The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Inscrypt"( http://dblp.L3S.de/Venues/Inscrypt )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cisc

Publication years (Num. hits)
2006 (24) 2007 (41) 2008 (32) 2009 (33) 2010 (35) 2011 (28) 2012 (24) 2013 (26) 2014 (30) 2015 (28) 2016 (33) 2017 (31) 2018 (38) 2019 (34) 2020 (33) 2021 (30) 2022 (26) 2023 (1)
Publication types (Num. hits)
inproceedings(510) proceedings(17)
Venues (Conferences, Journals, ...)
Inscrypt(527)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 197 occurrences of 155 keywords

Results
Found 527 publication records. Showing 527 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Shaomei Wang, Tingting Cui, Meiqin Wang Improved Differential Cryptanalysis of CAST-128 and CAST-256. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jingguo Bi, Jiayang Liu, Xiaoyun Wang 0001 Cryptanalysis of a Homomorphic Encryption Scheme Over Integers. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yu Wang 0114, Yun Cao, Xianfeng Zhao Video Steganalysis Based on Centralized Error Detection in Spatial Domain. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jinhui Liu, Huanguo Zhang, Jianwei Jia A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hong Rong, Huimei Wang, Jian Liu 0024, Wei Wu 0015, Jialu Hao, Ming Xian Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar 0002, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya SPF: A New Family of Efficient Format-Preserving Encryption Algorithms. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yafei Zheng, Wenling Wu Biclique Attack of Block Cipher SKINNY. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenpan Jing, Xianhui Lu, Bao Li 0001 Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Deepak Kumar Dalai, Pinaki Sarkar Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Goutam Paul 0001, Abhiroop Sanyal Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xuan Shen, Guoqiang Liu, Bing Sun 0001, Chao Li 0002 Impossible Differentials of SPN Ciphers. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Seiko Arita, Shota Nakasato Fully Homomorphic Encryption for Point Numbers. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiaona Zhang, Li-Ping Wang Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier Polynomial. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shiwei Zhang, Yi Mu 0001, Guomin Yang Achieving IND-CCA Security for Functional Encryption for Inner Products. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zengpeng Li, Chunguang Ma, Eduardo Morais, Gang Du Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -Based. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dongdai Lin, XiaoFeng Wang 0001, Moti Yung (eds.) Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xinghua Wu, Aixin Zhang, Jianhua Li 0001, Weiwei Zhao, Yuchen Liu 0001 A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aysajan Abidin On Privacy-Preserving Biometric Authentication. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang 0006 Codes for Detection of Limited View Algebraic Tampering. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cong Chen, Dongdai Lin Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Meng Zhang, Zhi Hu, Maozhi Xu On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with \rho =1. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiu Xu, Wei Yu 0008, Kunpeng Wang, Xiaoyang He Constructing Isogenies on Extended Jacobi Quartic Curves. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiao Lan, Jing Xu 0002, Hui Guo, Zhenfeng Zhang One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jialin Huang, Hailun Yan, Xuejia Lai Transposition of AES Key Schedule. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liqiang Peng, Lei Hu, Yao Lu 0002, Hongyun Wei An Improved Analysis on Three Variants of the RSA Cryptosystem. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wen Gao 0010, Yupu Hu, Baocang Wang, Jia Xie Identity-Based Blind Signature from Lattices in Standard Model. Search on Bibsonomy Inscrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Changlu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu 0010 A Provable Data Possession Scheme with Data Hierarchy in Cloud. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Manuel Huber 0001, Julian Horsch, Michael Velten, Michael Weiß, Sascha Wessel A Secure Architecture for Operating System-Level Virtualization on Mobile Devices. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jincheng Zhuang, Qi Cheng 0001 On Generating Coset Representatives of PGL2(Fq) in PGL2(Fq2). Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yang Tan, Shaohua Tang Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature Generation. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huaqun Wang, Debiao He Proxy Provable Data Possession with General Access Structure in Public Clouds. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaona Zhang, Li-Ping Wang, Jun Xu 0022, Lei Hu, Liqiang Peng, Zhangjie Huang, Zeyi Liu Recovering a Sum of Two Squares Decomposition Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Houda Ferradi, Rémi Géraud, David Naccache Slow Motion Zero Knowledge Identifying with Colliding Commitments. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ling Sun 0001, Kai Fu, Meiqin Wang Improved Zero-Correlation Cryptanalysis on SIMON. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yi Tang 0001, Manjia Lin EQPO: Obscuring Encrypted Web Traffic with Equal-Sized Pseudo-Objects. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jian Liu 0004, Sihem Mesnager, Lusheng Chen Secret Sharing Schemes with General Access Structures. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaochao Sun, Bao Li 0001, Xianhui Lu, Fuyang Fang CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wenbin Zhang 0003, Chik How Tan A Secure Variant of Yasuda, Takagi and Sakurai's Signature Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fatih Kiliç, Hannes Laner, Claudia Eckert 0001 Interactive Function Identification Decreasing the Effort of Reverse Engineering. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xuyun Nie, Bo Liu, Hu Xiong, Gang Lu Cubic Unbalance Oil and Vinegar Signature Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shiwei Zhang, Yi Mu 0001, Guomin Yang Threshold Broadcast Encryption with Keyword Search. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dongdai Lin, Moti Yung, Jianying Zhou 0001 (eds.) Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaoyang He, Wei Yu 0008, Kunpeng Wang Hashing into Generalized Huff Curves. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiangjun Wu, Haibin Kan A Blind Dual Color Images Watermarking Method via SVD and DNA Sequences. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan Hajny, Petr Dzurenda, Lukas Malina Privacy-Enhanced Data Collection Scheme for Smart-Metering. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ling Cheng, Wentao Zhang, Zejun Xiang 0001 A New Cryptographic Analysis of 4-bit S-Boxes. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Menghao Li, Liang Yang 0002, Zimu Yuan, Rui Zhang 0016, Rui Xue 0001 An Approach for Mitigating Potential Threats in Practical SSO Systems. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Samiran Bag, Sushmita Ruj, Kouichi Sakurai On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daiyong Quan, Lihua Yin, Yunchuan Guo Assessing the Disclosure of User Profile in Mobile-Aware Services. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weixuan Li, Wei Yu 0008, Kunpeng Wang Improved Tripling on Elliptic Curves. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh Accurate Estimation of the Full Differential Distribution for General Feistel Structures. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peili Li, Haixia Xu 0002, Yuanyuan Ji Multi-client Outsourced Computation. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stian Fauskanger, Igor A. Semaev Statistical and Algebraic Properties of DES. Search on Bibsonomy Inscrypt The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bei Liang, Rui Zhang, Hongda Li 0001 Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ning Ding 0001 Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weiwei Liu 0005, Yi Mu 0001, Guomin Yang An Efficient Privacy-Preserving E-coupon System. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tao Zhang 0014, Sherman S. M. Chow Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fei Tang, Hongda Li 0001 Ring Signatures of Constant Size Without Random Oracles. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Song Tian, Kunpeng Wang, Bao Li 0001, Wei Yu 0008 A Note on Diem's Proof. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jean-Marc Robert 0003 Parallelized Software Implementation of Elliptic Curve Scalar Multiplication. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yonglin Hao The Boomerang Attacks on BLAKE and BLAKE2. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhenzhen Bao, Wentao Zhang, Dongdai Lin Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fuqun Wang, Kunpeng Wang Fully Homomorphic Encryption with Auxiliary Inputs. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhen Liu 0008, Zhenfu Cao, Duncan S. Wong Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lucjan Hanzlik, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Stand-by Attacks on E-ID Password Authentication. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vandana Guleria, Ratna Dutta Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ioana Boureanu, Serge Vaudenay Optimal Proximity Proofs. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hongliang Liang, Changyao Han, Daijie Zhang, Dongyang Wu A Lightweight Security Isolation Approach for Virtual Machines Deployment. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dongdai Lin, Shouhuai Xu, Moti Yung (eds.) Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhangjie Huang, Lei Hu, Jun Xu 0022 Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Constantinos Patsakis, Michael Clear, Paul Laird Private Aggregation with Custom Collusion Tolerance. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hongbo Yu, Dongxia Bai Boomerang Attack on Step-Reduced SHA-512. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Riham AlTawy, Amr M. Youssef Second Preimage Analysis of Whirlwind. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1James Alderman, Christian Janson, Carlos Cid, Jason Crampton Revocation in Publicly Verifiable Outsourced Computation. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Debjyoti Bhattacharjee, Anupam Chattopadhyay Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow Trapdoors for Ideal Lattices with Applications. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Rig: A Simple, Secure and Flexible Design for Password Hashing. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paolo Palmieri 0001, Luca Calderoni, Dario Maio Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Denisse Muñante Arzapalo, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Changji Wang, Xi-Lei Xu, Yuan Li, Dong-Yuan Shi Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Neel Bedekar, Chiranjit Shee A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liangze Li, Hongfeng Wu, Fan Zhang Pairing Computation on Edwards Curves with High-Degree Twists. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Deng Tang, Xiaohu Tang, Qunying Liao New Construction of Differentially 4-Uniform Bijections. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chunming Tang 0001, Yu Lou, Yanfeng Qi, Maozhi Xu, Baoan Guo A Note on Semi-bent and Hyper-bent Boolean Functions. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhengjun Cao, Frédéric Lafitte, Olivier Markowitch A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dingding Jia, Bao Li 0001, Xianhui Lu, Yamin Liu RSA-OAEP is RKA Secure. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang 0002 Automatic Detection and Analysis of Encrypted Messages in Malware. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shengli Liu 0001, Kouichi Sakurai, Jian Weng 0001, Fangguo Zhang, Yunlei Zhao Security Model and Analysis of FHMQV, Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suvadeep Hajra, Debdeep Mukhopadhyay Multivariate Leakage Model for Improving Non-profiling DPA on Noisy Power Traces. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng A Practical Attack on Patched MIFARE Classic. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jianqin Zhou, Wanquan Liu, Guanglu Zhou Cube Theory and Stable k -Error Linear Complexity for Periodic Sequences. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wenling Wu, Shuang Wu 0004, Lei Zhang 0012, Jian Zou, Le Dong LHash: A Lightweight Hash Function. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kai Chen, Dongdai Lin, Li Yan, Xin Sun Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac 0001 One-Time Programs with Limited Memory. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Siwei Sun, Lei Hu, Ling Song 0001, Yonghong Xie, Peng Wang 0009 Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yunqing Xu On the Key-Stream Periods Probability of Edon80. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hongliang Liang, Yu Dong, Bin Wang, Shuchang Liu 0005 EAdroid: Providing Environment Adaptive Security for Android System. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 527 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license