|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
39 | Benoît Libert, Damien Vergnaud |
Tracing Malicious Proxies in Proxy Re-encryption. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
unidirectional proxy re-encryption, transferability issues, collusion detection and traceability |
39 | Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar |
An Efficient RSA Public Key Encryption Scheme. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
RSA public encryption scheme, square matrices, general linear group, digital signature scheme |
39 | Robert H. Deng, Jian Weng 0001, Shengli Liu 0001, Kefei Chen |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
bilinear pairing, chosen-ciphertext security, Proxy re-encryption |
39 | Chunhua Li, Xinxin Zhou, Yuzhuo Zhong |
NAL Level Encryption for Scalable Video Coding. |
PCM |
2008 |
DBLP DOI BibTeX RDF |
Network Abstractor Layer, Scalable Video Coding, LEX, Selective Encryption |
39 | Qian Li |
Practice of Video Encryption Algorithms Based on Chaotic Sequence and Scan Pattern. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
scan methodology, difference matrix, difference-compressed matrix, Video encryption, chaotic sequence |
39 | Gregory V. Bard |
Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
Modes of Encryption, Blockwise-Adaptive Chosen-Plaintext Attack, BACPA, MACPA, Online-ness, CBC, CTR, OFB, CFB, IGE, HCBC, HPCBC, XCBC, ABC, ECB |
39 | Chik How Tan |
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear map |
39 | Chris McNear, Chrisila C. Pettey |
A free, readily upgradeable, interactive tool for teaching encryption algorithms. |
ACM Southeast Regional Conference (1) |
2005 |
DBLP DOI BibTeX RDF |
teaching aid, simulator, cryptography, encryption, decryption |
39 | Benoît Libert, Jean-Jacques Quisquater |
Identity Based Encryption Without Redundancy. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
ID-based encryption, redundancies, provable security |
39 | Tadayoshi Kohno |
Attacking and repairing the winZip encryption scheme. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
WinZip, Zip, security fixes, compression, encryption, attacks, applied cryptography |
39 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES |
39 | Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee 0001 |
Improved searchable public key encryption with designated tester. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
designated tester, public key encryption with keyword search, searchable encryption |
39 | Kristen Dietiker |
Deploying PGP whole disk encryption in Mac OS X. |
SIGUCCS |
2009 |
DBLP DOI BibTeX RDF |
Mac OS X, WDE, protected health information, whole disk encryption, encryption, compliance, macintosh, software deployment, HIPAA, PGP |
39 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation |
39 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
39 | Mohamed Abo El-Fotouh, Klaus Diepold |
The Analysis of Windows Vista Disk Encryption Algorithm. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Disk encryption, Windows Vista disk encryption algorithm |
39 | Nikita Borisov, Kazuhiro Minami |
Single-bit re-encryption with applications to distributed proof systems. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
commutative encryption, distributed proof systems, goldwasser-micali, covert channels, re-encryption |
39 | Thomas Stütz, Andreas Uhl |
On efficient transparent jpeg2000 encryption. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
format-compliant encryption, transparent encryption, JPEG2000 |
39 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Based Proxy Re-encryption Without Random Oracles. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption, Proxy re-encryption |
39 | David Galindo, Paz Morillo, Carla Ràfols |
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption |
39 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Cramer-Shoup framework, subgroup membership problems, public key encryption, chosen ciphertext security, hybrid encryption |
39 | Guang-Ming Hong, Chun Yuan, Yi Wang 0008, Yuzhuo Zhong |
A Quality-Controllable Encryption for H.264/AVC Video Coding. |
PCM |
2006 |
DBLP DOI BibTeX RDF |
Quality-Controllable Encryption, Partial Encryption, H.264/AVC |
39 | Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen |
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption |
39 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is the Data Encryption Standard a Group? (Preliminary Abstract). |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox |
39 | Virgil D. Gligor, Pompiliu Donescu |
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva |
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. |
ISCA |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Kaoru Kurosawa, Toshihiko Matsuo |
How to Remove MAC from DHIES. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
DHIES, hybrid encryption scheme |
37 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. |
Trans. Data Hiding Multim. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Chameleon encryption, frame-proofness, stream cipher, fingerprinting, broadcast encryption, collusion resistance, spread-spectrum watermarking |
37 | Shai Halevi, Hugo Krawczyk |
Security under key-dependent inputs. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
circular encryption, key-dependent input, self encryption |
37 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
HCTR: A Variable-Input-Length Enciphering Mode. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher |
37 | Sattam S. Al-Riyami, Kenneth G. Paterson |
CBE from CL-PKE: A Generic Construction and Efficient Schemes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings |
37 | Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo |
