The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ElGamal with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-1996 (22) 1997-1998 (16) 1999-2000 (16) 2001-2002 (26) 2003-2004 (42) 2005 (34) 2006 (28) 2007 (23) 2008 (23) 2009 (23) 2010-2011 (23) 2012-2013 (20) 2014-2015 (21) 2016-2017 (29) 2018 (17) 2019-2020 (36) 2021 (19) 2022 (21) 2023-2024 (17)
Publication types (Num. hits)
article(167) incollection(7) inproceedings(280) phdthesis(2)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(29) CoRR(21) EUROCRYPT(19) Public Key Cryptography(19) ASIACRYPT(15) CRYPTO(10) ACISP(9) CT-RSA(9) IEEE Access(8) ACNS(6) ISC(5) IAS(4) ICISC(4) Inscrypt(4) ISPEC(4) Wirel. Pers. Commun.(4) More (+10 of total 231)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 265 occurrences of 142 keywords

Results
Found 471 publication records. Showing 456 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Xu Xiaoping A Key Recovery Scheme based on ElGamal and (t, n) Threshold. Search on Bibsonomy HPCNCS The full citation details ... 2007 DBLP  BibTeX  RDF
20Iwan M. Duursma, Seungkook Park ElGamal type signature schemes for n-dimensional vector spaces. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
20Ramzi A. Haraty, Abdul Nasser El-Kassar, Bilal Shebaro A comparative study of ElGamal based digital signature algorithms. Search on Bibsonomy J. Comput. Methods Sci. Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Delaram Kahrobaei, Bilal Khan A Non-Commutative Generalization of ElGamal Key Exchange using Polycyclic Groups. Search on Bibsonomy GLOBECOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yvo Desmedt ElGamal Public Key Encryption. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Dan Boneh Elgamal Digital Signature Scheme. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Abdul Nasser El-Kassar, Ramzi A. Haraty ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Marius-Calin Silaghi Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
20Yingjie Wang, Jianhua Li, Ling Tie A simple protocol for deniable authentication based on ElGamal cryptography. Search on Bibsonomy Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Marie Virat A cryptosystem "à la" ElGamal on an elliptic curve over Fp [epsilon]. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
20Konstantinos Chalkias, George Filiadis, George Stephanides Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm. Search on Bibsonomy IEC (Prague) The full citation details ... 2005 DBLP  BibTeX  RDF
20Shin-Jia Hwang, Yun-Hua Lee Repairing ElGamal-like multi-signature schemes using self-certified public keys. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Zuhua Shao Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo Efficient remote user authentication scheme based on generalized ElGamal signature scheme. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Kristian Gjøsteen A new security proof for Damgård's ElGamal. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
20Yingjie Wang, Jianhua Li 0001, Lei Fan 0002 Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature. Search on Bibsonomy SNPD The full citation details ... 2004 DBLP  BibTeX  RDF
20Abdul Nasser El-Kassar ElGamal Public-Key Cryptosystem Using Reducible Polynomials Over a Finite Field. Search on Bibsonomy IASSE The full citation details ... 2004 DBLP  BibTeX  RDF
20Ramzi A. Haraty, Hadi Otrok, Abdul Nasser El-Kassar A Comparative Study of Elgamal Based Cryptographic Algorithms. Search on Bibsonomy ICEIS (3) The full citation details ... 2004 DBLP  BibTeX  RDF
20Chou Chen Yang, Ting Yi Chang, Jian Wei Li, Min-Shiang Hwang Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. Search on Bibsonomy Informatica The full citation details ... 2003 DBLP  BibTeX  RDF
20Yuh-Shihng Chang, Tzong-Chen Wu, Shih-Chan Huang ElGamal-like digital signature and multisignature schemes using self-certified public keys. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji A Structured ElGamal-Type Multisignature Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Joonsang Baek, Byoungcheon Lee, Kwangjo Kim Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Daisuke Nakamura, Kunikatsu Kobayashi Modified ElGamal Cryptosystem. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Chi-Sung Laih, Wen-Chung Kuo Cryptanalysis of the Enhanced ElGamal's Signature Scheme. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Patrick Horster, Markus Michels, Holger Petersen 0002 Das Meta-ElGamal Signaturverfahren und seine Anwendungen. Search on Bibsonomy VIS The full citation details ... 1995 DBLP  BibTeX  RDF
20Chin-Chen Chang 0001, Feng-Yi Liou A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 1994 DBLP  BibTeX  RDF
20Chin-Chin Chang, Wen-Yuan Liao A remote password authentication scheme based upon ElGamal's signature scheme. Search on Bibsonomy Comput. Secur. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
19Bin Sun, Wang Chuan, Jiang Li 0009, Legand L. Burge III A Multi-Signature Scheme Based on Two Difficult Mathematics Problems. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, digital signature, RSA, ElGamal, multi-signature
