The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for nonce with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-2004 (18) 2005-2006 (21) 2007-2008 (19) 2009-2012 (15) 2013-2015 (20) 2016-2017 (22) 2018-2019 (23) 2020 (16) 2021-2023 (24) 2024 (2)
Publication types (Num. hits)
article(89) inproceedings(91)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 102 occurrences of 67 keywords

Results
Found 180 publication records. Showing 180 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Renzo E. Navas, Manuel Lagos, Laurent Toutain, Kumaran Vijayasankar Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture. Search on Bibsonomy WF-IoT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
22Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Mihir Bellare, Björn Tackmann Nonce-Based Cryptography: Retaining Security When Randomness Fails. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Benoît Cogliati, Yannick Seurin EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. Search on Bibsonomy CRYPTO (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Dhiman Saha, Dipanwita Roy Chowdhury EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Jie Ling, Guangqiang Zhao An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2015 DBLP  BibTeX  RDF
22Akash Nag, Sunil Karforma DSA Security Enhancement through Efficient Nonce Generation. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
22Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Shay Gueron, Yehuda Lindell GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Tomer Ashur, Bart Mennink Trivial Nonce-Misusing Attack on Pure OMD. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Shay Gueron, Yehuda Lindell GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. Search on Bibsonomy CRYPTO (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Aurélie Bauer, Damien Vergnaud Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits. Search on Bibsonomy CHES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Ashok Kumar Das, Adrijit Goswami An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function. Search on Bibsonomy J. Medical Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, Ankita Chaturvedi Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. Search on Bibsonomy J. Medical Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Diego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi, Jean-Christophe Zapalowicz GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Timothy Koschmann, Alan Zemel, Michael Neumeister "Case n' Point": Discovering Learning in the Nonce. Search on Bibsonomy ICLS The full citation details ... 2014 DBLP  BibTeX  RDF
22Elangovan Uma, Arputharaj Kannan The Dynamic Nonce based Authentication Scheme to Defend Intermediary Attack for Web Services. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22 Security Enhancement of Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
22Amit K. Awasthi, Keerti Srivastava A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. Search on Bibsonomy J. Medical Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
22Aikaterini Mitrokotsa, Pedro Peris-Lopez, Christos Dimitrakakis, Serge Vaudenay On Selecting the Nonce Length in Distance-Bounding Protocols. Search on Bibsonomy Comput. J. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Özkan Kiliç Using Corpus Statistics to Evaluate Nonce Words. Search on Bibsonomy ESSLLI Student Sessions The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA. Search on Bibsonomy CHES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22S. Maria Celestin Vigila, K. Muneeswaran 0001 Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2012 DBLP  BibTeX  RDF
22David Miles, Wojciech Dec, James Bristow, Roberta Maglione Forcerenew Nonce Authentication. Search on Bibsonomy RFC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Randall J. Atkinson, Saleem N. Bhatti IPv6 Nonce Destination Option for the Identifier-Locator Network Protocol for IPv6 (ILNPv6). Search on Bibsonomy RFC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Younghwa An, Youngdo Joo Cryptanalysis of Nonce-Based Mutual Authentication Scheme Using Smart Cards. Search on Bibsonomy ICHIT (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Rajendra S. Katti, Rajesh G. Kavasseri Nonce Generation For The Digital Signature Standard. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2010 DBLP  BibTeX  RDF
22Chamil Kulatunga, Gorry Fairhurst Enforcing layered multicast congestion control using ECN-nonce. Search on Bibsonomy Comput. Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update. Search on Bibsonomy Informatica The full citation details ... 2010 DBLP  BibTeX  RDF
22Hui-Feng Huang, Su-E. Liu, Hui-Fang Chen Designing a New Mutual Authentication Scheme Based on Nonce and Smart Cards. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF smart card, password, mutual authentication
22Jia Lun Tsai Efficient Nonce-based Authentication Scheme for Session Initiation Protocol. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2009 DBLP  BibTeX  RDF
22Cheng-Chi Lee On Security of An Efficient Nonce-based Authentication Scheme for SIP. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2009 DBLP  BibTeX  RDF
22Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Jian-Xin Li Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. Search on Bibsonomy Comput. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Mohamad Badra, Ahmed Serhrouchni, Thomas Guillet Random Values, Nonce and Challenges: Semantic Meaning versus Opaque and Strings of Data. Search on Bibsonomy VTC Fall The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Da-Zhi Sun, Zhen-Fu Cao New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2008 DBLP  BibTeX  RDF
