The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptosystem with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1982 (23) 1983-1984 (18) 1985 (16) 1986-1987 (18) 1988 (17) 1989 (18) 1990 (16) 1991 (29) 1992-1993 (19) 1994 (18) 1995-1996 (22) 1997 (28) 1998 (43) 1999 (38) 2000 (30) 2001 (61) 2002 (60) 2003 (86) 2004 (109) 2005 (150) 2006 (144) 2007 (133) 2008 (128) 2009 (114) 2010 (73) 2011 (84) 2012 (65) 2013 (74) 2014 (67) 2015 (97) 2016 (66) 2017 (70) 2018 (115) 2019 (119) 2020 (112) 2021 (112) 2022 (94) 2023 (87) 2024 (24)
Publication types (Num. hits)
article(1164) incollection(28) inproceedings(1396) phdthesis(9)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1345 occurrences of 497 keywords

Results
Found 2597 publication records. Showing 2597 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Winfried B. Müller, Rupert Nöbauer Cryptanalysis of the Dickson Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
24Hugh C. Williams Some Public Key Crypto-Functions as Intractable as Factorization. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
24G. R. Blakley Information Theory Without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
21Naveed Islam, William Puech, Robert Brouzet A Homomorphic Method for Sharing Secret Images. Search on Bibsonomy IWDW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Homomorphism, Cryptosystem, Image encryption
21Yu-Fang Chung, Tzer-Shyong Chen, Chia-Chao Ho, Yi-Hsuan Yeh, Hsiu-Chia Ko Hierarchical Time-Bound Key Management for Mobile Agents. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Time-bound Key Management, Access Control, Mobile Agent, Key Management, Elliptic Curve Cryptosystem
21Yasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF knapsack public-key cryptosystem, low-density attack, weight of plaintext, density
21Kazukuni Kobara, Kirill Morozov, Raphael Overbeck Coding-Based Oblivious Transfer. Search on Bibsonomy MMICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF permuted kernel problem, Oblivious transfer, McEliece cryptosystem, coding-based cryptography
21Shubo Liu, Zhengquan Xu, Wei Li, Jin Liu, Zhiyong Yuan A Novel Format-Compliant Video Encryption Scheme for H.264/AVC Stream Based on Residual Block Scrambling. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF format-compliant, residual block scrambling, chaotic cryptosystem, H.264/AVC
21Guilhem Castagnos Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Homomorphic Scheme, Paillier Cryptosystem, Quadratic Fields, IND-CPA and IND-CCA2 security, Standard Model, Generic Construction, Probabilistic Encryption
21Benoît Chevallier-Mames, David Naccache, Jacques Stern Linear Bandwidth Naccache-Stern Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ns cryptosystem, multiplicative knapsack, efficiency, Public key cryptography
21Massimo Caboara, Fabrizio Caruso, Carlo Traverso Gröbner bases for public key cryptography. Search on Bibsonomy ISSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF gröbner basis, lattice, public key cryptosystem, hermite normal form
21Peishun Wang, Huaxiong Wang, Josef Pieprzyk Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Common secure index, Paillier’s cryptosystem, search on encrypted data
21Guilhem Castagnos, Benoît Chevallier-Mames Towards a DL-Based Additively Homomorphic Encryption Scheme. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model
21Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay TCHo: A Hardware-Oriented Trapdoor Cipher. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hardware, linear feedback shift register, public-key cryptosystem, polynomial multiples, post-quantum cryptography
21Peishun Wang, Huaxiong Wang, Josef Pieprzyk A New Dynamic Accumulator for Batch Updates. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paillier cryptosystem, Dynamic accumulator
21Jie Tian 0001, Liang Li, Xin Yang 0001 Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF techniques and algorithms, biometrics, information security, cryptosystem, fingerprint recognition
21Zhenfu Cao, Haojin Zhu, Rongxing Lu Provably secure robust threshold partial blind signature. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF improved RSA cryptosystem, factoring problem, blind signature, electronic cash, threshold signature
21Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei A distributed key assignment protocol for secure multicast based on proxy cryptography. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ElGamal cryptosystem, key composition, proxy cryptography, secure multicast
21Yingfang Fu, Jingsha He, Guorui Li A Composite Key Management Scheme for Mobile Ad Hoc Networks. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hierarchical cluster algorithm, Ad Hoc networks, key management, threshold cryptography, identity-based cryptosystem
