The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Zhenchuan Chai, Zhenfu Cao, Yuan Zhou Encryption Based on Reversible Second-Order Cellular Automata. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ping Dong, Xiangdong Shi, Jiehui Yang Design of a New Kind of Encryption Kernel Based on RSA Algorithm. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Ross J. Anderson The Dancing Bear: A New Way of Composing Ciphers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
17François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations
17Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF degenerate divisor, scalar multiplication, timing attack, SSL, efficient computation, hyperelliptic curve cryptosystem
17Dimitrios Simitopoulos, Nikolaos Zissis, Panagiotis Georgiadis 0002, Vasileios Emmanouilidis, Michael G. Strintzis Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DVD copy protection, Watermarking, Encryption, Copyright protection
17Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
17Taenam Cho, Sang-Ho Lee A Key Recovery Mechanism for Reliable Group Key Management. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Máire McLoone, John V. McCanny Very High Speed 17 Gbps SHACAL Encryption Architecture. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SHACAL, NESSIE
17Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Kerckhoffs' assumption, provable security, chosen-ciphertext security
17Christopher Caltagirone, Kasi Anantha High throughput, parallelized 128-bit AES encryption in a resource-limited FPGA. Search on Bibsonomy SPAA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 128-bit AES, optimization, FPGA, parallelization, hardware, high-throughput
17Mark D. Corner, Brian Noble Zero-interaction authentication. Search on Bibsonomy MobiCom The full citation details ... 2002 DBLP  DOI  BibTeX  RDF transient authentication, mobile computing, stackable file systems, cryptographic file systems
17Jonathan Katz, Moti Yung Threshold Cryptosystems Based on Factoring. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Kuen Hung Tsoi, Kin-Hong Lee, Philip Heng Wai Leong A Massively Parallel RC4 Key Search Engine. Search on Bibsonomy FCCM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Roman Novak SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Jiande Zheng A New Public Key Cryptosystem for Constrained Hardware. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Dong-Guk Han, Hye-Young Park, Young-Ho Park 0001, Sangjin Lee 0002, Dong Hoon Lee 0001, Hyungjin Yang A Practical Approach Defeating Blackmailing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Kouichi Sakurai, Tsuyoshi Takagi A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack
17Chih-Chung Lu, Shau-Yin Tseng Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter. Search on Bibsonomy ASAP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard. Search on Bibsonomy DFT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Yevgeniy Dodis, Moti Yung Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman
17Adrian K. Lutz, Jürg Treichler, Frank K. Gürkaynak, Hubert Kaeslin, Gérard Basler, Antonia Erni, Stephan Reichmuth, Pieter Rommens, Stephan Oetiker, Wolfgang Fichtner 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa A dynamically reconfigurable hardware-based cipher chip. Search on Bibsonomy ASP-DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
17Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh A Compact Rijndael Hardware Architecture with S-Box Optimization. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Wen-Guey Tzeng, Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF revocation, broadcast encryption, traitor tracing
17Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Feng Bao 0001, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu 0001 Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa VLSI architecture of dynamically reconfigurable hardware-based cipher. Search on Bibsonomy ISCAS (4) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS. Search on Bibsonomy ICOIN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Moni Naor, Benny Pinkas Efficient Trace and Revoke Schemes. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation
17Claus-Peter Schnorr, Markus Jakobsson Security of Signed ElGamal Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Johann Großschädl High-Speed RSA Hardware Based on Barret's Modular Reduction Method. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic
17Markus Jakobsson, Julien P. Stern, Moti Yung Scramble All, Encrypt Small. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Dan Boneh, Matthew K. Franklin An Efficient Public Key Traitor Tracing Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Niv Gilboa Two Party RSA Key Generation. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater Audio and Optical Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Keith Gibson The Security of the Gabidulin Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
17Kenji Koyama Fast RSA-type Schemes Based on Singular Cubic Curves y2+axy=m³(mod n). Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Warwick Ford, Michael J. Wiener A Key Distribution Method for Object-Based Protection. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
17Matthew K. Franklin, Stuart Haber Joint Encryption and Message-Efficient Secure Computation. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
17Michael J. Beller, Yacov Yacobi Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
17William G. Chambers, Dieter Gollmann Lock-In Effect in Cascades of Clock-Controlled Shift-Registers. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
17Hugh C. Williams Some Public Key Crypto-Functions as Intractable as Factorization. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
15Nan-Run Zhou, Long-Long Hu, Zhi-Wen Huang, Meng-Meng Wang, Guangsheng Luo Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Nan Gao, Kai Fan 0001, Haoyang Wang 0005, Kuan Zhang 0001, Hui Li 0006, Yintang Yang Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Wei Chen 0091, Zidong Wang, Quanbo Ge, Hongli Dong, Guo-Ping Liu 0003 Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Huidong Qiao, Jiangchun Ren, Zhiying Wang 0003, Ying Hu Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box. Search on Bibsonomy Symmetry The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yu-Ru Lin, Justie Su-Tzu Juan RG-Based Region Incrementing Visual Cryptography with Abilities of OR and XOR Decryption. Search on Bibsonomy Symmetry The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Bogang Qu, Zidong Wang, Bo Shen 0001, Hongli Dong, Xin Zhang 0028 Secure Particle Filtering With Paillier Encryption-Decryption Scheme: Application to Multi-Machine Power Grids. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yi-Fan Tseng Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Shimin Li, Ruoyu Zhao, Qingxiao Guan, Junxin Chen, Yushu Zhang A 3D model encryption method supporting adaptive visual effects after decryption. Search on Bibsonomy Adv. Eng. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yi Ding 0003, Zi Wang, Zhen Qin 0002, Erqiang Zhou, Guobin Zhu, Zhiguang Qin, Kim-Kwang Raymond Choo Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Ganyuan Cao A Characterization of AE Robustness as Decryption Leakage Indistinguishability. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
