pipelined Hardware Implementation for Encryption and Decryption Using Advanced Encryption Standard. Search on Bibsonomy VECPAR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Young Whan Lee, Byung Mun Choi (SE-33)Intelligent ID-Based Threshold System by an Encryption and Decryption from Bilinear Pairing. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Bin B. Zhu, Shipeng Li 0001, Yang Yang JPEG 2000 encryption enabling fine granularity scalability without decryption. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Sang-Su Lee, Jong Wook Han, Hyo-wook Bae The encryption method to share a secret binary image and its decryption system. Search on Bibsonomy ISICT The full citation details ... 2003 DBLP  BibTeX  RDF cryptography, image reconstruction, data security, optical imaging
24Emmanuel Bresson, Dario Catalano, David Pointcheval A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Tieyan Li Time Constraint Delegation for P2P Data Decryption. Search on Bibsonomy SPC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Jan Camenisch, Victor Shoup Practical Verifiable Encryption and Decryption of Discrete Logarithms. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern Sharing Decryption in the Context of Voting or Lotteries. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Tom Kean, Ann Duncan DES Key Breaking, Encryption and Decryption on the XC6216. Search on Bibsonomy FCCM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
24Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Public-key Encryption Schemes, Computational Problems in Lattices
18Thai Duong, Juliano Rizzo Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Decryption oracle attack, Unauthenticated encryption, Cryptography, Web security, Application Security
18Marius Marcu, Dacian Tudor, Sebastian Fuicu Power efficiency analysis of multimedia secured mobile applications. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF encoding/decoding, encryption/decryption, mobile devices, energy efficiency, wireless communication, power consumption, multimedia applications
18G. Praveen Kumar, Arjun Kumar Murmu, Biswas Parajuli, Prasenjit Choudhury MULET: A Multilanguage Encryption Technique. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Software Localization and Cryptanalysis, Encryption, Decryption, Unicode
18Pravin Revankar, W. Z. Gandhare, Dilip Rathod Neural Synchronization with Queries. Search on Bibsonomy ICSAP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Neural cryptography, mutual learning, tree parity machine, neural synchronization, encryption/decryption, neural network, query
18R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunasekaran Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data. Search on Bibsonomy ICSAP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Shared key, Small data, Security, Cryptography, Encryption, Decryption, Secret key, Symmetric key
18Chong-Yen Lee, Tsang-Yean Lee, Homer Wu, Hau-Dong Tsui, Heng-Sheng Chen Secure Site Authentication and Message Transmission Based on Grid Environment. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Site Authentication, Grid Computing, Encryption, Decryption
18Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar, Samar Sen-Sarma An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. Search on Bibsonomy SBCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intellectual property protection (IPP), watermarking, encryption, decryption
18Pooya Farshim, Bogdan Warinschi Certified Encryption Revisited. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption
18Umit Topaloglu, Coskun Bayrak Secure mobile agent execution in virtual environment. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Agent and host protection, Security, Mobile agents, Virtualization, Encryption, Decryption
18Sigurd Eskeland, Vladimir A. Oleshchuk Secure Team-Based EPR Access Acquisition in Wireless Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Broadcast-oriented threshold decryption, Secure EPR acquisition, Access control
18Saurabh Panjwani Tackling Adaptive Corruptions in Multicast Encryption Protocols. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Adaptive Corruptions, Selective Decryption, Multicast, Encryption
18Borislav Stoyanov, Borislav Bedzhev, Todor Tashev, Svetlana Vasileva Application and statistic testing of the 5-adic summation-shrinking generator. Search on Bibsonomy CompSysTech The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption and decryption, statistic testing, pseudorandom generator
18Abdoul Rjoub, M. Musameh, Odysseas G. Koufopavlou An optimal low-power/high performance DDP-based Cobra-H64 cipher. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cobra-H64, security, cryptography, encryption, decryption
18Yvo Desmedt, Kaoru Kurosawa A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF threshold decryption, Goldwasser- Micali, Rabin, cryptography, Threshold signatures
18Giuseppe Ateniese, Kevin Fu, Matthew Green 0001, Susan Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF double decryption, key translation, bilinear maps, Proxy re-encryption
18Tai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson DES Decoding Using FPGA and Custom Instructions. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Parallel Processing, Encryption, Encoder, Decoder, DES, Decryption
