The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Key with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1961 (38) 1962-1967 (15) 1968-1971 (15) 1972-1975 (23) 1976 (23) 1977-1978 (30) 1979 (23) 1980 (26) 1981 (25) 1982 (53) 1983 (44) 1984 (69) 1985 (89) 1986 (62) 1987 (110) 1988 (114) 1989 (186) 1990 (170) 1991 (144) 1992 (158) 1993 (203) 1994 (264) 1995 (365) 1996 (457) 1997 (522) 1998 (621) 1999 (881) 2000 (1219) 2001 (1632) 2002 (1849) 2003 (2429) 2004 (3346) 2005 (4194) 2006 (4700) 2007 (5290) 2008 (5168) 2009 (3729) 2010 (1592) 2011 (1223) 2012 (1158) 2013 (1296) 2014 (1347) 2015 (1422) 2016 (1724) 2017 (1551) 2018 (1665) 2019 (1786) 2020 (1898) 2021 (2024) 2022 (1948) 2023 (2119) 2024 (569)
Publication types (Num. hits)
article(19865) book(46) data(5) incollection(453) inproceedings(40846) phdthesis(295) proceedings(98)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 41555 occurrences of 11846 keywords

Results
Found 61687 publication records. Showing 61608 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Yijuan Shi, Gongliang Chen, Jianhua Li 0001 ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear parings, Key agreement, group key agreement, ID-based cryptography
29Yuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai Similar Keys of Multivariate Quadratic Public Key Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MQ, similar key, digital signature, public key cryptosystem, multivariate
29Li Zhou, Chinya V. Ravishankar Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Key Agreement, Secure Group Communication, Key Authentication
29Cheng-Fen Lu, Shiuh-Pyng Winston Shieh Secure Key-Evolving Protocols for Discrete Logarithm Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key-Evolving, Backward-Secrecy, Key Management, Forward-Secrecy
29Shai Halevi, Hugo Krawczyk Public-Key Cryptography and Password Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF hand-held certificates, public passwords, public-key protocols, passwords, key exchange, dictionary attacks
29Chih-Hung Li, Josef Pieprzyk Conference Key Agreement from Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key Establishment Protocols, Shamir Secret Sharing, Cryptographic Protocols, Key Agreement Protocols
29Tsutomu Matsumoto Incidence Structures for Key Sharing (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Key Sharing, Tactical Configuration, Tamper Resistant Module, Cryptography, Key Distribution, Identifier, Combinatorial Design, Binary Matrix
29YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won A PKI System for Detecting the Exposure of a User's Secret Key. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key-insulated signature, one-time hash chain, NOVOMODO
29Lein Harn, David Huang A Protocol for Establishing Secure Communication Channels in a Large Network. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange
29Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto SKMA: a key management architecture for SCADA systems. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF SCADA security, key distribution center (KDC), key establishment protocols, key management, secure protocol
29Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki A complete characterization of a family of key exchange protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key exchange graph, Key set protocol, Secret key exchange, Information-theoretically secure, Card game
29Renate Scheidler A Public-Key Cryptosystem Using Purely Cubic Fields. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Purely cubic field, Cubic residuacity character, Euclidean division, Purely cubic field, Cubic residuacity character, Euclidean division, Public-key cryptosystem, Public-key cryptosystem, Key words
28Pascal Junod, Alexandre Karlov, Arjen K. Lenstra Improving the Boneh-Franklin Traitor Tracing Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Boneh-Franklin traitor tracing, Guruswami-Sudan algorithm, Reed-Solomon codes, Berlekamp-Massey algorithm
28Benoît Libert, Damien Vergnaud Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption
28Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum Optimistic Fair Exchange in a Multi-user Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Designated Confirmer Signature, Digital Signature, Fair Exchange
28Daniel J. Bernstein Curve25519: New Diffie-Hellman Speed Records. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF new curve, new software, high conjectured security, short keys, elliptic curves, high speed, Diffie-Hellman, point multiplication, constant time
28Benoît Libert, Jean-Jacques Quisquater On Constructing Certificateless Cryptosystems from Identity Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF provable security, bilinear maps, Certificateless encryption
28Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto Security-Mediated Certificateless Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security-mediated cryptography, certificateless cryptography
28Ilya Mironov Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance
28Craig Gentry, Zulfikar Ramzan Identity-Based Aggregate Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan Experimenting with Faults, Lattices and the DSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF glitch attacks, fault injection, lattice reduction, DSA
28María Isabel González Vasco, Mats Näslund, Igor E. Shparlinski New Results on the Hardness of Diffie-Hellman Bits. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Jean Monnerat, Serge Vaudenay Undeniable Signatures Based on Characters: How to Sign with One Bit. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Residue Characters, Undeniable Signatures
28Chan H. Lee, Xiaotie Deng, Huafei Zhu Design and Security Analysis of Anonymous Group Identification Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Wen-Guey Tzeng, Zhi-Jia Tzeng Robust Forward-Secure Signature Schemes with Proactive Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF signature, threshold, forward security, proactive
