The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase S/Key (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1961 (38) 1962-1967 (15) 1968-1971 (15) 1972-1975 (23) 1976 (23) 1977-1978 (30) 1979 (23) 1980 (26) 1981 (25) 1982 (53) 1983 (44) 1984 (69) 1985 (89) 1986 (62) 1987 (110) 1988 (114) 1989 (186) 1990 (170) 1991 (144) 1992 (158) 1993 (203) 1994 (264) 1995 (365) 1996 (457) 1997 (522) 1998 (621) 1999 (881) 2000 (1219) 2001 (1632) 2002 (1849) 2003 (2429) 2004 (3346) 2005 (4194) 2006 (4700) 2007 (5290) 2008 (5168) 2009 (3729) 2010 (1592) 2011 (1223) 2012 (1158) 2013 (1296) 2014 (1347) 2015 (1422) 2016 (1724) 2017 (1551) 2018 (1665) 2019 (1786) 2020 (1898) 2021 (2024) 2022 (1948) 2023 (2119) 2024 (569)
Publication types (Num. hits)
article(19865) book(46) data(5) incollection(453) inproceedings(40846) phdthesis(295) proceedings(98)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 41555 occurrences of 11846 keywords

Results
Found 61687 publication records. Showing 61608 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Peter Scholl Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Xiong Fan, Qiang Tang 0005 Making Public Key Functional Encryption Function Private, Distributively. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Benedikt Auerbach, Mihir Bellare, Eike Kiltz Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Takahiro Matsuda 0002, Jacob C. N. Schuldt Related Randomness Security for Public Key Encryption, Revisited. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Lin Lyu 0001, Shengli Liu 0001, Shuai Han 0001, Dawu Gu Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Rishab Goyal, Venkata Koppula, Brent Waters Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Wutichai Chongchitmate, Rafail Ostrovsky Circuit-Private Multi-key FHE. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Jie Chen 0021, Junqing Gong 0001, Jian Weng 0001 Tightly Secure IBE Under Constant-Size Master Public Key. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan 0001 On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou Leakage-Resilient Public-Key Encryption from Obfuscation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Yohei Watanabe 0001, Junji Shikata Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi On Public Key Encryption from Noisy Codewords. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Ran Canetti, Daniel Shahaf, Margarita Vald Universally Composable Authentication and Key-Exchange with Global PKI. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Michel Abdalla, Fabrice Benhamouda, David Pointcheval Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Florian Bergsma, Tibor Jager, Jörg Schwenk One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Shengli Liu 0001, Kenneth G. Paterson Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge On the Selective Opening Security of Practical Public-Key Encryption Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Nico Döttling Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn Related Randomness Attacks for Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Stefano Tessaro, David A. Wilson Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Baodong Qin, Shengli Liu 0001 Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Yong Li 0021, Sven Schäge, Zheng Yang 0005, Florian Kohlar, Jörg Schwenk On the Security of the Pre-shared Key Ciphersuites of TLS. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Dana Dachman-Soled On Minimal Assumptions for Sender-Deniable Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Eduarda S. V. Freire 0001, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson Non-Interactive Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Takahiro Matsuda 0002, Goichiro Hanaoka Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda 0002, Shota Yamada 0001 Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang Public-Key Cryptography from New Multivariate Quadratic Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31David Pointcheval Password-Based Authenticated Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Koichi Sakumoto Public-Key Identification Schemes Based on Multivariate Cubic Polynomials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Charanjit S. Jutla, Arnab Roy 0001 Relatively-Sound NIZKs and Password-Based Key-Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee Efficient Password Authenticated Key Exchange via Oblivious Transfer. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
31Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann 0001 Linear Recurring Sequences for the UOV Key Generation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Shai Halevi, Hugo Krawczyk One-Pass HMQV and Asymmetric Key-Wrapping. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Nigel P. Smart, Frederik Vercauteren Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson Proxy Signatures Secure Against Proxy Key Exposure. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provable security, proxy signatures
31Noboru Kunihiro, Kaoru Kurosawa Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, factoring, LLL algorithm
31Arjen K. Lenstra, Eric R. Verheul Selecting Cryptographic Key Sizes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Wen-Guey Tzeng A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson Key Recovery in Third Generation Wireless Communication Systems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Wu Wen, Takamichi Saito, Fumio Mizoguchi Security of Public Key Certificate Based Authentication Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Reto Kohlas, Ueli M. Maurer Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia Efficient and secure keys management for wireless mobile communications. Search on Bibsonomy POMC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF backward secrecy, network dynamics management, cryptography, distributed algorithms, wireless communications, key distribution, secure multicast, forward secrecy, collusion, key generation, key management protocol
31Adam L. Young, Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone
31Mi Wen, Jingsheng Lei, Zhong Tang, Xiuxia Tian, Kefei Chen, Weidong Qiu A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks (WSNs), Authentication, Continuity, Group key agreement, Group key
31Nguyen Thi Thanh Huyen, Eui-nam Huh An efficient signal range based key pre-distribution scheme ensuring the high connectivity in wireless sensor network. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, wireless sensor network, key management, key pre-distribution
31Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure
31Yongtae Kim, Chang Han Kim, Taek-Young Youn On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key generation algorithm, Class semigroup, Key exchange system, Hierarchy
31Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang 0001 Supervising Secret-Key Agreements in a Level-Based Hierarchy. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF level-based hierarchy, session key, Secret-key agreement
31Wen-Guey Tzeng A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptographic key assignment, secure broadcasting, cryptographic key backup, access control
