|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3849 occurrences of 1722 keywords
|
|
|
Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter |
Towards practical biometric key generation with randomized biometric templates. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
biometrics, cryptographic keys |
27 | Qi Dong 0001, Donggang Liu |
Using Auxiliary Sensors for Pairwise Key Establishment in WSN. |
Networking |
2007 |
DBLP DOI BibTeX RDF |
sensor networks, Key management, pairwise keys |
27 | Wen-Shenq Juang |
A Simple and Efficient Conference Scheme for Mobile Communications. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys |
27 | Matt Blaze, Joan Feigenbaum, Moni Naor |
A Formal Treatment of Remotely Keyed Encryption. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
Remotely Keyed Encryption, Smart-cards, Block Ciphers, Pseudorandomness, Session Keys |
27 | Lawrence C. Paulson |
Mechanized proofs for a recursive authentication protocol. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys |
27 | Lars R. Knudsen, Willi Meier |
Improved Differential Attacks on RC5. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys |
27 | Jae-dong Lee, Kenneth E. Batcher |
A bitonic sorting network with simpler flip interconnections. |
ISPAN |
1996 |
DBLP DOI BibTeX RDF |
flip interconnections, bitonic sorting network, inter-level wiring, parity technique, Construct-BSMF, N/2 even-parity keys, interconnection scheme, perfect-shuffle interconnection, parallel algorithms, parallel architectures, multiprocessor interconnection networks, sorting |
27 | Jean-Loup Baer, Yi-Bing Lin |
Improving Quicksort Performance with a Codewort Data Structure. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
codeword data structure, long, alphanumeric sequences, bytes, codeword generator, character count, first nonequal byte, quicksort algorithm, architecture-dependent parameters, in-line expansion, data structures, caches, sorting, compiler optimizations, register allocation, performance improvement, ordering, pointer, records, keys, swaps, write policies |
27 | Tom Tedrick |
Fair Exchange of Secrets. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
Exchange of Secret Keys, Exchange of Secrets, Fractions of a Bit, Cryptographic Protocols, Oblivious Transfer, Contract Signing |
26 | DongSheng Cai, S. Goto, T. Shinohara, Noriko Nagata, Jun Kurumisawa, Asako Fukumoto |
Synesthetic color scheme in Fantasia. |
SIGGRAPH Talks |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Yongzhuang Wei, YuPu Hu |
New related-key rectangle attacks on reduced AES-192 and AES-256. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack |
26 | Georg Gottlob, Stephanie Tien Lee, Gregory Valiant |
Size and treewidth bounds for conjunctive queries. |
PODS |
2009 |
DBLP DOI BibTeX RDF |
size bounds, database theory, conjunctive queries, treewidth |
26 | Luis Carlos Coronado García, Carlos Hernández-López, Carlos Pérez Leguízamo |
Autonomous Decentralized Root Certification Authority System. |
ICDCS Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Youn Joo Lee, Kang Ryoung Park, Sung Joo Lee, Kwanghyuk Bae, Jaihie Kim |
A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System. |
IEEE Trans. Syst. Man Cybern. Part B |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Haina Zhang, Lin Li, Xiaoyun Wang 0001 |
Fast correlation attack on stream cipher ABC v3. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
ABC v3, cryptanalysis, stream cipher, fast correlation attack |
26 | Weiguo Sheng, Gareth Howells 0001, Michael C. Fairhurst, Farzin Deravi |
Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry |
A key loss recovery scheme for secure broadcasts in wireless sensor networks. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Ivan Damgård, Michael Østergaard Pedersen |
RFID Security: Tradeoffs between Security and Efficiency. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Ratna Dutta, Yongdong Wu, Sourav Mukhopadhyay |
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Sajid Hussain, Firdous Kausar, Ashraf Masood |
An efficient key distribution scheme for heterogeneous sensor networks. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
security, key distribution, heterogeneous sensor networks, random key pre-distribution |
26 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
ID-based Encryption, Pairing |