28Rodrigo Roman, Cristina Alcaraz Applicability of Public Key Infrastructures in Wireless Sensor Networks. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Public Key Cryptography, Public Key Infrastructure
28Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee 0001, Jongin Lim 0001 A Key Management Scheme for Large Scale Distributed Sensor Networks. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, key management
28Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung Key-Insulated Public Key Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Barbara C. Davis, Tatu Ylönen Working Group Report on Internet/Intranet Security. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value
28Yu-Fang Chung, Tzer-Shyong Chen, Chia-Chao Ho, Yi-Hsuan Yeh, Hsiu-Chia Ko Hierarchical Time-Bound Key Management for Mobile Agents. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Time-bound Key Management, Access Control, Mobile Agent, Key Management, Elliptic Curve Cryptosystem
28Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic Distinguisher and Related-Key Attack on the Full AES-256. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack
28Liran Ma, Xiuzhen Cheng 0001, Fang Liu 0025, Fengguang An, Jose Rivera iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF in-situ key establishment, Security, Wireless sensor networks, key pre-distribution
28Patrick Tague, Radha Poovendran A canonical seed assignment model for key predistribution in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sensor networks, network models, Key establishment, key predistribution
28Hyun-Wook Jung, Jung-Yong Kim Performance Evaluation of the Wheel Navigation Key Used for Mobile Phone and MP3. Search on Bibsonomy HCI (10) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wheel Navigation Key, Button Key, Usability, Mobile phone, MP3
28Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network level key distribution, Mobile ad hoc networks, key management, data dissemination, trust establishment, wireless network security
28Chunguang Ma, Zhiguo Shang, Huiqiang Wang, Guining Geng An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Key management, Key pre-distribution, Heterogeneous wireless sensor networks
28Cong Liu, Huangpu Jiang Multigrid Based Key Predistribution Scheme in Ad Hoc Networks. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bivariate t-degree polynomial, Key management system, Key predistribution scheme, Ad hoc networks
28Donggang Liu, Peng Ning Improving key predistribution with deployment knowledge in static sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Sensor networks, key management, key predistribution
28Jong-Hyuk Roh, Kyoon-Ha Lee Key Management for Secure Overlay Multicast. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key hierarchy, Key Management, Overlay Multicast, Secure Multicast
28Salvatore Cristiano, Faye F. Liu On Splitting Public Keys for the Public Key Infrastructure. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key-split, certificate, ecommerce, public key infrastructure (PKI)
28André Adelsbach, Jörg Schwenk Key-assignment strategies for CPPM. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CPPM, device revocation, key-management, content protection, key-assignment
28Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein Harn Location-aware key management scheme for wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sensor networks, key management, probabilistic key sharing
28Ratna Dutta, Rana Barua, Palash Sarkar 0001 Provably Secure Authenticated Tree Based Group Key Agreement. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF provable security, bilinear pairing, group key agreement, authenticated key agreement
28Rana Barua, Ratna Dutta, Palash Sarkar 0001 Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF group key agreement, ID based cryptography, pairing based cryptography, authenticated key agreement
28Nicolas Gisin, Stefan Wolf 0001 Linking Classical and Quantum Key Agreement: Is There "Bound Information"? Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF intrinsic information, secret-key rate, quantum privacy amplification, purification, entanglement, Secret-key agreement
28Frank Hartung, Bernd Girod Fast Public-Key Watermarking of Compressed Video. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF fast public-key watermarking, pseudo-noise signal, watermark information, practical systems, public decoding, fast compressed-domain embedding technique, on-the-fly compressed-domain public-key watermarking, verification, images, decoding, compressed video, spread-spectrum watermarking
28T. R. N. Rao, Kil-Hyun Nam Private-Key Algebraic-Coded Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF private-key cryptosystems, Algebraic codes, crypto-complexity, Joint Encryption and Error-control Coding, public-key cryptosystems, cryptosystems, chosen-plaintext attack
27Guorui Li, Ying Wang 0033, Jingsha He Efficient Group Key Management Scheme in Wireless Sensor Networks. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Refined key link tree, Security, Wireless sensor networks, Key management, Group key
27Jonguk Kim, Sukin Kang, Manpyo Hong, Seong-uck Lee EDGAR: Extended Dynamic Group-Key AgReement. Search on Bibsonomy SUTC/UMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF group key establishment, adaptive key size, group member authentication, key agreement, group dynamics
27R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunasekaran Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data. Search on Bibsonomy ICSAP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Shared key, Small data, Security, Cryptography, Encryption, Decryption, Secret key, Symmetric key
27Chien-Ming You, Mong-Fong Horng, Yau-Hwang Kuo, Wan-Ling Du A Hybrid Fast Approach to Secure Group-Oriented Management of Key Trees on Internet. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hybrid key management, Group security, Key tree management, Group-Oriented key management
