The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SCN"( http://dblp.L3S.de/Venues/SCN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/scn

Publication years (Num. hits)
2002 (26) 2003-2004 (27) 2005-2006 (27) 2008 (28) 2010 (29) 2012 (32) 2014 (35) 2016 (32) 2018 (31) 2020 (34) 2022 (34)
Publication types (Num. hits)
inproceedings(324) proceedings(11)
Venues (Conferences, Journals, ...)
SCN(335)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 93 occurrences of 83 keywords

Results
Found 335 publication records. Showing 335 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski How to Pair with a Human. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Nitesh Saxena Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Bart Mennink, Bart Preneel On the Indifferentiability of the Grøstl Hash Function. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III Public-Key Encryption with Efficient Amortized Updates. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Atsuko Miyaji Generalized RC4 Key Collisions and Hash Collisions. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chris Peikert Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk). Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Martin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini Threshold Attribute-Based Signcryption. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Xiaomin Liu Fast Secure Computation of Set Intersection. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vladimir Kolesnikov A Security Enhancement and Proof for Authentication and Key Agreement (AKA). Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Jian Weng 0001 Generic Constructions of Parallel Key-Insulated Encryption. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata Provably Secure Convertible Undeniable Signatures with Unambiguity. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Francesco Davì, Stefan Dziembowski, Daniele Venturi 0001 Leakage-Resilient Storage. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart, Bogdan Warinschi Get Shorty via Group Signatures without Encryption. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi The Fiat-Shamir Transform for Group and Ring Signature Schemes. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bartosz Przydatek, Douglas Wikström Group Message Authentication. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Dominique Schröder, Peter Schröder, Daniel Wagner History-Free Aggregate Message Authentication Codes. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard A New Security Model for Authenticated Key Agreement. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel, Willem Jonker Searching Keywords with Wildcards on Encrypted Data. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jianyong Huang, Willy Susilo, Jennifer Seberry Differential Fault Analysis of LEX. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markus Rückert Adaptively Secure Identity-Based Identification from Lattices without Random Oracles. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Feng-Hao Liu, Anna Lysyanskaya Algorithmic Tamper-Proof Security under Probing Attacks. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Elizabeth A. Quaglia Time-Specific Encryption. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aniket Kate, Ian Goldberg Distributed Private-Key Generators for Identity-Based Cryptography. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thomas Plantard, Willy Susilo Recursive Lattice Reduction. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Juan A. Garay, Roberto De Prisco (eds.) Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Octavian Catrina, Sebastiaan de Hoogh Improved Primitives for Secure Multiparty Integer Computation. Search on Bibsonomy SCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bodo Möller, Andy Rupp Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF embedded cryptography, elliptic curve cryptography, exponentiation, Efficient implementation, DSA, ECDSA
1Isamu Teranishi, Wakaha Ogata Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Statistical Plaintext Awareness, Cramer-Shoup Scheme, Standard Model
1Xavier Boyen, Cécile Delerablée Expressive Subgroup Signatures. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Malika Izabachène, David Pointcheval New Anonymity Notions for Identity-Based Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Arpita Patra, Ashish Choudhary, C. Pandu Rangan Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Theoretic Security, Error Probability
1Amos Beimel, Anat Paskin On Linear Secret Sharing for Connectivity in Directed Graphs. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Volker Roth 0002, Eleanor Gilbert Rieffel General Certificateless Encryption and Timed-Release Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security-mediated certificateless encryption, standard model, timed-release encryption
1Douglas Wikström Simplified Submission of Inputs to Protocols. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Christian Schridde, Matthew Smith 0001, Bernd Freisleben An Identity-Based Key Agreement Protocol for the Network Layer. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Jianying Zhou 0001 Efficient Certificate-Based Encryption in the Standard Model. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Georg Fuchsbauer, David Pointcheval Anonymous Proxy Signatures. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Gaven J. Watson Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shai Halevi Storage Encryption: A Cryptographer's View. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, Thomas Icart Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tree-Based Hash Protocol, POK, Privacy, RFID tags, PUF
1Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti (eds.) Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings Search on Bibsonomy SCN The full citation details ... 2008 DBLP  BibTeX  RDF
1Jun Furukawa 0001, Frederik Armknecht, Kaoru Kurosawa A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF session ID generation, universal composability, Group key exchange
1Ali Bagherzandi, Stanislaw Jarecki Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guilhem Castagnos Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Homomorphic Scheme, Paillier Cryptosystem, Quadratic Fields, IND-CPA and IND-CCA2 security, Standard Model, Generic Construction, Probabilistic Encryption
1Christophe Petit 0001, Kristin E. Lauter, Jean-Jacques Quisquater Full Cryptanalysis of LPS and Morgenstern Hash Functions. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Bhavana Kanukurthi, Leonid Reyzin An Improved Robust Fuzzy Extractor. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron A New DPA Countermeasure Based on Permutation Tables. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Benoît Chevallier-Mames, David Naccache, Jacques Stern Linear Bandwidth Naccache-Stern Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ns cryptosystem, multiplicative knapsack, efficiency, Public key cryptography