19N. R. Sunitha, B. B. Amberker, Prashant Koulgi Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF e-cheque, Parallel multi-signature, Digital Signature, Forward-Security, ElGamal Signatures
19Tao Meng, Xiaoqian Wu, Shenghe Sun A Method of Big Prime Number Generator Based on NTL. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTL, ElGamal Digital Signature, Generator
19Kamer Kaya, Ali Aydin Selçuk Robust Threshold Schemes Based on the Chinese Remainder Theorem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal
19Philippe Golle Dealing Cards in Poker Games. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Latency, Shuffle, Mix, ElGamal, Mental Poker
12Yingpeng Sang, Hong Shen 0001, Hui Tian 0001 Privacy-Preserving Tuple Matching in Distributed Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Huaqun Wang, Futai Zhang, Yanfei Sun Cryptanalysis of a Generalized Ring Signature Scheme. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Huixian Li, Liaojun Pang A Novel Biometric-Based Authentication Scheme with Privacy Protection. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Jianming Zhu A New Scheme to Privacy-Preserving Collaborative Data Mining. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Liang Chen, Chengmin Gao, Yong Xu Non-interactive Evaluation of Encrypted Elementary Functions. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Hung-Min Sun, Muh-Chyi Leu A Real-Time Selective Video Encryption Using Context-Key Control. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Mark Manulis Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Jordi Nin, Barbara Carminati, Elena Ferrari, Vicenç Torra Computing Reputation for Collaborative Private Networks. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Aggelos Kiayias, Hong-Sheng Zhou Zero-Knowledge Proofs with Witness Elimination. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval Distributed Public-Key Cryptography from Weak Secrets. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park Fair Threshold Decryption with Semi-Trusted Third Parties. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Kwang-Woo Lee, Yunho Lee, Seungjoo Kim, Dongho Won A Practical Approach to a Reliable Electronic Election. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF paper receipt, cut-and-choose, electronic voting
12Koray Karabina Double-Exponentiation in Factor-4 Groups and Its Applications. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Cristian Ene, Yassine Lakhnech, Van Chan Ngo Formal Indistinguishability Extended to the Random Oracle Model. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Laila El Aimani Anonymity from Public Key Encryption to Undeniable Signatures. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction
12Jian Ren 0001, Lein Harn Generalized Ring Signatures. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Lihua Liu, Zhengjun Cao Security Analysis of One Verifiable Encryption Scheme. Search on Bibsonomy Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Marek Klonowski, Miroslaw Kutylowski, Anna Lauks Repelling Detour Attack Against Onions with Re-encryption. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12N. R. Sunitha, B. B. Amberker Proxy Re-signature Schemes. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature
12David Cash, Eike Kiltz, Victor Shoup The Twin Diffie-Hellman Problem and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12N. R. Sunitha, B. B. Amberker A new method of verifying digital signatures in e-cheque processing. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Jean-Pierre David, Kassem Kalach, Nicolas Tittley Hardware Complexity of Modular Multiplication and Exponentiation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptography, Multiplication, Modular Arithmetic, Hardware Complexity
12Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai Orthogonality between Key Privacy and Data Privacy, Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized El Gamal signatures, LFSR-based PKCs, DSR, secure routing, multisignatures, small-world graphs, PGP
12Laila El Aimani, Damien Vergnaud Gradually Convertible Undeniable Signatures. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Xavier Boyen Miniature CCA2 PK Encryption: Tight Security Without Redundancy. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Je-Gyeong Jo, Jong-Won Seo, Hyung-Woo Lee Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint. Search on Bibsonomy FAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Biometrics Digital Key, Digital Key Generation, Digital Signature, Secure Communication, Fuzzy Vault
12Yanjiang Yang, Robert H. Deng, Feng Bao 0001 Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multicast acknowledgements, authenticated feedback, Ack implosion, generalized El-Gamal signatures, LFSR-based PKCs, multisignatures
12David Nowak A Framework for Game-Based Security Proofs. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, game, formal verification, proof assistant
