Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou |
Encryption Based on Reversible Second-Order Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 350-358, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Ping Dong, Xiangdong Shi, Jiehui Yang |
Design of a New Kind of Encryption Kernel Based on RSA Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 27-32, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis |
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 363-375, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Ross J. Anderson |
The Dancing Bear: A New Way of Composing Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 231-238, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 383-397, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
17 | François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 279-299, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations |
17 | Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi |
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 345-359, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem |
17 | Dimitrios Simitopoulos, Nikolaos Zissis, Panagiotis Georgiadis 0002, Vasileios Emmanouilidis, Michael G. Strintzis |
Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(3), pp. 217-227, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
DVD copy protection, Watermarking, Encryption, Copyright protection |
17 | Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette |
Authenticated On-Line Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 145-159, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks |
17 | Taenam Cho, Sang-Ho Lee |
A Key Recovery Mechanism for Reliable Group Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 372-386, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Máire McLoone, John V. McCanny |
Very High Speed 17 Gbps SHACAL Encryption Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 13th International Conference, FPL 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings, pp. 111-120, 2003, Springer, 3-540-40822-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SHACAL, NESSIE |
17 | Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 |
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 227-243, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Kerckhoffs' assumption, provable security, chosen-ciphertext security |
17 | Christopher Caltagirone, Kasi Anantha |
High throughput, parallelized 128-bit AES encryption in a resource-limited FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2003: Proceedings of the Fifteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, June 7-9, 2003, San Diego, California, USA (part of FCRC 2003), pp. 240-241, 2003, ACM, 1-58113-661-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
128-bit AES, optimization, FPGA, parallelization, hardware, high-throughput |
17 | Mark D. Corner, Brian Noble |
Zero-interaction authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking, MOBICOM 2002, Atlanta, Georgia, USA, September 23-28, 2002, pp. 1-11, 2002, ACM, 1-58113-486-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
transient authentication, mobile computing, stackable file systems, cryptographic file systems |
17 | Jonathan Katz, Moti Yung |
Threshold Cryptosystems Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 192-205, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Kuen Hung Tsoi, Kin-Hong Lee, Philip Heng Wai Leong |
A Massively Parallel RC4 Key Search Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 10th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2002), 22-24 April 2002, Napa, CA, USA, Proceedings, pp. 13-21, 2002, IEEE Computer Society, 0-7695-1801-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Roman Novak |
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings, pp. 252-262, 2002, Springer, 3-540-43168-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Jiande Zheng |
A New Public Key Cryptosystem for Constrained Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 334-341, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Dong-Guk Han, Hye-Young Park, Young-Ho Park 0001, Sangjin Lee 0002, Dong Hoon Lee 0001, Hyungjin Yang |
A Practical Approach Defeating Blackmailing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 464-481, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Kouichi Sakurai, Tsuyoshi Takagi |
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 359-373, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack |
17 | Chih-Chung Lu, Shau-Yin Tseng |
Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 13th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2002), 17-19 July 2002, San Jose, CA, USA, pp. 277-285, 2002, IEEE Computer Society, 0-7695-1712-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2002), 6-8 November 2002, Vancouver, BC, Canada, Proceedings, pp. 51-59, 2002, IEEE Computer Society, 0-7695-1831-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Yevgeniy Dodis, Moti Yung |
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002, pp. 45-52, 2002, IEEE Computer Society, 0-7695-1888-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman |
17 | Adrian K. Lutz, Jürg Treichler, Frank K. Gürkaynak, Hubert Kaeslin, Gérard Basler, Antonia Erni, Stephan Reichmuth, Pieter Rommens, Stephan Oetiker, Wolfgang Fichtner |
2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 144-158, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa |
A dynamically reconfigurable hardware-based cipher chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of ASP-DAC 2001, Asia and South Pacific Design Automation Conference 2001, January 30-February 2, 2001, Yokohama, Japan, pp. 11-12, 2001, ACM, 0-7803-6634-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Pierre-Alain Fouque, David Pointcheval |
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 351-368, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Chosen-Ciphertext Attacks, Threshold Cryptosystems |
17 | Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh |
A Compact Rijndael Hardware Architecture with S-Box Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 239-254, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 207-224, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
17 | Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott |
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 220-234, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Feng Bao 0001, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu 0001 |
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 190-205, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai |
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 81-102, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa |
VLSI architecture of dynamically reconfigurable hardware-based cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: Proceedings of the 2001 International Symposium on Circuits and Systems, ISCAS 2001, Sydney, Australia, May 6-9, 2001, pp. 734-737, 2001, IEEE, 0-7803-6685-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae |
