The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ProvSec"( http://dblp.L3S.de/Venues/ProvSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/provsec

Publication years (Num. hits)
2007 (18) 2008 (26) 2009 (22) 2010 (19) 2011 (29) 2012 (22) 2013 (20) 2014 (27) 2015 (28) 2016 (24) 2017 (30) 2018 (26) 2019 (25) 2020 (21) 2021 (22) 2022 (20) 2023 (24)
Publication types (Num. hits)
inproceedings(386) proceedings(17)
Venues (Conferences, Journals, ...)
ProvSec(403)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 99 occurrences of 68 keywords

Results
Found 403 publication records. Showing 403 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Shengli Liu 0001, Junzuo Lai, Robert H. Deng General Construction of Chameleon All-But-One Trapdoor Functions. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yoshikazu Hanatani, Hirofumi Muratani, Tomoko Yonemura Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rafael Tonicelli, Bernardo Machado David, Vinícius de Morais Alves Universally Composable Private Proximity Testing. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mingwu Zhang, Takashi Nishide, Bo Yang 0003, Tsuyoshi Takagi Anonymous Encryption with Partial-Order Subset Delegation Functionality. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qianhong Wu, Bo Qin, Lei Zhang 0009, Josep Domingo-Ferrer Fully Distributed Broadcast Encryption. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liting Zhang, Wenling Wu, Peng Wang 0009 PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiaxin Pan, Libin Wang TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jens Groth Optimal Structure-Preserving Signatures. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kristian Gjøsteen, George Petrides, Asgeir Steine A Novel Framework for Protocol Analysis. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hai Huang Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paolo Palmieri 0001, Olivier Pereira Secure Two-Party Computation over a Z-Channel. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama, Yunlei Zhao Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fushan Wei, Chuangui Ma, Zhenfeng Zhang Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xianhui Lu, Bao Li 0001, Qixiang Mei, Haixia Xu 0002 Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ning Ding 0001, Dawu Gu Precise Time and Space Simulatable Zero-Knowledge. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Federico Olmedo, Santiago Zanella Béguelin Verifiable Security of Boneh-Franklin Identity-Based Encryption. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cheng Chen, Zhenfeng Zhang, Dengguo Feng Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III Generalized Learning Problems and Applications to Non-commutative Cryptography. (Extended Abstract) Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata A Framework for Constructing Convertible Undeniable Signatures. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Javier Herranz, Alexandre Ruiz, Germán Sáez Fully Secure Threshold Unsigncryption. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thomas Baignères, Pouyan Sepehrdad, Serge Vaudenay Distinguishing Distributions Using Chernoff Information. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kun Peng, Feng Bao 0001 Formal and Precise Analysis of Soundness of Several Shuffling Schemes. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva Improved Zero-Knowledge Identification with Lattices. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Identity Based Public Verifiable Signcryption Scheme. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Laila El Aimani Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Seiko Arita Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shota Yamada 0001, Goichiro Hanaoka, Noboru Kunihiro Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks Collision Resistant Double-Length Hashing. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Juraj Sarinay Interpreting Hash Function Security Proofs. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa Efficient Broadcast Encryption with Personalized Messages. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eike Kiltz Cryptographic Protocols from Lattices. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Keita Emura, Atsuko Miyaji, Kazumasa Omote An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Long Ngo, Colin Boyd, Juan Manuel González Nieto Automating Computational Proofs for Public-Key-Based Key Exchange. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1David Nowak, Yu Zhang A Calculus for Game-Based Security Proofs. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Keita Emura, Atsuko Miyaji, Kazumasa Omote A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication. Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Swee-Huay Heng, Kaoru Kurosawa (eds.) Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings Search on Bibsonomy ProvSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Keita Xagawa, Keisuke Tanaka Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF proof of plaintext knowledge, identification, code, zero knowledge, proof of knowledge, NTRU, lattice-based cryptography
1E. Dongna, Qingfeng Cheng, Chuangui Ma Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-Residue Attack, RSA, Password Authenticated Key Exchange
1Sven Schäge Twin Signature Schemes, Revisited. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Muxin Zhou, Zhenfu Cao Spatial Encryption under Simpler Assumption. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Liming Fang 0001, Willy Susilo, Jiandong Wang Anonymous Conditional Proxy Re-encryption without Random Oracle. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bogdan Warinschi Symbolic Methods for Provable Security. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0009, Qianhong Wu, Bo Qin Identity-Based Verifiably Encrypted Signatures without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature
1Fuchun Guo, Yi Mu 0001, Willy Susilo How to Prove Security of a Signature with a Tighter Security Reduction. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Signature, Security Proof, Chameleon Hash
1Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka Efficient Non-interactive Universally Composable String-Commitment Schemes. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-interactive string commitment, all-but-one trapdoor functions, homomorphism, universal composability
1Benoît Chevallier-Mames, Marc Joye Chosen-Ciphertext Secure RSA-Type Cryptosystems. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA-based encryption schemes, instance-independence assumptions, one-time mappable chameleon hashing, standard model, public-key encryption, Chosen-ciphertext security
1Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Fangguo Zhang (eds.) Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 Server-Controlled Identity-Based Authenticated Key Exchange. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Key Exchange, Identity-based Cryptography