26 | Philip Zigoris, Hongxia Jin |
Bayesian Methods for Practical Traitor Tracing. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Gwan-Hwan Hwang, Yu-Hsuan Chang, Tao-Ku Chang |
An Operational Model and Language Support for Securing Web Services. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Seok-Lae Lee, Bo-Sung Hwang, Joo-Seok Song |
A Secure Communication Scheme for Mobile Wireless Sensor Networks Using Hamming Distance. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
Sensor Network, Public-Key Cryptography, Hamming Distance, Symmetric cryptography |
26 | Sari Suomela, Jaana Kekäläinen |
User evaluation of ontology as query construction tool. |
Inf. Retr. |
2006 |
DBLP DOI BibTeX RDF |
Ontologies, User evaluation, Interactive information retrieval |
26 | Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bhargava |
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar |
Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. |
Intelligent Information Processing |
2006 |
DBLP DOI BibTeX RDF |
Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES |
26 | Konstantinos Chalkias, George Stephanides |
Timed Release Cryptography from Bilinear Pairings Using Hash Chains. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
Timed-Release Cryptography, S/Key, bilinear pairings, hash chains, sealed-bid auctions |
26 | Teng Lv, Ping Yan |
Mapping Relational Schemas to XML DTDs with Constraints. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Avishai Wool |
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. |
Wirel. Networks |
2005 |
DBLP DOI BibTeX RDF |
security, authentication |
26 | Donggang Liu, Peng Ning |
Improving key predistribution with deployment knowledge in static sensor networks. |
ACM Trans. Sens. Networks |
2005 |
DBLP DOI BibTeX RDF |
Sensor networks, key management, key predistribution |
26 | Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy |
Key management in wireless ad hoc networks: collusion analysis and prevention. |
IPCCC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Teng Lv, Ping Yan, Qiongxiang Huang |
Relational to XML Schema Conversion with Constraints. |
ASIAN |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang |
t-Out-of-n String/Bit Oblivious Transfers Revisited. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Pan Wang, Peng Ning, Douglas S. Reeves |
Network Access Control for Mobile Ad-Hoc Networks. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo |
Design of Self-Healing Key Distribution Schemes. |
Des. Codes Cryptogr. |
2004 |
DBLP DOI BibTeX RDF |
group communication, key distribution, self-healing |
26 | Pan Wang, Peng Ning, Douglas S. Reeves |
Storage-Efficient Stateless Group Key Revocation. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Fabius Klemm, Anwitaman Datta, Karl Aberer |
A Query-Adaptive Partial Distributed Hash Table for Peer-to-Peer Systems. |
EDBT Workshops |
2004 |
DBLP DOI BibTeX RDF |
partial distributed hash table (PDHT), query-adaptive indexing, metadata, peer-to-peer (P2P) |
26 | Olivier Billet, Henri Gilbert |
A Traceable Block Cipher. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance |
26 | Donggang Liu, Peng Ning |
Location-based pairwise key establishments for static sensor networks. |
SASN |
2003 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
26 | Adrian von Bidder, Nathalie Weiler |
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
Secure Synchronisation Protocol, E-Mail Security, OpenPGP, Keyserver |
26 | Scott Lystig Fritchie |
A study of Erlang ETS table implementations and performance. |
Erlang Workshop |
2003 |
DBLP DOI BibTeX RDF |
Judy array, in-memory database, Erlang, B-tree, hash table, AVL tree |
26 | Dani Halevy, Adi Shamir |
The LSD Broadcast Encryption Scheme. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Pierangela Samarati, Michael K. Reiter, Sushil Jajodia |
An authorization model for a public key management service. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
authorizations specification and enforcement, Access control, public key infrastructure |
26 | Sandro Rafaeli, Laurent Mathy, David Hutchison 0001 |
EHBT: An Efficient Protocol for Group Key Management. |
Networked Group Communication |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Shin-Jae Lee, Minsoo Jeon, Andrew Sohn, Dongseung Kim |
Partitioned Parallel Radix Sort. |
