The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Michael Luby, Charles Rackoff A Study of Password Security. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
33Siddhartha Chhabra, Brian Rogers, Yan Solihin, Milos Prvulovic Making secure processors OS- and performance-friendly. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure processor architectures, memory encryption, memory integrity verification, virtualization
33Dennis Hofheinz, Dominique Unruh Towards Key-Dependent Message Security in the Standard Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key-dependent message security, symmetric encryption schemes, security proofs
33Praveen R. Samala, Hamid Vakilzadian, Dietmar P. F. Möller Modeling and simulation of common primitive operations used in block ciphers. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF discrete event simulation, hardware modeling, encryption algorithms
33Dae Hyun Yum, Pil Joong Lee Separable Implicit Certificate Revocation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF certificate-based encryption, PKI, certificate revocation
33Máire McLoone, John V. McCanny Rijndael FPGA Implementations Utilising Look-Up Tables. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF encryption, AES, Rijndael, FPGA implementation
33Shucheng Yu, Cong Wang 0001, Kui Ren 0001, Wenjing Lou Attribute based data sharing with attribute revocation. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF revocation, attribute based encryption, proxy re-encryption
33Rafail Ostrovsky, William E. Skeith III Communication Complexity in Algebraic Two-Party Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fully homomorphic encryption, PIR writing, algebraic lower bounds, communication complexity, keyword search, private information retrieval, homomorphic encryption
33Palash Sarkar 0001 Improving Upon the TET Mode of Operation. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF tweakable encryption, strong pseudo-random permutation, disk encryption, modes of operations
33Sanjit Chatterjee, Palash Sarkar 0001 Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-receiver encryption, bilinear pairing, identity based encryption
33Peng Wang 0009, Dengguo Feng, Wenling Wu On the Security of Tweakable Modes of Operation: TBC and TAE. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher
33Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mixnet, designated-verifier re-encryption proof, randomization, Electronic voting, receipt-freeness, re-encryption
33Jan Camenisch, Anna Lysyanskaya An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF pseudonym system, circular encryption, key-oblivious encryption, Privacy protection, blind signatures, e-cash, credential system
33Helena Handschuh, Yiannis Tsiounis, Moti Yung Decision Oracles are Equivalent to Matching Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems
32Jan Camenisch, Ivan Damgård Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Stefan Lucks On the Security of Remotely Keyed Encryption. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
30Yang Lu 0001, Jiguo Li 0001 Forward-Secure Certificate-Based Encryption. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Hongxia Jin, Jeffery Lotspiech Broadcast Encryption for Differently Privileged. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Iftach Haitner, Thomas Holenstein On the (Im)Possibility of Key Dependent Encryption. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-dependent input, Black-box separations, One-way functions
30Jan Camenisch, Nishanth Chandran, Victor Shoup A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Su-Wan Park, Sang-Uk Shin Combined Scheme of Encryption and Watermarking in H.264/Scalable Video Coding (SVC). Search on Bibsonomy New Directions in Intelligent Interactive Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Watermarking, Contents protection, H.264/SVC
30Vincenzo Iovino, Giuseppe Persiano Hidden-Vector Encryption with Groups of Prime Order. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Yongliang Xiao, Limin Xia A New Hyper-Chaotic Algorithm for Image Encryption. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Carmine Ventre, Ivan Visconti Completely Non-malleable Encryption Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Dan Tang, Xiaojing Wang Image Encryption Based on Bivariate Polynomials. Search on Bibsonomy CSSE (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Jianhong Zhang, Cheng Ji On the Security of two Authenticated Encryption Schemes. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30R. Charles KARIS: A multiple-scheme framework for encryption based on an annotation model for enhanced information security. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Alexandra Boldyreva, Serge Fehr, Adam O'Neill On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
30Nithin M. Thomas, Damien Lefol, David R. Bull, David W. Redmill A Novel Secure H.264 Transcoder using Selective Encryption. Search on Bibsonomy ICIP (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Andrew Kingston, Simone Colosimo, Patrizio Campisi, Florent Autrusseau Lossless Image Compression and Selective Encryption using a Discrete Radon Transform. Search on Bibsonomy ICIP (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. Search on Bibsonomy ICIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Lanxiang Chen, Dan Feng 0001, Lingfang Zeng, Yu Zhang A Direction to Avoid Re-encryption in Cryptographic File Sharing. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FPGA, access control, ASIC, cryptographic file system
30Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly. Search on Bibsonomy MICRO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Jun Furukawa 0001, Nuttapong Attrapadung Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box
30Aggelos Kiayias, Yiannis Tsiounis, Moti Yung Group Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Shiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Mehran Mozaffari Kermani, Arash Reyhani-Masoleh A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez A Comparison of Two Approaches Providing Data Encryption and Authentication on a Processor Memory Bus. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Eike Kiltz Chosen-Ciphertext Security from Tag-Based Encryption. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Walid Bagga, Refik Molva Collusion-Free Policy-Based Encryption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Policy, Credentials, Pairing-Based Cryptography
30Ryotaro Hayashi 0001, Keisuke Tanaka PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Alexander Wong, William D. Bishop Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption. Search on Bibsonomy CRV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Chenyu Yan, Daniel Englender, Milos Prvulovic, Brian Rogers, Yan Solihin Improving Cost, Performance, and Security of Memory Encryption and Authentication. Search on Bibsonomy ISCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Himanshu Khurana, Jin Heo, Meenal Pant From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Kikuko Kamisaka, Masato Oguchi, Saneyasu Yamaguchi Performance Evaluation of iSCSI System Optimized for Encryption Processing in the Upper Layer. Search on Bibsonomy ICDE Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Tianbo Lu, Binxing Fang, Yuzhong Sun, Li Guo 0001 Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Kyoungwoo Lee, Nikil D. Dutt, Nalini Venkatasubramanian An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Amit Sahai, Brent Waters Fuzzy Identity-Based Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Chi-Jen Lu Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Everlasting security, List-decodable codes, Expander graphs, Randomness extractors, Bounded-storage model
30Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Craig Gentry, Zulfikar Ramzan RSA Accumulator Based Broadcast Encryption. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Ran Canetti, Shai Halevi, Jonathan Katz Chosen-Ciphertext Security from Identity-Based Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Cynthia Dwork, Moni Naor, Omer Reingold Immunizing Encryption Schemes from Decryption Errors. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Zheng Liu, Xue Li 0001 Motion Vector Encryption in Multimedia Streaming. Search on Bibsonomy MMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Craig Gentry Certificate-Based Encryption and the Certificate Revocation Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Yevgeniy Dodis, Jee Hea An Concealment and Its Applications to Authenticated Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Jonathan Katz Binary Tree Encryption: Constructions and Applications. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Hui-Feng Huang, Chin-Chen Chang 0001 An Efficient Convertible Authenticated Encryption Scheme and Its Variant. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Chi-Jen Lu Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
30Mihir Bellare, Amit Sahai Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
30Yiannis Tsiounis, Moti Yung On the Security of ElGamal Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
30Matthew K. Franklin, Stuart Haber Joint Encryption and Message-Efficient Secure Computation. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
30Ralph C. Merkle Fast Software Encryption Functions. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
30Yu Chen 0003, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen 0001 Identity-based encryption based on DHIES. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DHIES, combination, identity-based encryption, bilinear map
30Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf PBES: a policy based encryption system with application to data sharing in the power grid. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-party data sharing, phasor measurement units (PMUs), policy based encryption, power grid
30Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conditional proxy re-encryption, random oracle, chosen-ciphertext security
30Eike Kiltz, Krzysztof Pietrzak On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Padding-based encryption, ideal trapdoor permutations, black-box, OAEP
30Benoît Libert, Damien Vergnaud Adaptive-ID Secure Revocable Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provable security, revocation, Identity-based encryption
30Zhiming Qu, Tongbin Ma, Yunlong Zhang Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parameter modulation, chaotic encryption, security, E-commerce
30Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters Black-box accountable authority identity-based encryption. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF accountable authority, identity-based encryption
30Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade 0001, Yassine Lakhnech Towards automated proofs for asymmetric encryption schemes in the random oracle model. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF asymmetric encryption, automated proofs, provable security, hoare logics, random oracle model
30Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data
30Tetsu Iwata Authenticated Encryption Mode for Beyond the Birthday Bound Security. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher
30Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Practical Deniable Encryption. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF deniable encryption
30George Danezis Breaking four mix-related schemes based on Universal Re-encryption. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Universal re-encryption, Traffic analysis, Anonymous communications
30Jian Weng 0001, Shengli Liu 0001, Kefei Chen Pirate decoder for the broadcast encryption schemes from Crypto 2005. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pirate decoder, broadcast encryption, traitor tracing
30Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001 Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, Bilinear Maps, Chosen Ciphertext Security
30Benoît Libert, Jean-Jacques Quisquater, Moti Yung Parallel Key-Insulated Public Key Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel key-insulated encryption, standard model, pairings
30Chen Dong 0008, Jifang Li, Lifeng Xi, Jie Hao, Ran Jin Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Kolmogorov flow, Liu chaotic system, Image encryption, Chaotic
30Gary S.-W. Yeo, Raphael Chung-Wei Phan On the security of the WinRAR encryption feature. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Encryption feature, WinRAR, WinZip, Compression, Attacks
30Geoffrey Smith 0001, Rafael Alpízar Secure information flow with random assignment and encryption. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow
30Feiyu Lei, Wen Chen 0001, Kefei Chen A Non-committing Encryption Scheme Based on Quadratic Residue. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF non-committing encryption, information security, multiparty computation, adaptive security, quadratic residue
30Kenneth G. Paterson, Arnold K. L. Yau Cryptography in Theory and Practice: The Case of Encryption in IPsec. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrity, encryption, IPsec, ESP
30Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure
30Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Non-interactive Zero-knowledge Proofs, Public-key Encryption, Semantic Security, Non-malleability
30Jinyong Fang, Jun Sun 0005 A Format-Compliant Encryption Framework for JPEG2000 Image Code-Streams in Broadcasting Applications. Search on Bibsonomy PCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Format-Compliant encryption, JPSEC, Broadcasting application, JPEG2000
30Jen-Chieh Lai, Chia-Hui Wang Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. Search on Bibsonomy PSIVT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD
30Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez A parallelized way to provide data encryption and integrity checking on a processor-memory bus. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bus encryption, data confidentiality and integrity, architectures
30Byeong Kil Lee, Lizy Kurian John Implications of Executing Compression and Encryption Applications on General Purpose Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Media compression, memory behavior, MediaZip benchmark, overhead memory bandwidth, encryption, encoding, decoding, workload characterization, decryption
30Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros Untraceable RFID tags via insubvertible encryption. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RFID privacy, universal re-encryption, bilinear maps
30Lars Eilebrecht Ciphire Mail Email Encryption and Authentication. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ciphire, secure email, email encryption, email authentication, fingerprint system, digital signatures, fingerprints, certificates, PKI
30Serge Mister, Robert J. Zuccherato An Attack on CFB Mode Encryption as Used by OpenPGP. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cipher-Feedback Mode, encryption, chosen-ciphertext attacks, OpenPGP
30Hsiao-Ying Lin, Wen-Guey Tzeng An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF the greater than problem, the socialist millionaires problem homomorphic encryption, secure computation
Displaying result #201 - #300 of 21739 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license