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Mixnet, Designated-verifier re-encryption proof, Tamper resistant randomizer, Electronic voting, Receipt-freeness, Re-encryption |
37 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox |
37 | Barak D. Jolish |
The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
37 | Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata |
Stateful identity-based encryption scheme: faster encryption and decryption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
IBE, stateful encryption, cryptography, provable security, ROM |
37 | Stefan Lucks |
Two-Pass Authenticated Encryption Faster Than Generic Composition. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
associated data, OMAC, provable security, authenticated encryption |
35 | Emily Shen, Elaine Shi, Brent Waters |
Predicate Privacy in Encryption Systems. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai |
Generic Construction of Stateful Identity Based Encryption. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Akinori Kawachi, Christopher Portmann |
On the Power of Quantum Encryption Keys. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Guiliang Zhu, Xiaoqiang Zhang |
Mixed Image Element Encryption System. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Qiang Tang 0001 |
Type-Based Proxy Re-encryption and Its Construction. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Shai Halevi |
Storage Encryption: A Cryptographer's View. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Anil Yekkala, C. E. Veni Madhavan |
Bit Plane Encoding and Encryption. |
PReMI |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Juan Lan, Tie-Jun Huang 0001, Junhua Qu |
A Perception-based Scalable Encryption Model for AVS Audio. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Meng-Lin Hsia, Oscal T.-C. Chen |
Low-Complexity Encryption Using Redundant Bits and Adaptive Frequency Rates in RFID. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Thomas Fuhr 0001, Pascal Paillier |
Decryptable Searchable Encryption. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Dennis Hofheinz, Eike Kiltz |
Secure Hybrid Encryption from Weakened Key Encapsulation. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek |
Separating Sources for Encryption and Secret Sharing. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Nuttapong Attrapadung, Jun Furukawa 0001, Hideki Imai |
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Jun Liu, Lingling Zou, Changsheng Xie, Hao Huang |
A Two-Way Selective Encryption Algorithm for MPEG Video. |
IWNAS |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Thomas Stütz, Andreas Uhl |
On Format-Compliant Iterative Encryption of JPEG2000. |
ISM |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Kikuko Kamisaka, Saneyasu Yamaguchi, Masato Oguchi |
Performance Analysis of iSCSI Middleware Optimized for Encryption Processing in a Long-Latency Environment. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Mark Giereth |
On Partial Encryption of RDF-Graphs. |
ISWC |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Wei Zhang, Jun Peng, Huaqian Yang, Pengcheng Wei |
A Digital Image Encryption Scheme Based on the Hybrid of Cellular Neural Network and Logistic Map. |
ISNN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Rong-Jian Chen, Wen-Kai Lu, Jui-Lin Lai |
Image encryption using progressive cellular automata substitution and SCAN. |
ISCAS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Jung Yeon Hwang, Dong Hoon Lee 0001, Jongin Lim 0001 |
Generic Transformation for Scalable Broadcast Encryption Schemes. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Peter Fairbrother |
An Improved Construction for Universal Re-encryption. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson |
Universal Re-encryption for Mixnets. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai |
Separating Encryption and Key Issuance in Digital Rights Management Systems. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Yan Zong Ding, Michael O. Rabin |
Hyper-Encryption and Everlasting Security. |
STACS |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Hugo Krawczyk |
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Juan A. Garay, Jessica Staddon, Avishai Wool |
Long-Lived Broadcast Encryption. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Anand Desai |
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Richard A. Kemmerer |
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
35 | Jian-Ru Chen, Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang |
Video JET: packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data. |
Multim. Tools Appl. |
2009 |
DBLP DOI BibTeX RDF |
(Selective) Encryption, Media hashing, Motion estimation/compensation, Embedding, Packet loss, Error resilience, Error concealment |
35 | Zhenyu Hu, Fuchun Sun 0001, JianChun Jiang |
Ciphertext verification security of symmetric encryption schemes. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
reaction attack, IND-CPA, IND-CCA, privacy, integrity, encryption |
35 | Julien Cathalo, Benoît Libert, Moti Yung |
Group Encryption: Non-interactive Realization in the Standard Model. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Group encryption, anonymity, provable security |
35 | Jeffrey B. Lotspiech |
Broadcast encryption versus public key cryptography in content protection systems. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
tracing traitors, drm, broadcast encryption, content protection |
35 | Viktor Gergely, Gábor Fehér |
Enhancing Progressive Encryption for Scalable Video Streams. |
EUNICE |
2009 |
DBLP DOI BibTeX RDF |
progressive encryption, scalable video streaming, wireless networks, stream ciphers |
35 | Haixun Wang, Jian Yin 0002, Chang-Shing Perng, Philip S. Yu |
Dual encryption for query integrity assurance. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
database outsourcing, security, integrity, encryption, audit |