1Svetla Nikova, Vincent Rijmen, Martin Schläffer Using Normal Bases for Compact Hardware Implementations of the AES S-Box. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, hardware implementation, S-box, normal basis
1Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou 0001 Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Benny Pinkas, Nigel P. Smart Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marco Baldi, Marco Bodrato, Franco Chiaraluce A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF QC-LDPC codes, Toom-Cook, Winograd, Cryptanalysis, McEliece cryptosystem
1Yves Igor Jerschow, Christian Lochert, Björn Scheuermann 0001, Martin Mauve CLL: A Cryptographic Link Layer for Local Area Networks. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Shouhuai Xu, Moti Yung Privacy Preserving Data Mining within Anonymous Credential Systems. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Matthew K. Franklin Edge Eavesdropping Games. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF graph search games, unconditional security, passive adversary, mobile adversary
1Alejandro Hevia Universally Composable Simultaneous Broadcast. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Olivier Billet, Henri Gilbert Cryptanalysis of Rainbow. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow
1Roberto De Prisco, Alfredo De Santis Cheating Immune (2, n)-Threshold Visual Secret Sharing. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sébastien Kunz-Jacques, David Pointcheval About the Security of MTI/C0 and MQV. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jaume Martí-Farré, Carles Padró Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ideal access structures, Secret sharing representable matroids, Secret sharing, Ideal secret sharing schemes, Information rate
1S. Dov Gordon, Jonathan Katz Rational Secret Sharing, Revisited. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Walid Bagga, Stefano Crosta, Refik Molva Proof-Carrying Proxy Certificates. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data Minimization, Authorization, Bilinear Pairings, Credentials, Proxy Certificates
1Ivan Damgård Theory and Practice of Multiparty Computation. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joan Daemen, Vincent Rijmen Understanding Two-Round Differentials in AES. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Fida El Haje, Yuri Golubev, Pierre-Yvan Liardet, Yannick Teglia On Statistical Testing of Random Numbers Generators. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Éric Levieil, Pierre-Alain Fouque An Improved LPN Algorithm. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Swee-Huay Heng Relations Among Security Notions for Undeniable Signature Schemes. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature
1Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya Balancing Accountability and Privacy Using E-Cash (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Roberto De Prisco, Moti Yung (eds.) Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Daniel V. Bailey, Ari Juels Shoehorning Security into the EPC Tag Standard. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, RFID, cloning, EPC, counterfeiting, PIN
1Amir Herzberg, Igal Yoffe On Secure Orders in the Presence of Faults. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Hong-Sheng Zhou Concurrent Blind Signatures Without Random Oracles. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest Lightweight Email Signatures (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joan Daemen, Gilles Van Assche Distinguishing Stream Ciphers with Convolutional Filters. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1David Galindo, Eike Kiltz Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu, Changhoon Lee, Jongsung Kim Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cobra-F64a, Cobra-F64b, Block cipher, Differential cryptanalysis, Related-key attacks, Data-dependent permutation
1Sébastien Kunz-Jacques, David Pointcheval A New Key Exchange Protocol Based on MQV Assuming Public Computations. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Willy Susilo, Yi Mu 0001 Constant-Size Dynamic k-TAA. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Carlo Blundo, Stelvio Cimato (eds.) Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers Search on Bibsonomy SCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bart Preneel ECRYPT: The Cryptographic Research Challenges for the Next Decade. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Breno de Medeiros On the Key Exposure Problem in Chameleon Hashes. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Maciej Koprowski, Bogdan Warinschi Efficient Blind Signatures Without Random Oracles. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Amir Herzberg Controlling Spam by Secure Internet Content Selection. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin Identity-Based Zero Knowledge. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart Efficient Key Encapsulation to Multiple Parties. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Van-Ly Le, Werner Schindler How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF short cycles, systems of algebraic equations, low-cost group identification, Nonlinear feedback shift register, invariant theory
1Douglas Wikström Universally Composable DKG with Linear Number of Exponentiations. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Miodrag J. Mihaljevic, Hideki Imai The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF overdefined systems of equations, hypotheses testing, cryptanalysis, stream ciphers, algebraic attacks, decimation
1Claude Crépeau, Kirill Morozov, Stefan Wolf 0001 Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Stelvio Cimato, Roberto De Prisco, Alfredo De Santis Colored Visual Cryptography Without Color Darkening. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Jens Groth Group Signatures: Better Efficiency and New Theoretical Aspects. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Fabien Laguillaumie, Damien Vergnaud Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Privacy of signers identity, Bilinear Diffie-Hellman problems, Exact security, Designated verifier signatures, Tight reduction
1Christopher Wolf, An Braeken, Bart Preneel Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jun Furukawa 0001, Shoko Yonezawa Group Signatures with Separate and Distributed Authorities. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Adam L. Young, Moti Yung Relationships Between Diffie-Hellman and "Index Oracles". Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Diffie-Hellman (DH), Computational Diffie-Hellman, Decision Diffie-Hellman, JDL, LDL, Public Key Cryptography, Oracles, Black-Box Reductions, Discrete-Log
Displaying result #201 - #300 of 335 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license