18Byeong Kil Lee, Lizy Kurian John Implications of Executing Compression and Encryption Applications on General Purpose Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Media compression, memory behavior, MediaZip benchmark, overhead memory bandwidth, encryption, encoding, decoding, workload characterization, decryption
18Chris McNear, Chrisila C. Pettey A free, readily upgradeable, interactive tool for teaching encryption algorithms. Search on Bibsonomy ACM Southeast Regional Conference (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF teaching aid, simulator, cryptography, encryption, decryption
18Srivaths Ravi 0001, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady Security in embedded systems: Design challenges. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF processing requirements, security, Embedded systems, authentication, architecture, encryption, security protocols, hardware design, tamper resistance, decryption, cryptographic algorithms, security attacks, battery life
18Rajiv K. Nekkanti, Chung-wei Lee Trust based adaptive on demand ad hoc routing protocol. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF encryption/decryption, trust factor, AODV, security level, ad-hoc routing protocol
18Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 Securing Wireless Data: System Architecture Challenges. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
18Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
18Srivaths Ravi 0001, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass System design methodologies for a wireless security processing platform. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, performance, embedded system, wireless, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
18J. H. Jiang, Shih-Chieh Chang, Wen-Ben Jone Embedded Core Testing Using Broadcast Test Architecture. Search on Bibsonomy DFT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF test pattern broadcasting, data decryption, IEEE P1500 standard, data encryption, core-based testing
18Bruce Schneier, Chris Hall An Improved E-Mail Security Protocol. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy
18Lein Harn, David Huang A Protocol for Establishing Secure Communication Channels in a Large Network. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange
17Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino Mask: a system for privacy-preserving policy-based access to published content. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF broadcast systems, privacy, access control, identity, group key management
17Hsiang-Cheh Huang, Yueh-Hong Chen Genetic fingerprinting for copyright protection of multicast media. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Melissa Chase, Sherman S. M. Chow Improving privacy and security in multi-authority attribute-based encryption. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-authority, removing trusted party, privacy, attribute based encryption, anonymous credential
17Ribao Wei, Dingfeng Ye Delegate predicate encryption and its application to anonymous authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF predicate encryption, anonymous authentication
17Weidong Zhang, Baocang Wang, Yupu Hu A New Knapsack Public-Key Cryptosystem. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Felix Leder, Peter Martini NGBPA Next Generation BotNet Protocol Analysis. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
17Mabroka Ali Mayouf, Zarina Shukur Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. Search on Bibsonomy IVIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF possible attacks, animation, active learning, cryptographic protocols, visual metaphor
17Zhiyao Liang, Rakesh M. Verma Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF insecurity, Cryptographic protocols, secrecy, NP
17Mustafa Canim, Murat Kantarcioglu, Ali Inan Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Michel Abdalla, Dario Catalano, Dario Fiore 0001 Verifiable Random Functions from Identity-Based Key Encapsulation. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen Square, a New Multivariate Encryption Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Huiju Cheng, Howard M. Heys, Cheng Wang PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems. Search on Bibsonomy DSD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ryan Pries, Wei Yu 0002, Xinwen Fu, Wei Zhao 0001 A New Replay Attack Against Anonymous Communication Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Christopher James Hargreaves, Howard Chivers Recovery of Encryption Keys from Memory Using a Linear Scan. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Live Forensics, Encryption, Digital Evidence, Forensic Computing
17Sanmitra Kale, Snehal Naphade, Vinod Valecha Application for a Secure Fax System. Search on Bibsonomy ICDCIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Masaki Nakanishi An FPGA Configuration Scheme for Bitstream Protection. Search on Bibsonomy ARC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA configuration, bitstream protection, bitstream encryption, bitstream authentication
17Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identity-Based Encryption, Proxy re-encryption, Personal Health Record
17Sandip Dutta, Avijit Kar, N. C. Mahanti, B. N. Chatterji Network Security Using Biometric and Cryptography. Search on Bibsonomy ACIVS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography, Biometric, Watermarking, DES, MD5