21Ventzislav Nikov, Svetla Nikova, Bart Preneel A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Homomorphic Semantically Secure Cryptosystems, Paillier’s Public-Key Cryptosystem, Non-Interactive Zero-Knowledge Arguments, Oblivious Transfer
21Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, embedded system, efficient implementation, motes, digital signature schemes, Multivariate public-key cryptosystem
21Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert Sign Change Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve cryptosystem, smartcards, fault attacks
21Lei Hu, Jun-Wu Dong, Dingyi Pei Implementation of Cryptosystems Based on Tate Pairing. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF implementation, elliptic curve, Tate pairing, identity-based cryptosystem
21Cheol-Min Park, Myung-Hwan Kim, Moti Yung A Remark on Implementing the Weil Pairing. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modified Weil pairing, separable endomorphism, distortion map, Pairing-based cryptosystem, Weil pairing
21Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF joint sparse form, left-to-right, multi-scalar multiplication, shamir method, elliptic curve cryptosystem
21Eiji Okamoto, Takeshi Okamoto Cryptosystems Based on Elliptic Curve Pairing. Search on Bibsonomy MDAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key agreement scheme, privacy, pairing, ID based cryptosystem
21Hoonjung Lee, Donghyun Kim 0001, Sangjin Kim, Heekuck Oh Identity-Based Key Agreement Protocols in a Multiple PKG Environment. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multiple PKG, bilinear map, key agreement protocol, ID-based cryptosystem
21Xinxin Fan, Thomas J. Wollinger, Yumin Wang Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF genus 3 hyperelliptic curve cryptosystem, inversion-free, scalar multiplication, efficient implementation, explicit formulae
21Yuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai Similar Keys of Multivariate Quadratic Public Key Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MQ, similar key, digital signature, public key cryptosystem, multivariate
21Laszlo Hars Fast Truncated Multiplication for Cryptographic Applications. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Short product, Truncated product, Karatsuba multiplication, Barrett multiplication, Optimization, Cryptography, Computer Arithmetic, Montgomery multiplication, Modular multiplication, RSA cryptosystem
21Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang Secure Multicast Using Proxy Encryption. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multicast key management, cipher sequences, proxy encryption, ElGamal cryptosystem, Secure multicast
21Yasuyuki Sakai, Kouichi Sakurai Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF generalized Mersenne prime, unified code, elliptic curve cryptosystem, Side channel analysis, modular reduction
21Sangjin Kim, Hoonjung Lee, Heekuck Oh Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multiple PKG environment, key agreement protocol, ID-based cryptosystem
21Ron Steinfeld, Yuliang Zheng 0001 On the Security of RSA with Primes Sharing Least-Significant Bits. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Partial Key Exposure, Boneh-Durfee-Frankel Attack, Coppersmith Algorithm, Server-Aided Signature Generation, Cryptanalysis, RSA Cryptosystem, Communication Security, Least-Significant Bits
21Qi Cheng 0001, Ming-Deh A. Huang On Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy ISAAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF partiallifting, Elliptic curve cryptosystem, discrete logarithm
21Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
21Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA
21Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem
21Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF degenerate divisor, scalar multiplication, window method, hyperelliptic curve cryptosystem
21Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi Exact Analysis of Montgomery Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF randomization, elliptic curve cryptosystem, Montgomery multiplication, timing attack
21Michael Scott, Paulo S. L. M. Barreto Compressed Pairings. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF efficient implementation, pairing-based cryptosystem
21Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen TTS: High-Speed Signatures on a Low-Cost Smart Card. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 8051, smart card, finite field, Multivariate public-key cryptosystem
21Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
21Tetsuya Izu, Tsuyoshi Takagi Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication
21Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin A Fast and Secure Implementation of Sflash. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE
21Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
21Werner Schindler, Colin D. Walter More Detail for a Combined Timing and Power Attack against Implementations of RSA. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistical decision problem, power analysis, exponentiation, timing attack, RSA cryptosystem, side channel leakage, Montgomery modular multiplication
21Katsuyuki Okeya, Tsuyoshi Takagi The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF width-w NAF, pre-computation table, smart card, side channel attacks, Elliptic curve cryptosystem, memory constraint
21Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Endomorphism, Elliptic Curve Cryptosystem, Scalar Multiplication, Frobenius Expansion
21Tetsuya Izu, Tsuyoshi Takagi Efficient Computations of the Tate Pairingfor the Large MOV Degrees. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Jacobian coordinate, MOV degree, Elliptic curve cryptosystem, Tate pairing, efficient computation
21YoungJu Choie, Jong Won Lee Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Hyperelliptic cryptosystem, Scalar multiplication, Frobenius map
21Colin D. Walter Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptography, differential power analysis, DPA, RSA cryptosystem, Montgomery modular multiplication
21Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fast computation, Public key cryptography, differential power analysis, elliptic curve cryptosystem
21Toru Nakanishi 0001, Yuji Sugiyama Anonymous Statistical Survey of Attributes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Statistical survey of attributes, Anonymity, Shuffle, Group signature scheme, Threshold cryptosystem
21Colin D. Walter, Susan Thompson Distinguishing Exponent Digits by Observing Modular Subtractions. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF m-ary method, power analysis, sliding windows, Exponentiation, Montgomery multiplication, modular multiplication, timing attack, RSA cryptosystem
21Christophe Clavier, Marc Joye Universal Exponentiation Algorithm. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Implementation, smart-cards, provable security, side-channel attacks, discrete logarithm, exponentiation, simple power analysis (SPA), RSA cryptosystem, addition chains
21Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF non-maximal imaginary quadratic order, non-interactive cryptography, discrete logarithm, identity based cryptosystem
21Katsuyuki Okeya, Kouichi Sakurai Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Montgomery-form, Scalar Multiplication Algorithm, Elliptic Curve Cryptosystem, Power Analysis, Timing Attack, Efficient Implementation
21Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF OEF, Table reference method, Finite field, Elliptic curve cryptosystem, Scalar multiplication, Frobenius map
21Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim How to Implement Cost-Effective and Secure Public Key Cryptosystems. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Secure module in terminal, digital signature/identification, smart cards, public-key cryptosystem, precomputation
21Tamás Horváth 0002 Arithmetic Design for Permutation Groups. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF permutation multiplier, destination-tag routing, separation network, binary group, secret-key cryptosystem, PGM, switching network, sorting network, compact representation
21Jin-yi Cai Applications of a New Transference Theorem to Ajtai's Connection Factor. Search on Bibsonomy CCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Transference theorems, Lattices, Public-key cryptosystem, Average-case complexity, Harmonic analysis, Shortest vector problem
21Ralph C. Merkle A Certified Digital Signature. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF Receipts, Electronic Funds Transfer, CR categories: 3.56, 3.57, 4.9, Authentication, Cryptography, Digital Signatures, Public Key Cryptosystem, Electronic Signatures
21Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
21Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox
20Long Zhang, Zhenan Sun, Tieniu Tan, Shungeng Hu Robust Biometric Key Extraction Based on Iris Cryptosystem. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF iris code, key binding, concatenated coding scheme, bit masking scheme, cryptography, Biometrics, Reed-Solomon code, convolutional code
20Jinyang Shi, Kwok-Yan Lam MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Biometric Cryptography, Feature extraction, Biometrics, Fingerprint verification, Minutiae