1Yuan Tian 0036, Hao Zhang GUC-Secure Set-Intersection Computation. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure Set-Intersection Computation, Anonymous Identity-based Encryption, Generalized Universally Composable Security, Secure Multiparty Computation
1Alexander W. Dent A Brief History of Security Models for Confidentiality. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Vishal Saraswat, Aaram Yun Anonymous Signatures Revisited. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymous signature, unpreten- dability, anonymity, signature
1Yanjiang Yang, Yingjiu Li, Jian Weng 0001, Jianying Zhou 0001, Feng Bao 0001 Self-enforcing Private Inference Control. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF self-enforcing, database, Inference control
1Berkant Ustaoglu Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF leaking ephemeral secrets, postponed ephemeral key derivation, pseudo-static keys, Key agreement protocols
1Daisuke Moriyama, Tatsuaki Okamoto An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Sven Laur, Margus Niitsoo Oracle Separation in the Non-uniform Model. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography
1Man Ho Au, Willy Susilo, Yi Mu 0001 Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF on-line/off-line signatures, divisible on-line/off-line signatures, OS-EU-CMA, DOS-EU-CMA
1Zhengqin Luo Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto Relationship of Three Cryptographic Channels in the UC Framework. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Channel (SC), Two-Anonymous Channel (2AC), Direction-Indeterminable Channel (DIC), Universal Composability (UC), Probabilistic Input/Output Automaton (PIOA)
1Liqun Chen 0002, Paul Morrissey, Nigel P. Smart On Proofs of Security for DAA Schemes. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, signcryption, Identity based cryptography
1Wei Du, Mingxing He Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Key distribution, self-healing, WSNs, collusion attack
1Fuchun Guo, Yi Mu 0001 Optimal Online/Offline Signature: How to Sign a Message without Online Computation. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Siu-Ming Yiu Timed-Release Encryption Revisited. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF release-time confidentiality, Timed-release encryption
1Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF matrix semigroup action, DDH problem, public key cryptosystem, semantically secure
1Huafei Zhu Round Optimal Universally Composable Oblivious Transfer Protocols. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Double trap-door cryptosystems, simulator, oblivious transfer, universally composable
1Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, provable security, forward security, key exposure
1Zhenhua Liu 0001, Yupu Hu, Hua Ma Secure Proxy Multi-signature Scheme in the Standard Model. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF proxy multi-signature, provable security, bilinear pairings, standard model
1S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan Efficient and Provably Secure Certificateless Multi-receiver Signcryption. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multi-receiver, Bilinear Pairing, Signcryption, Certificateless
1Atsushi Mitsuda, Tetsu Iwata Tweakable Pseudorandom Permutation from Generalized Feistel Structure. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Luby-Rackoff theory, generalized Feistel structure, security proofs, tweakable blockcipher
1Joonsang Baek, Feng Bao 0001, Kefei Chen, Xuejia Lai (eds.) Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Server-Aided Verification Signatures: Definitions and New Constructions. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Server-aided computation, server-aided verification, BLS, ZSS, untrusted server, random oracle
1Wei Han, Tao Hao, Dong Zheng 0001, Kefei Chen, Xiaofeng Chen 0001 A Tamper-Evident Voting Machine Resistant to Covert Channels. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tamper-evident, receipt-free, electronic voting, covert channel
1Tibor Jager, Jörg Schwenk On the Equivalence of Generic Group Models. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, forward security, bilinear maps, computation Diffie-Hellman problem
1Sebastian Gajek A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF browser-based protocols, security model, Universal Composability
1Kristian Gjøsteen, Lillian Kråkmo Round-Optimal Blind Signatures from Waters Signatures. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Waters signatures, Blind signatures
1Peeter Laud, Long Ngo Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta Leaky Random Oracle (Extended Abstract). Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash list, provable security, leakage, standard model, random oracle model
1Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk Universally Composable Security Analysis of TLS. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TLS/SSL, secure sessions, key exchange, Universal Composability
1Yvo Desmedt, Duong Hieu Phan A CCA Secure Hybrid Damgård's ElGamal Encryption. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Margus Niitsoo Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mutual athentication, leakage-resilient, Key establishment
1Sébastien Canard, Iwen Coisel, Jacques Traoré Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ermaliza Razali, Raphael C.-W. Phan, Marc Joye On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security
1Jin Li 0002, Tsz Hon Yuen, Kwangjo Kim Practical Threshold Signatures Without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CDH problem, Threshold Signature, Bilinear groups
1Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wei Li 0013, Dawu Gu An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Joseph K. Liu, Yi Mu 0001 (eds.) Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Aivo Jürgenson Does Secure Time-Stamping Imply Collision-Free Hash Functions? Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Thomas Fuhr 0001, Pascal Paillier Decryptable Searchable Encryption. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001, Sanjit Chatterjee Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0009, Futai Zhang, Wei Wu 0001 A Provably Secure Ring Signature Scheme in Certificateless Cryptography. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography
1Takahiro Matsuda 0002, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF target collision resistant hash function, digital signature, standard model, strong unforgeability
1Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen 0001 Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bilinear pairings, Proxy signature, Random oracle, Aggregate signature
1Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin Stronger Security of Authenticated Key Exchange. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Christophe Tartary, Huaxiong Wang, Josef Pieprzyk An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction
Displaying result #301 - #400 of 403 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license