12Yongdong Wu, Feng Bao 0001 Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury A Programmable Parallel Structure to perform Galois Field Exponentiation. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Velik Bellemin, Tadashi Araragi CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Isabelle Déchène Arithmetic of Generalized Jacobians. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF generalized Jacobians, semi-abelian varieties, Public-key cryptography, elliptic curves, discrete logarithm problem
12Ricardo Corin, Jerry den Hartog A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Nitesh Saxena Public Key Cryptography Sans Certificates in Ad Hoc Networks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé On the Security of a Repaired Mental Poker Protocol. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Security protocols, Mental poker
12Fatih Gelgi, Melih Onus Heuristics for Minimum Brauer Chain Problem. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Brauer chain, dynamic programming, greedy algorithms, exponentiation, addition chain
12Kamer Kaya, Ali Aydin Selçuk, Zahir Tezcan Threshold Cryptography Based on Asmuth-Bloom Secret Sharing. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Jung Hee Cheon Security Analysis of the Strong Diffie-Hellman Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai A "Medium-Field" Multivariate Public-Key Encryption Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Peter Y. A. Ryan, Steve A. Schneider Prêt à Voter with Re-encryption Mixes. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Adam L. Young, Moti Yung Hiding Information Hiding. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Anna Lauks How to Protect a Signature from Being Shown to a Third Party. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Adrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone Accelerated Verification of ECDSA Signatures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Kristian Gjøsteen Homomorphic Cryptosystems Based on Subgroup Membership Problems. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF homomorphic cryptosystems, subgroup membership problem, public key encryption
12Haifeng Qian, Zhenfu Cao, Lichen Wang, Qingshui Xue Efficient Non-interactive Deniable Authentication Protocols. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tight security, Authentication, Digital signature, MAC, Deniablity, Impersonation attack, Trapdoor permutations
12Zhe Yang 0003, Min Liu ZKp Based Identification Protocol on Conic Curve in Distributed Environment. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12JungHoon Ha, Jianying Zhou 0001, Sang-Jae Moon A Robust Double Auction Protocol Based on a Hybrid Trust Model. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Pascal Paillier, Damien Vergnaud Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang Tractable Rational Map Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tractable rational maps, digital signature, finite field, public key, multivariate
12Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff Practical Cryptography in High Dimensional Tori. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF torus-based cryptography, discrete-log based cryptography
12Jan Camenisch, Anton Mityagin Mix-Network with Stronger Security. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang t-Out-of-n String/Bit Oblivious Transfers Revisited. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Chi Seong Park, Mun-Kyu Lee, Dong Kyue Kim New Computation Paradigm for Modular Exponentiation Using a Graph Model. Search on Bibsonomy SAGA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Sabrina Tarento Machine-Checked Security Proofs of Cryptographic Signature Schemes. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12K. E. A. Negm Design, implementation and testing of mobile agent protection mechanism for MANETS. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Irina Branovic, Roberto Giorgi, Enrico Martinelli A workload characterization of elliptic curve cryptography methods in embedded environments. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt Towards a Uniform Description of Several Group Based Cryptographic Primitives. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF group-based cryptography, finitely presented groups, public key cryptography
12Gilles Barthe, Sabrina Tarento A Machine-Checked Formalization of the Random Oracle Model. Search on Bibsonomy TYPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Berry Schoenmakers, Pim Tuyls Practical Two-Party Computation Based on the Conditional Gate. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Takeshi Koshiba, Kaoru Kurosawa Short Exponent Diffie-Hellman Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Pradeep Kumar Mishra, Palash Sarkar 0001 Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scalar multipication, field inversion, side-channel attacks, elliptic curves, hyperelliptic curves, explicit formulae
12Jun Furukawa 0001 Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Kaoru Kurosawa, Toshihiko Matsuo How to Remove MAC from DHIES. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, hybrid encryption scheme
12Kyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 456 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license