ISHPC |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Lars R. Knudsen, Willi Meier |
Correlations in RC6 with a Reduced Number of Rounds. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6 |
26 | David Chaum |
How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
25 | Miika Hannula, Jef Wijsen |
A Dichotomy in Consistent Query Answering for Primary Keys and Unary Foreign Keys. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Miika Hannula, Jef Wijsen |
A Dichotomy in Consistent Query Answering for Primary Keys and Unary Foreign Keys. |
PODS |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Eugen Antal, Jakub Mírka |
Wrong Design of Cipher Keys: Analysis of Historical Cipher Keys From the Hessisches Staatsarchiv Marburg Used in the Thirty Years' War. |
HistoCrypt |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Manuel Atencia, Jérôme David, Jérôme Euzenat |
On the relation between keys and link keys for data interlinking. |
Semantic Web |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Renzo Angles, Angela Bonifati, Stefania Dumbrava, George Fletcher 0001, Keith W. Hare, Jan Hidders, Victor E. Lee, Bei Li, Leonid Libkin, Wim Martens, Filip Murlak, Josh Perryman, Ognjen Savkovic, Michael Schmidt, Juan F. Sequeda, Slawek Staworko, Dominik Tomaszuk |
PG-Keys: Keys for Property Graphs. |
SIGMOD Conference |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Heini Bergsson Debes, Thanassis Giannetsos |
Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems. |
DCOSS |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Adam Janovsky, Matús Nemec, Petr Svenda, Peter Sekan, Vashek Matyas |
Biased RSA private keys: Origin attribution of GCD-factorable keys. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
25 | Arjit Arora, Kalpit Kothari, Priyanka Joshi, Bodhisatwa Mazumdar |
Revisiting Persistent Fault Analysis: Assessing Weak Keys and Strong Keys in GIFT-64 Lightweight Cipher. |
AsianHOST |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Adam Janovsky, Matús Nemec, Petr Svenda, Peter Sekan, Vashek Matyas |
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys. |
ESORICS (2) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Panos Vassiliadis, Michail-Romanos Kolozoff, Maria Zerva, Apostolos V. Zarras |
Schema evolution and foreign keys: a study on usage, heartbeat of change and relationship of foreign keys to table activity. |
Computing |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Kwangsu Lee, Seunghwan Park |
Revocable hierarchical identity-based encryption with shorter private keys and update keys. |
Des. Codes Cryptogr. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Kwangsu Lee, Seunghwan Park |
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
25 | Olivier Marchal |
Locks and keys: How fast can you open several locks with too many keys? |
CoRR |
2015 |
DBLP BibTeX RDF |
|
25 | Jos Wetzels |
Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
25 | Manuel Atencia, Jérôme David, François Scharffe |
Keys and Pseudo-Keys Detection for Web Datasets Cleansing and Interlinking. |
EKAW |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Tetsuaki Baba, Taketoshi Ushiama, Kiyoshi Tomimatsu |
Emerging keys: interactive electromagnetic levitation keys. |
SIGGRAPH Posters |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ido Bregman |
Public keys and private keys in quantum cryptography (מפתחות פומביים ומפתחות פרטיים בקריפטוגרפיה קוונטית.). |
|
2008 |
RDF |
|
25 | Hilarie Orman, Paul E. Hoffman |
Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. |
RFC |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Qing Wang, Hongwei Wu, Jianchang Xiao, Aoying Zhou, Junmei Zhou |
Deriving Relation Keys from XML Keys. |
ADC |
2003 |
DBLP BibTeX RDF |
|
25 | Diego Calvanese, Riccardo Rosati 0001 |
Anwering Recursive Queries under Keys and Foreign Keys is Undecidable. |
KRDB |
2003 |
DBLP BibTeX RDF |
|
25 | Judy H. Moore, Gustavus J. Simmons |
Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. |
IEEE Trans. Software Eng. |
1987 |
DBLP DOI BibTeX RDF |
|
25 | Dorothy E. Denning |
Protecting Public Keys and Signature Keys. |
Computer |
1983 |
DBLP DOI BibTeX RDF |
|
23 | Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt |
Secret keys from entangled sensor motes: implementation and analysis. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
wsns, key generation |