15Mustafa Khairallah Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
15Chunpeng Ge, Zhe Liu 0001, Willy Susilo, Liming Fang 0001, Hao Wang 0189 Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Xin Hou, Xiaofeng Jia, Jun Shao 0001 Public key encryption with public-verifiable decryption delegation and its application. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Santosh Kumar Ravva, Sureddi R. M. Krishna Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach. Search on Bibsonomy Cryptologia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15BoXue Huang, Juntao Gao, Xuelian Li Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. Search on Bibsonomy J. Cloud Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Chiranjeev Bhaya, Arup Kumar Pal, SK Hafizul Islam Chapter Four - A novel image encryption and decryption scheme by using DNA computing. Search on Bibsonomy Adv. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Xiang-Gui Guo, Bo-Qun Wang, Jian-Liang Wang, Choon Ki Ahn, Zheng-Guang Wu Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Xing Zhang, Yanpeng Zheng, Zhaolin Jiang, Heejung Byun Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption. Search on Bibsonomy J. Appl. Math. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption. Search on Bibsonomy IEEE Trans. Cloud Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mohamed Gafsi, Mohamed Ali Hajjaji, Jihene Malek, Abdellatif Mtibaa FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Chinmoy Biswas, Ratna Dutta Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Zahra Azad, Guowei Yang, Rashmi Agrawal 0001, Daniel Petrisko, Michael Bedford Taylor, Ajay Joshi RISE: RISC-V SoC for En/Decryption Acceleration on the Edge for Homomorphic Encryption. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Jeya Bright Pankiraj, Vishnuvarthanan Govindaraj, Yudong Zhang 0001, Pallikonda Rajasekaran Murugan, Anisha Milton Development of scalable coding for the encryption and decryption of images using modified diagonal min-max block truncation code. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Tomonori Hirata, Yuichi Kaji Information Leakage Through Passive Timing Attacks on RSA Decryption System. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Lei Zou 0003, Zidong Wang, Bo Shen 0001, Hongli Dong Encryption-Decryption-Based State Estimation With Multirate Measurements Against Eavesdroppers: A Recursive Minimum-Variance Approach. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Chohee Bae, Sojung Oh, Sohyun Joo, Jiyeon Joo, KyungLyul Lee Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Tongxiang Li, Zidong Wang, Lei Zou 0003, Bo Chen 0003, Li Yu 0001 A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Doron Drusinsky Encrypting for Time- and/or Location-Based Decryption. Search on Bibsonomy Computer The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Heggere Rangaswamaiah Latha, Alagarswamy Ramaprasath HWCD: A hybrid approach for image compression using wavelet, encryption using confusion, and decryption using diffusion scheme. Search on Bibsonomy J. Intell. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mohamed Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, Abdellatif Mtibaa, El-Bey Bourennane Hardware implementation of a strong pseudorandom number generator based block-cipher system for color image encryption and decryption. Search on Bibsonomy Int. J. Circuit Theory Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Hongli Deng, Tao Yang A new encryption and decryption algorithm for privacy data in wireless sensor network based on dynamic key. Search on Bibsonomy Int. J. Auton. Adapt. Commun. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy A Format Compliant Encryption Method for 3D Objects Allowing Hierarchical Decryption. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Hunjae Lee, Corey Clark Privacy Preserving Decision Tree Training and Prediction via Fully Homomorphic Encryption with No Decryption. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Mukta Debnath, Krishnendu Guha, Debasri Saha, Susmita Sur-Kolay AgEncID: Aggregate Encryption Individual Decryption of Key for FPGA Bitstream IP Cores in Cloud. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Zahra Azad, Guowei Yang, Rashmi Agrawal, Daniel Petrisko, Michael B. Taylor, Ajay Joshi RISE: RISC-V SoC for En/decryption Acceleration on the Edge for Homomorphic Encryption. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Dan Boneh, Aditi Partap, Lior Rotem Traitor Tracing for Threshold Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15Rujia Li, Yuanzhao Li, Qin Wang, Sisi Duan, Qin Wang 0008, Mark Ryan 0001 Accountable Decryption made Formal and Practical. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15Johanna Maria Kirss, Peeter Laud, Nikita Snetkov, Jelizaveta Vakarjuk Server-Supported Decryption for Mobile Devices. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15Khashayar Barooti, Daniel Collins 0001, Simone Colombo 0002, Loïs Huguenin-Dumittan, Serge Vaudenay On Active Attack Detection in Messaging with Immediate Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15Tianrui Wang, Anyu Wang 0001, Xiaoyun Wang Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
15Jaehyeok Lee, Phap Duong-Ngoc, Hanho Lee Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Linjian Hong, Kai Zhang 0016, Junqing Gong 0001, Haifeng Qian Blockchain-Based Fair Payment for ABE with Outsourced Decryption. Search on Bibsonomy Peer Peer Netw. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Anis Bkakria Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Dilip Kumar 0005, Manoj Kumar Outsourcing decryption of KP-ABE using elliptic curve cryptography. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Santosh Kumar Ravva, Sureddi R. M. Krishna Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Ke Li, Hua Li, Graeme Mund A reconfigurable and compact subpipelined architecture for AES encryption and decryption. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Kyuchol Kim, Yongbok Jong, Yunmi Song Decryption speed up of RSA by pre-calculation. Search on Bibsonomy MICML The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
15Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, Omri Soceanu Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license