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: The 15th International Conference on Information Networking, ICOIN 2001, Beppu City, Oita, Japan, January 31 - February 2, 2001, pp. 65-71, 2001, IEEE Computer Society, 0-7695-0951-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Moni Naor, Benny Pinkas |
Efficient Trace and Revoke Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 1-20, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation |
17 | Claus-Peter Schnorr, Markus Jakobsson |
Security of Signed ElGamal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 73-89, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Johann Großschädl |
High-Speed RSA Hardware Based on Barret's Modular Reduction Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 191-203, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic |
17 | Markus Jakobsson, Julien P. Stern, Moti Yung |
Scramble All, Encrypt Small. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 95-111, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Dan Boneh, Matthew K. Franklin |
An Efficient Public Key Traitor Tracing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 338-353, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Niv Gilboa |
Two Party RSA Key Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 116-129, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater |
Audio and Optical Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 392-404, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Keith Gibson |
The Security of the Gabidulin Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 212-223, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
17 | Kenji Koyama |
Fast RSA-type Schemes Based on Singular Cubic Curves y2+axy=m³(mod n). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 329-340, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Warwick Ford, Michael J. Wiener |
A Key Distribution Method for Object-Based Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 193-197, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Matthew K. Franklin, Stuart Haber |
Joint Encryption and Message-Efficient Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 266-277, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
17 | Michael J. Beller, Yacov Yacobi |
Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings, pp. 208-220, 1992, Springer, 3-540-56413-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
17 | William G. Chambers, Dieter Gollmann |
Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pp. 331-343, 1988, Springer, 3-540-50251-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
17 | Hugh C. Williams |
Some Public Key Crypto-Functions as Intractable as Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pp. 66-70, 1984, Springer, 3-540-15658-5. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
15 | Nan-Run Zhou, Long-Long Hu, Zhi-Wen Huang, Meng-Meng Wang, Guangsheng Luo |
Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 238(Part C), pp. 122052, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Nan Gao, Kai Fan 0001, Haoyang Wang 0005, Kuan Zhang 0001, Hui Li 0006, Yintang Yang |
Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(1), pp. 1065-1079, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Wei Chen 0091, Zidong Wang, Quanbo Ge, Hongli Dong, Guo-Ping Liu 0003 |
Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(4), pp. 6552-6562, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Huidong Qiao, Jiangchun Ren, Zhiying Wang 0003, Ying Hu |
Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 16(1), pp. 37, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yu-Ru Lin, Justie Su-Tzu Juan |
RG-Based Region Incrementing Visual Cryptography with Abilities of OR and XOR Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 16(2), pp. 153, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Bogang Qu, Zidong Wang, Bo Shen 0001, Hongli Dong, Xin Zhang 0028 |
Secure Particle Filtering With Paillier Encryption-Decryption Scheme: Application to Multi-Machine Power Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 15(1), pp. 863-873, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yi-Fan Tseng |
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 88, pp. 103796, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Shimin Li, Ruoyu Zhao, Qingxiao Guan, Junxin Chen, Yushu Zhang |
A 3D model encryption method supporting adaptive visual effects after decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Eng. Informatics ![In: Adv. Eng. Informatics 59, pp. 102319, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna |
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 20(1), pp. 195-202, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yi Ding 0003, Zi Wang, Zhen Qin 0002, Erqiang Zhou, Guobin Zhu, Zhiguang Qin, Kim-Kwang Raymond Choo |
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 280-292, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Ganyuan Cao |
A Characterization of AE Robustness as Decryption Leakage Indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 598, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
15 | Mustafa Khairallah |
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 550, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
15 | Chunpeng Ge, Zhe Liu 0001, Willy Susilo, Liming Fang 0001, Hao Wang 0189 |
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 21(2), pp. 937-948, March - April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Xin Hou, Xiaofeng Jia, Jun Shao 0001 |
Public key encryption with public-verifiable decryption delegation and its application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 75, pp. 103513, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Santosh Kumar Ravva, Sureddi R. M. Krishna |
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 47(6), pp. 570-583, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | BoXue Huang, Juntao Gao, Xuelian Li |
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cloud Comput. ![In: J. Cloud Comput. 12(1), pp. 37, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Chiranjeev Bhaya, Arup Kumar Pal, SK Hafizul Islam |
Chapter Four - A novel image encryption and decryption scheme by using DNA computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Comput. ![In: Adv. Comput. 129, pp. 129-172, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh |
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Int. J. Inf. Secur. ![In: ISC Int. J. Inf. Secur. 15(1), pp. 97-110, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Xiang-Gui Guo, Bo-Qun Wang, Jian-Liang Wang, Choon Ki Ahn, Zheng-Guang Wu |
Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 642, pp. 119128, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Xing Zhang, Yanpeng Zheng, Zhaolin Jiang, Heejung Byun |
Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Appl. Math. Comput. ![In: J. Appl. Math. Comput. 69(2), pp. 1967-1987, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan |
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 11(1), pp. 25-43, January - March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mohamed Gafsi, Mohamed Ali Hajjaji, Jihene Malek, Abdellatif Mtibaa |
FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 14(6), pp. 7001-7022, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Chinmoy Biswas, Ratna Dutta |
Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 14(12), pp. 16451-16464, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Zahra Azad, Guowei Yang, Rashmi Agrawal 0001, Daniel Petrisko, Michael Bedford Taylor, Ajay Joshi |
RISE: RISC-V SoC for En/Decryption Acceleration on the Edge for Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 31(10), pp. 1523-1536, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jeya Bright Pankiraj, Vishnuvarthanan Govindaraj, Yudong Zhang 0001, Pallikonda Rajasekaran Murugan, Anisha Milton |
Development of scalable coding for the encryption and decryption of images using modified diagonal min-max block truncation code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(8), pp. 12263-12277, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tomonori Hirata, Yuichi Kaji |
Information Leakage Through Passive Timing Attacks on RSA Decryption System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3), pp. 406-413, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Lei Zou 0003, Zidong Wang, Bo Shen 0001, Hongli Dong |
Encryption-Decryption-Based State Estimation With Multirate Measurements Against Eavesdroppers: A Recursive Minimum-Variance Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 68(12), pp. 8111-8118, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Chohee Bae, Sojung Oh, Sohyun Joo, Jiyeon Joo, KyungLyul Lee |
Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 17(2), pp. 591-608, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tongxiang Li, Zidong Wang, Lei Zou 0003, Bo Chen 0003, Li Yu 0001 |
A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 151, pp. 110926, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Doron Drusinsky |
Encrypting for Time- and/or Location-Based Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 56(1), pp. 102-110, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Heggere Rangaswamaiah Latha, Alagarswamy Ramaprasath |
HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Syst. ![In: J. Intell. Syst. 32(1), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mohamed Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, Abdellatif Mtibaa, El-Bey Bourennane |
Hardware implementation of a strong pseudorandom number generator based block-cipher system for color image encryption and decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Circuit Theory Appl. ![In: Int. J. Circuit Theory Appl. 51(1), pp. 410-436, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hongli Deng, Tao Yang |
A new encryption and decryption algorithm for privacy data in wireless sensor network based on dynamic key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Auton. Adapt. Commun. Syst. ![In: Int. J. Auton. Adapt. Commun. Syst. 16(4), pp. 376-390, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy |
A Format Compliant Encryption Method for 3D Objects Allowing Hierarchical Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 25, pp. 7196-7207, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hunjae Lee, Corey Clark |
Privacy Preserving Decision Tree Training and Prediction via Fully Homomorphic Encryption with No Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.13140, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mukta Debnath, Krishnendu Guha, Debasri Saha, Susmita Sur-Kolay |
AgEncID: Aggregate Encryption Individual Decryption of Key for FPGA Bitstream IP Cores in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.16282, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Zahra Azad, Guowei Yang, Rashmi Agrawal, Daniel Petrisko, Michael B. Taylor, Ajay Joshi |
RISE: RISC-V SoC for En/decryption Acceleration on the Edge for Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.07104, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek |
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4), pp. 287-317, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Dan Boneh, Aditi Partap, Lior Rotem |
Traitor Tracing for Threshold Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1724, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qin Wang 0008, Mark Ryan 0001 |
Accountable Decryption made Formal and Practical. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1519, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk |
Server-Supported Decryption for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 39, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Khashayar Barooti, Daniel Collins 0001, Simone Colombo 0002, Loïs Huguenin-Dumittan, Serge Vaudenay |
On Active Attack Detection in Messaging with Immediate Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 880, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek |
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 98, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Tianrui Wang, Anyu Wang 0001, Xiaoyun Wang |
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 659, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Jaehyeok Lee, Phap Duong-Ngoc, Hanho Lee |
Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(17), pp. 7389, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Linjian Hong, Kai Zhang 0016, Junqing Gong 0001, Haifeng Qian |
Blockchain-Based Fair Payment for ABE with Outsourced Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer Peer Netw. Appl. ![In: Peer Peer Netw. Appl. 16(1), pp. 312-327, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Anis Bkakria |
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 31(6), pp. 727-760, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Dilip Kumar 0005, Manoj Kumar |
Outsourcing decryption of KP-ABE using elliptic curve cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 22(2), pp. 210-229, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Santosh Kumar Ravva, Sureddi R. M. Krishna |
Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 22(3/4), pp. 377-389, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ke Li, Hua Li, Graeme Mund |
A reconfigurable and compact subpipelined architecture for AES encryption and decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Adv. Signal Process. ![In: EURASIP J. Adv. Signal Process. 2023(1), pp. 5, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Kyuchol Kim, Yongbok Jong, Yunmi Song |
Decryption speed up of RSA by pre-calculation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICML ![In: Proceedings of the 2023 International Conference on Mathematics, Intelligent Computing and Machine Learning, MICML 2023, Chengdu, China, December 15-17, 2023, pp. 11-16, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde |
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1467-1481, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu |
Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3567-3569, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|