23 | Rafael Misoczki, Paulo S. L. M. Barreto |
Compact McEliece Keys from Goppa Codes. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
23 | Pierre Colomb, Lhouari Nourine |
About Keys of Formal Context and Conformal Hypergraph. |
ICFCA |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Keith Harrison, Shouhuai Xu |
Protecting Cryptographic Keys from Memory Disclosure Attacks. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
cryptographic key security, memory disclosure |
23 | Youngwoo Yoon, Geehyuk Lee |
BetweenKeys: Looking for Room Between Keys. |
HCI (2) |
2007 |
DBLP DOI BibTeX RDF |
chord keyboard, key overlap, key stroke timing, Hangul / English toggling, keyboard |
23 | Cécile Delerablée, Pascal Paillier, David Pointcheval |
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar |
E-Passport: Cracking Basic Access Control Keys. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
MRTD, Basic Access Control, Key Search Machine, COPACOBANA, DES, SHA-1, E-Passport |
23 | Rami El Sawda, Ayman Alfalou, Habib Hamam |
RGB Colored Image Encryption Processes Using Several Colored Keys Images. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Yanchao Zhang, Wei Liu 0008, Wenjing Lou, Yuguang Fang |
Securing Mobile Ad Hoc Networks with Certificateless Public Keys. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
security, Mobile ad hoc networks, key management, secret sharing, ID-based cryptography |
23 | Wontae Hwang, Dongseung Kim |
Load Balanced Block Lanczos Algorithm over GF(2) for Factorization of Large Keys. |
HiPC |
2006 |
DBLP DOI BibTeX RDF |
parallel/cluster computing, RSA key, load balancing, sparse matrix, cryptology |
23 | Nuttapong Attrapadung, Jun Furukawa 0001, Hideki Imai |
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Dan Boneh, Amit Sahai, Brent Waters |
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Taisya Krivoruchko, James Diamond, Jeff Hooper |
Storing RSA Private Keys In Your Head. |
PRDC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Christopher Wolf, Bart Preneel |
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Public Key Schemes, Multivariate Quadratic Equations |
23 | Dan Boneh, Craig Gentry, Brent Waters |
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Allan Beaufour, Philippe Bonnet |
Personal Servers as Digital Keys. |
PerCom |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Yevgeniy Dodis, Leonid Reyzin, Adam D. Smith |
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Arnaud Dury |
Peer-to-Peer Computing in Distributed Hash Table Models Using a Consistent Hashing Extension for Access-Intensive Keys. |
AP2PC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Arnaud Dury |
Balancing Access To Highly Accessed Keys In Peer-to-Peer Systems. |
IEEE SCC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Dalit Naor, Moni Naor |
Protecting Cryptographic Keys: The Trace-and-Revoke Approach. |
Computer |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Donggang Liu, Peng Ning |
Establishing pairwise keys in distributed sensor networks. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
sensor networks, key management, probabilistic key sharing |
23 | Viet Phan Luong |
The Closed Keys Base of Frequent Itemsets. |
DaWaK |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Philip Bohannon, Peter McIlroy, Rajeev Rastogi |
Main-Memory Index Structures with Fixed-Size Partial Keys. |
SIGMOD Conference |
2001 |
DBLP DOI BibTeX RDF |
T-tree, main-memory indices, cache coherence, B-trees, key compression |
23 | Guillaume Poupard, Jacques Stern |
Fair Encryption of RSA Keys. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Roberto Grossi, Giuseppe F. Italiano |
Efficient Techniques for Maintaining Multidimensional Keys in Linked Data Structures. |
ICALP |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Joan Daemen |
Management of Secret Keys: Dynamic Key Handling. |
State of the Art in Applied Cryptography |
1997 |
DBLP DOI BibTeX RDF |
|
23 | Pilar de la Torre, David T. Kao |
A Uniform Analysis of Trie Structures that Store Prefixing-Keys with Application to Doubly-Chained Prefixing-Tries. |
MFCS |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Mike Burmester |
On the Risk of Opening Distributed Keys. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 4919 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|