17Benoît Chevallier-Mames, David Naccache, Jacques Stern Linear Bandwidth Naccache-Stern Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ns cryptosystem, multiplicative knapsack, efficiency, Public key cryptography
17Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17David Lubicz, Thomas Sirvent Attribute-Based Broadcast Encryption Scheme Made Efficient. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Public-key broadcast encryption, Generic model of groups with pairing, Attribute-based encryption
17Michael J. Jacobson Jr., Renate Scheidler, Daniel Weimer An Adaptation of the NICE Cryptosystem to Real Quadratic Orders. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera Extracting Kerberos passwords through RC4-HMAC encryption type analysis. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang Commutative Encryption and Watermarking in Video Compression. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17YiWei Zhang, YuMin Wang, XuBang Shen A chaos-based image encryption algorithm using alternate structure. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chaotic encryption, general cat-map, OCML, image encryption
17Ling Cheung, Calvin C. Newport Provably secure ciphertext policy ABE. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute-based encryption
17Kashif Kifayat, Madjid Merabti, Qi Shi 0001, David Llewellyn-Jones Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Key Management, Data Aggregation
17Anna Zych, Milan Petkovic, Willem Jonker The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Mehran Mozaffari Kermani, Arash Reyhani-Masoleh A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Hua Li, Jianzhou Li A New Compact Architecture for AES with Optimized ShiftRows Operation. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Thomas Fuhr 0001, Pascal Paillier Decryptable Searchable Encryption. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ellen Jochemsz, Alexander May 0001 A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT
17Rui Xue 0001, Dengguo Feng Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Verifiable shuffles, Paillier public-key system, Privacy, Mix-nets, Formal security model
17Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
17Farshid Delgosha, Faramarz Fekri Public-key cryptography using paraunitary matrices. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Sun S. Chung, Gultekin Özsoyoglu Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES
17Huizhang Shen, Jidi Zhao, Huanchen Wang Illegal Intrusion Detection Based on Hidden Information Database. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Ricardo Chaves, Georgi Kuzmanov, Stamatis Vassiliadis, Leonel Sousa Reconfigurable memory based AES co-processor. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Konstantinos Chalkias, George Stephanides Timed Release Cryptography from Bilinear Pairings Using Hash Chains. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Timed-Release Cryptography, S/Key, bilinear pairings, hash chains, sealed-bid auctions
17Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park Capacity Planning for Scalable Fingerprint Authentication. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Performance Evaluation, Authentication Protocol, Fingerprint Verification
17Daniel J. T. Chong, Robert H. Deng Privacy-enhanced superdistribution of layered content with trusted access control. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital distribution, usage rights, privacy, access control, trusted computing, DRM, copyrights, licensing
17Yitao Duan, John F. Canny How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Misung Cho, Seokryul Kim, Maenghee Sung, Giwon On 3D Fingerprinting and Encryption Principle for Collaboration. Search on Bibsonomy AXMEDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Louis Granboulan, Antoine Joux, Jacques Stern Inverting HFE Is Quasipolynomial. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Brian Rogers, Yan Solihin, Milos Prvulovic Memory predecryption: hiding the latency overhead of memory encryption. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Mark D. Corner, Brian D. Noble Protecting File Systems with Transient Authentication. Search on Bibsonomy Wirel. Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Deepak Kapur, Paliath Narendran, Lida Wang A Unification Algorithm for Analysis of Protocols with Blinded Signatures. Search on Bibsonomy Mechanizing Mathematical Reasoning The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jae-Pyo Park, Hong-jin Kim, Keun-Wang Lee, Keun-Soo Lee A PKI Based Digital Rights Management System for Safe Playback. Search on Bibsonomy ICIC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Khaled Z. Ibrahim Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Hua Li, Jianzhou Li A High Performance Sub-Pipelined Architecture for AES. Search on Bibsonomy ICCD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF sub-pipelined architecture, FPGA, cryptography, AES
17Jun-Hong Chen, Ming-Der Shieh, Chien-Ming Wu Concurrent algorithm for high-speed point multiplication in elliptic curve cryptography. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang t-Out-of-n String/Bit Oblivious Transfers Revisited. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license