35 | Eric J. Wharton, Karen Panetta, Sos S. Agaian |
Simultaneous Encryption/Compression of Images Using Alpha Rooting. |
DCC |
2008 |
DBLP DOI BibTeX RDF |
Alpha Rooting, Image Processing, Compression, Encryption, Image Enhancement |
35 | Varad Kirtane, C. Pandu Rangan |
RSA-TBOS signcryption with proxy re-encryption. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
signcryption, proxy re-encryption |
35 | Sherman S. M. Chow, Siu-Ming Yiu |
Timed-Release Encryption Revisited. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
release-time confidentiality, Timed-release encryption |
35 | Ayman Alfalou, Alain Loussert, Abdulsalam Alkholidi, Rami El Sawda |
System for Image Compression and Encryption by Spectrum Fusion in Order to Optimize Image Transmission. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Signal and Image Processing, Image Compres- sion/Decompression, Image Encryption/Decryption, Trans- mission, FFT, DCT |
35 | Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart |
Escrow-free encryption supporting cryptographic workflow. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Workflow, Pairings, Identity based encryption |
35 | Chih-Hsu Yen, Bing-Fei Wu |
Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
differential fault attacks, Advanced encryption standard, error control code, CRC |
35 | Pedro R. M. Inácio, Marek Hajduczenia, Mário M. Freire, Henrique J. A. da Silva, Paulo P. Monteiro |
Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Ethernet Passive Optical Networks, encryption mechanism, EPON frame preamble, Security, privacy, EPON |
35 | Craig Gentry |
Practical Identity-Based Encryption Without Random Oracles. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Identity Based Encryption |
35 | Xiaojian Tian, Duncan S. Wong |
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
MT-authenticator, BCK-model, CK-model, Verifiable Encryption |
35 | Peter Phuong Vo, Chau Maggie Vo |
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption using flipping, shifting operations, mapping |
35 | Eun-Jun Yoon, Kee-Young Yoo |
Robust Authenticated Encryption Scheme with Message Linkages. |
KES (4) |
2005 |
DBLP DOI BibTeX RDF |
Message linkage, Cryptography, Signature, Authenticated encryption |
35 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Security Weaknesses of Certain Broadcast Encryption Schemes. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
time-memory-data trade-off, cryptanalysis, key management, broadcast encryption |
35 | Bharat K. Bhargava, Changgui Shi, Sheng-Yih Wang |
MPEG Video Encryption Algorithms. |
Multim. Tools Appl. |
2004 |
DBLP DOI BibTeX RDF |
multimedia data security, MPEG video encryption, MPEG codec |
35 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
35 | Phillip Rogaway |
Authenticated-encryption with associated-data. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption |
35 | Máire McLoone, John V. McCanny |
Single-Chip FPGA Implementation of the Advanced Encryption Standard Algorithm. |
FPL |
2001 |
DBLP DOI BibTeX RDF |
Encryption, AES, Rijndael, FPGA Implementation |
35 | Lakshminath R. Dondeti, Ashok Samal, Sarit Mukherjee |
A Dual Encryption Protocol for Scalable Secure Multicasting. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
Scalable Key Distribution Dual Encryption, Secure Group Communication, Secure Multicasting |
35 | Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao |
Attribute based proxy re-encryption with delegating capabilities. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
key delegation, attribute based encryption, proxy re-encryption |
35 | Liming Fang 0001, Willy Susilo, Chunpeng Ge, Jiandong Wang |
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
public key encryption with keyword search, without random oracle, searchable encryption |
35 | David Lubicz, Thomas Sirvent |
Attribute-Based Broadcast Encryption Scheme Made Efficient. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Public-key broadcast encryption, Generic model of groups with pairing, Attribute-based encryption |
35 | YiWei Zhang, YuMin Wang, XuBang Shen |
A chaos-based image encryption algorithm using alternate structure. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
chaotic encryption, general cat-map, OCML, image encryption |
35 | Ran Canetti, Susan Hohenberger |
Chosen-ciphertext secure proxy re-encryption. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
encryption, obfuscation, chosen-ciphertext security, re-encryption |
35 | Matthew Green 0001, Giuseppe Ateniese |
Identity-Based Proxy Re-encryption. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
identity-based encryption, bilinear maps, proxy re-encryption |
35 | Christian Wieschebrink |
An Attack on a Modified Niederreiter Encryption Scheme. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography |
35 | Andreas Uhl, Andreas Pommer |
Are parameterised biorthogonal wavelet filters suited (better) for selective encryption? |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
biorthogonal wavelet filters, filter parameterisation, image compression, image encryption, selective encryption |
34 | Thomas Ristenpart, Phillip Rogaway |
How to Enrich the Message Space of a Cipher. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Deterministic encryption, enciphering scheme, length-preserving encryption, multipermutation, symmetric encryption |
33 | Rui Xue 0001, Dengguo Feng |
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Takeshi Koshiba |
On Sufficient Randomness for Secure Public-Key Cryptosystems. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
33 | David P. Anderson, P. Venkat Rangan |
High-Performance Interface Architectures for Cryptographic Hardware. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 21739 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|