22Jia-Yong Liu, An-Min Zhou, Min-Xu Gao A new mutual authentication scheme based on nonce and smart cards. Search on Bibsonomy Comput. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Michael Welzl Using the ECN Nonce to Detect Spurious Loss Events in TCP. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Junghyun Nam, Seungjoo Kim, Sangjoon Park, Dongho Won Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Klaas Ole Kürtz, Ralf Küsters, Thomas Wilke Selecting theories and nonce generation for recursive protocols. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security protocols, decidability, automatic analysis
22 A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
22Yen-Cheng Chen, Lo-Yao Yeh An efficient nonce-based authentication scheme with key agreement. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Sung-Woon Lee, Hyun-Sung Kim 0001, Kee-Young Yoo Efficient nonce-based remote user authentication scheme using smart cards. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22A. Kehne, Jürgen Schönwälder, Horst Langendörfer A Nonce-Based Protocol For Multiple Authentications. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
16Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin DepenDNS: Dependable Mechanism against DNS Cache Poisoning. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi A Secure Communication Protocol for Low-Cost RFID System. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Woei-Jiunn Tsaur, Haw-Tyng Pai A new security scheme for on-demand source routing in mobile ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile ad hoc networks, information security, cryptosystem, routing security
16Hongjun Wu 0001, Bart Preneel Differential-Linear Attacks Against the Stream Cipher Phelix. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi A Light-weight Security Protocol for RFID System. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GNY logic, RFID, Security protocol, One-time pad
16Stéphane Demri, Deepak D'Souza, Régis Gascon A Decidable Temporal Logic of Repeating Values. Search on Bibsonomy LFCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Woei-Jiunn Tsaur, Haw-Tyng Pai A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Daniel R. L. Brown, Kristian Gjøsteen A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptography, Random Number Generation
16Adam L. Young, Moti Yung On Fundamental Limitations of Proving Data Theft. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Mounita Saha, Dipanwita Roy Chowdhury Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo An Improvement of Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line Dictionary Attack, Bilinear Pairing, Mutual Authentication, Replay Attack, Forgery Attack
16Wen-Shenq Juang Efficient User Authentication and Key Agreement in Wireless Sensor Networks. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF shared key distribution, session key agreement, sensor networks, authentication, network security, key distribution
16Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won Two Efficient and Secure Authentication Schemes Using Smart Cards. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, password, mutual authentication, Authentication scheme
16Wen-Shenq Juang Efficient User Authentication and Key Agreement in Ubiquitous Computing. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ubiquitous Computing, Network Security, Smart Card, User Authentication, Session Key
16Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack
16David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan Experimenting with Faults, Lattices and the DSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF glitch attacks, fault injection, lattice reduction, DSA
16Stefan Lucks Two-Pass Authenticated Encryption Faster Than Generic Composition. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF associated data, OMAC, provable security, authenticated encryption
16Daniel J. Bernstein The Poly1305-AES Message-Authentication Code. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Daniel J. Bernstein Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biometrics, Embedded Processors, Fingerprint Verification
16Chou Chen Yang, Ren-Chiun Wang An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, smart card, password, forgery attack
16Joshua D. Guttman, F. Javier Thayer, Jay A. Carlson, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen Trust Management in Strand Spaces: A Rely-Guarantee Method. Search on Bibsonomy ESOP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 The EAX Mode of Operation. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC
16Hyun-Sung Kim 0001, Sung-Woon Lee, Kee-Young Yoo ID-based password authentication scheme using smart cards and fingerprints. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ID-based scheme, smart card, fingerprint, password authentication
16Hubert Comon-Lundh, Véronique Cortier New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols. Search on Bibsonomy RTA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Phong Q. Nguyen, Igor E. Shparlinski The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Search on Bibsonomy J. Cryptol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Takeshi Koshiba On Sufficient Randomness for Secure Public-Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 Tweakable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tweakable block ciphers, initialization vector, block ciphers, modes of operation
16Lawrence C. Paulson SET Cardholder Registration: The Secrecy Proofs. Search on Bibsonomy IJCAR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Zhimin Song, Sihan Qing Applying NCP Logic to the Analysis of SSL 3.0. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Pengjun Pei, Guohua Cui, Kun Peng On a Session Key Compromise Problem in [KC95] protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Jochen Liedtke A Short Note on Small Virtually-Addresses Control Blocks. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #180 of 180 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license