31Laurent Eschenauer, Virgil D. Gligor A key-management scheme for distributed sensor networks. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF sensor networks, key management, random graphs, probabilistic key sharing
31Wei Xiong 0009, John Chung-Mong Lee, Ruihua Ma Automatic video data structuring through shot partitioning and key-frame computing. Search on Bibsonomy Mach. Vis. Appl. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Automatic video data structuring, Video partitioning, Image similarity measure, Invariant parameters, Key-frame computing, Key-frame pruning, Wavelet
30Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF session key distribution, sensor network, computational security, self-healing, revocation
30Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Timed-Release and Key-Insulated Public Key Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF timed-release, key-insulated encryption, authenticated encryption
30Miodrag J. Mihaljevic Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stateless receivers, time varying schemes, heterogeneous structures, tree graphs, reconfigurability, key management, broadcast encryption
30Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald Fully self-organized peer-to-peer key management for mobile ad hoc networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF crypto-based identifiers, network level key distribution, pairwise key management, peer-to-peer key management, subordinate public keys, mobile ad hoc networks, network security, self-organization, Mobile IPv6, identity-based cryptography
30Eugenio Faldella, Marco Prandini A Novel Approach to On-Line Status Authentication of Public-Key Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks
30Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen Zero-Knowledge Authentication Scheme with Secret Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Authentication, Authentication, Key exchange, Key exchange, Zero-knowledge, Zero-knowledge, Key words
30Nicolas Gama, Phong Q. Nguyen New Chosen-Ciphertext Attacks on NTRU. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Daewan Han, Myung-Hwan Kim, Yongjin Yeom Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack
30Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang Anonymous Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Liqun Chen 0002, John Malone-Lee Improved Identity-Based Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Jae Choon Cha, Jung Hee Cheon An Identity-Based Signature from Gap Diffie-Hellman Groups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GDH group, Elliptic curve, Weil pairing, ID-based signature
30Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone Validation of Elliptic Curve Public Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Adam L. Young, Moti Yung A PVSS as Hard as Discrete Log and Shareholder Separability. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
30Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa An Efficient Strong Key-Insulated Signature Scheme and Its Application. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF strong key-insulated signature, key leakage, DL assumption, random oracle model, adaptive security
30Burton S. Kaliski Jr. An unknown key-share attack on the MQV key agreement protocol. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MQV, unknown key-share attack, Key agreement, protocol design
30Jean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hardware Security Modules, Key management protocol
30Orhun Kara, Cevat Manap A New Class of Weak Keys for Blowfish. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack
30Yan Sun 0001, Wade Trappe, K. J. Ray Liu A scalable multicast key management scheme for heterogeneous wireless networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multicast key management, secure handoff, communication system security, wireless multicast
29Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Wen-Guey Tzeng, Zhi-Jia Tzeng Robust Key-Evolving Public Key Encryption Schemes. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Soichi Furuya, Kouichi Sakurai Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MAC, Block cipher, provable security, mode of operation
29Orhun Kara Reflection Cryptanalysis of Some Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack
29Sencun Zhu, Sanjeev Setia, Sushil Jajodia LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key erasure, sensor networks, key management, In-network processing, pairwise key
29Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. Search on Bibsonomy UIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Master key forward secrecy, Provable security, Weil pairing, Authenticated key agreement
29Xun Yi, Raylin Tso, Eiji Okamoto ID-Based Group Password-Authenticated Key Exchange. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF protocol compiler, common reference model, group key agreement, Password-authenticated key exchange
29Taejoon Park, Kang G. Shin Secure routing based on distributed key sharing in large-scale sensor networks. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed key sharing and servers, attack tolerance, large-scale sensor networks, secure geographic forwarding, key establishment
29Yvo Desmedt, Tanja Lange 0001 Revisiting Pairing Based Group Key Exchange. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Key Distribution, Pairings, Forward Security, Group Key Exchange
29Guomin Li, Dake He, Wei Guo Password-Based Tripartite Key Exchange Protocol with Forward Secrecy. Search on Bibsonomy RSKT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Password-based tripartite authenticated key exchange, Known key attacks, Forward secrecy
29Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu Identity-Based Threshold Key-Insulated Encryption without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold key-insulation, standard model, identity-based encryption, key-exposure
29Wenbo Shi, Injoo Jang, Hyeong Seon Yoo A Provable Secure Authentication Protocol Given Forward Secure Session Key. Search on Bibsonomy APWeb The full citation details ... 2008 DBLP  DOI  BibTeX  RDF forward secure session key, authentication, key distribution
29Nick A. Moldovyan New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF public encryption, Digital signature, public key cryptosystem, key agreement protocol
29Giovanni Di Crescenzo, Vishal Saraswat Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption
29Tarjei K. Mandt, Chik How Tan Certificateless Authenticated Two-Party Key Agreement Protocols. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear map, authenticated key agreement, Certificateless public key cryptography
29Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee 0001, Dowon Hong Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-layer ad-hoc network, pervasive computing, heterogeneous, key agreement, Password authentication, authenticated key exchange
29Depeng Li 0002, Srinivas Sampalli An efficient group key establishment in location-aided mobile ad hoc networks. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key tree, group key management, maximum matching
29Junghyun Nam, Seungjoo Kim, Dongho Won Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Group key agreement, collusion attack, key authentication
Displaying result #201 - #300 of 61608 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license