20Marian Srebrny, Piotr Such Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations. Search on Bibsonomy KES-AMSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-agent security, intelligent multicore computation, random bit generators, cellular automata, statistical tests, cryptology, symmetric cipher
20Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov Semantic security for the McEliece cryptosystem without random oracles. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 11T71
20Xiao Bo Yang, Said Boussakta A New Development of Symmetric Key Cryptosystem. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Youan Xiao New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Xiangqian Wu 0002, Kuanquan Wang, David Zhang 0001 A cryptosystem based on palmprint feature. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Keklik Alptekin Bayam, Siddika Berna Örs Differential Power Analysis resistant hardware implementation of the RSA cryptosystem. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Michael J. Jacobson Jr., Renate Scheidler, Daniel Weimer An Adaptation of the NICE Cryptosystem to Real Quadratic Orders. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Nitin Vats Algebraic Cryptanalysis of CTRU Cryptosystem. Search on Bibsonomy COCOON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Duo Liu, Ping Luo, Yiqi Dai Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, digital signature, elliptic curve, multi-signature
20Marc P. C. Fossorier, Kazukuni Kobara, Hideki Imai Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Xiangqian Wu 0002, David Zhang 0001, Kuanquan Wang A Palmprint Cryptosystem. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Marco Baldi, Franco Chiaraluce, Roberto Garello, Francesco Mininni Quasi-Cyclic Low-Density Parity-Check Codes in the McEliece Cryptosystem. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Andrew Byrne, Nicolas Méloni, Francis M. Crowe, William P. Marnane, Arnaud Tisserand, Emanuel M. Popovici SPA resistant Elliptic Curve Cryptosystem using Addition Chains. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20F. Sheeja Mary Erratic Cryptosystem for Elevated Message Security. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Jun-Hong Chen, Haw-Shiuan Wu, Ming-Der Shieh, Wen-Ching Lin A New Montgomery Modular Multiplication Algorithm and its VLSI Design for RSA Cryptosystem. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20 Private-Key Cryptosystem. Search on Bibsonomy Encyclopedia of Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Hossein Ghodosi An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Alisher Kholmatov, Berrin A. Yanikoglu Biometric Cryptosystem Using Online Signatures. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios Maple Implementation of the Chor-Rivest Cryptosystem. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jin Li 0002, Fangguo Zhang, Yanming Wang A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key encryption, Identity based, Bilinear groups
20Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks
20Wen-Chung Kuo, Ming-Yang Chen A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, Secret Sharing, Proxy Signature
20Françoise Levy-dit-Vehel, Ludovic Perret On the Wagner-Magyarik Cryptosystem. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Rastislav Lukac, Konstantinos N. Plataniotis A Cost-Effective Private-Key Cryptosystem for Color Image Encryption. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Gröbner basis, public-key, perturbation, multivariate, quadratic polynomials
20Ying Yang, Zine-Eddine Abid, Wei Wang 0003 Two-prime RSA immune cryptosystem and its FPGA implementation. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA cryptography, hardware faulty attack, immunity analysis, FPGA
20Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury An Efficient End to End Design of Rijndael Cryptosystem in 0.18 ? CMOS. Search on Bibsonomy VLSI Design The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Jingmei Liu, Xiangguo Cheng, Xinmei Wang Cryptanalysis of a Cellular Automata Cryptosystem. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20María Isabel González Vasco, Rainer Steinwandt A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Guilin Wang, Feng Bao 0001, Jianying Zhou 0001, Robert H. Deng Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Miguel Morales-Sandoval, Claudia Feregrino Uribe On the Hardware Design of an Elliptic Curve Cryptosystem. Search on Bibsonomy ENC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Jordi Castellà-Roca, Josep Domingo-Ferrer A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Bit commitment, Mental poker
20Qingshui Xue, Zhenfu Cao, Haifeng Qian A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 2597 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license