27Jouni Järvinen Dense Families and Key Functions of Database Relation Instances. Search on Bibsonomy FCT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Armstrong system, Dense family, Key function, Functional dependency, Key, Matrix representation
27Ueli M. Maurer, Stefan Wolf 0001 Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Compact CCA-Secure Encryption for Messages of Arbitrary Length. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Jun Shao, Zhenfu Cao CCA-Secure Proxy Re-encryption without Pairings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance
27Ivan Damgård, Gert Læssøe Mikkelsen On the Theory and Practice of Personal Digital Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Aggelos Kiayias, Hong-Sheng Zhou Zero-Knowledge Proofs with Witness Elimination. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Benoît Libert, Damien Vergnaud Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficiency, traceability, Identity-based encryption
27Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters Signing a Linear Subspace: Signature Schemes for Network Coding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Thomas Plantard, Willy Susilo, Khin Than Win A Digital Signature Scheme Based on CVPinfinity. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27James Birkett, Alexander W. Dent Relations Among Notions of Plaintext Awareness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Moses D. Liskov, Silvio Micali Online-Untransferable Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Carmine Ventre, Ivan Visconti Completely Non-malleable Encryption Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Steven D. Galbraith, Eric R. Verheul An Analysis of the Vector Decomposition Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Vector decomposition problem, generalised discrete logarithm problem, elliptic curves, Diffie-Hellman problem
27Takashi Nishide, Kazuo Ohta Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bitwise Sharing, Secret Sharing, Multiparty Computation
27Mihir Bellare, Sarah Shoup Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Vivien Dubois, Louis Granboulan, Jacques Stern Cryptanalysis of HFE with Internal Perturbation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internal perturbation, binary vector spaces, differential cryptanalysis, multivariate cryptography, HFE
27Rafail Ostrovsky, William E. Skeith III A Survey of Single-Database Private Information Retrieval: Techniques and Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Hovav Shacham, Brent Waters Efficient Ring Signatures Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 Generic On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic
27Payman Mohassel, Matthew K. Franklin Efficient Polynomial Operations in the Shared-Coefficients Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF polynomial operations, threshold homomorphic encryption, privacy-preserving set operations, secure multi-party computation, passive adversary
27Kaoru Kurosawa, Swee-Huay Heng The Power of Identification Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trapdoor commitment scheme, on-line/off-line, signature scheme, Identification scheme, identity-based
27Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Eike Kiltz On the Limitations of the Spread of an IBE-to-PKE Transformation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Ivan Damgård, Kasper Dupont Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Hung-Min Sun, Cheng-Ta Yang RSA with Balanced Short Exponents and Its Application to Entity Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Short Exponent Attack, RSA, Lattice Reduction, Entity Authentication
27Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk Converse Results to the Wiener Attack on RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Cheng-Kang Chu, Wen-Guey Tzeng Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Johannes Blömer, Alexander May 0001 A Generalized Wiener Attack on RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Nicolas T. Courtois Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Kaoru Kurosawa, Swee-Huay Heng From Digital Signature to ID-based Identification/Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GDH group, signature scheme, ID-based cryptography, identification scheme
27Dennis Hofheinz, Rainer Steinwandt A Practical Attack on Some Braid Group Based Cryptographic Primitives. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, braid groups
27Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 Formal Proofs for the Security of Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Kazukuni Kobara, Hideki Imai New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Jean-Sébastien Coron On the Security of Random Sources. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Pascal Paillier A Trapdoor Permutation Equivalent to Factoring. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Pascal Paillier Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Markus Jakobsson On Quorum Controlled Asymmetric Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF asymmetric proxy re-encryption, translation certificate, El Gamal encryption, quorum control, privacy, robustness
27Feng Bao 0001, Robert H. Deng A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF e-commerce, traceability, blinding signatures, anonymity revocation
27Pascal Paillier Evaluating Differential Fault Analysis of Unknown Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee A New Hash Function Based on MDx-Family and Its Application to MAC. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Tatsuaki Okamoto, Moti Yung Lower Bounds on Term-Based Divisible Cash Systems. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Jean-François Misarsky How (not) to Design RSA Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Shahrokh Saeednia, Reihaneh Safavi-Naini On the Security of Girault's Identification Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Wenbo Mao Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 61608 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license