The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Whitfield Diffie, Martin E. Hellman New Directions in Cryptography. Search on Bibsonomy Democratizing Cryptography The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Paul C. van Oorschot Public Key Cryptography's Impact on Society: How Diffie and Hellman Changed the World. Search on Bibsonomy Democratizing Cryptography The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Joan Feigenbaum A Gift that Keeps on Giving: The Impact of Public-Key Cryptography on Theoretical Computer Science. Search on Bibsonomy Democratizing Cryptography The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Johannes Buchmann 0001, Michael J. Jacobson Jr., Hugh C. Williams The Influence of Public-Key Cryptography on Mathematics. Search on Bibsonomy Democratizing Cryptography The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov Count Me In! Extendability for Threshold Ring Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Ren Ishibashi, Kazuki Yoneyama Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Vadim Lyubashevsky, Ngoc Khanh Nguyen 0001, Maxime Plançon Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Ngoc Khanh Nguyen 0001, Eftychios Theodorakis, Bogdan Warinschi Lifting Standard Model Reductions to Common Setup Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Wasilij Beskorovajnov, Roland Gröll, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Fuyuki Kitagawa, Ryo Nishimaki KDM Security for the Fujisaki-Okamoto Transformations in the QROM. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Qiqi Lai, Feng-Hao Liu, Zhedong Wang Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Jiaxin Pan, Benedikt Wagner Lattice-Based Signatures with Tight Adaptive Corruptions and More. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Abida Haque, Stephan Krenn, Daniel Slamanig, Christoph Striecks Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Rohit Chatterjee, Kai-Min Chung, Xiao Liang 0014, Giulio Malavolta A Note on the Post-quantum Security of (Ring) Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Kamil Kluczniak Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Ryo Nishimaki The Direction of Updatable Encryption Does Matter. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Julia Kastner, Julian Loss, Jiayu Xu On Pairing-Free Blind Signature Schemes in the Algebraic Group Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Jose Maria Bermudo Mera, Angshuman Karmakar, Tilen Marc, Azam Soleimanian Efficient Lattice-Based Inner-Product Functional Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Jacqueline Brendel, Rune Fiedler, Felix Günther 0001, Christian Janson, Douglas Stebila Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser Financially Backed Covert Security. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Ehsan Ebrahimi Post-quantum Security of Plain OAEP Transform. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Shiduo Zhang, Yang Yu Towards a Simpler Lattice Gadget Toolkit. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Helger Lipmaa A Unified Framework for Non-universal SNARKs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti On the Isogeny Problem with Torsion Point Information. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky CNF-FSS and Its Applications. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Pierrick Dartois, Luca De Feo On the Security of OSIDH. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Claudio Orlandi, Divya Ravi, Peter Scholl On the Bottleneck Complexity of MPC with Correlated Randomness. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Hiroshi Onuki, Tomoki Moriya Radical Isogenies on Montgomery Curves. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Pierre Karpman, Charlotte Lefevre Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song Storing and Retrieving Secrets on a Blockchain. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Alan Szepieniec, Yuncong Zhang Polynomial IOPs for Linear Algebra Relations. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Damiano Abram, Peter Scholl Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Julien Devevey, Benoît Libert, Thomas Peters Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Andre Esser 0001, Emanuele Bellini 0002 Syndrome Decoding Estimator. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Jan-Pieter D'Anvers, Senne Batsleer Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Yi Liu 0053, Qi Wang 0012, Siu-Ming Yiu Making Private Function Evaluation Safer, Faster, and Simpler. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Sarasij Maitra, David J. Wu 0001 Traceable PRFs: Full Collusion Resistance and Active Security. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Pedro Branco 0005, Nico Döttling, Paulo Mateus Two-Round Oblivious Linear Evaluation from Learning with Errors. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Diego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi 0002 ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28James Bartusek, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang Reusable Two-Round MPC from LPN. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Aisling Connolly, Pascal Lafourcade 0001, Octavio Perez-Kempner Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Juan A. Garay (eds.) Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Juan A. Garay (eds.) Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Dakshita Khurana, Brent Waters On the CCA Compatibility of Public-Key Infrastructure. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28David Heath, Vladimir Kolesnikov, Stanislav Peceny Masked Triples - Amortizing Multiplication Triples Across Conditionals. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis Steel: Composable Hardware-Based Stateful and Randomised Functional Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Jung Hee Cheon, Wonhee Cho 0001, Jeong Han Kim, Jiseung Kim 0001 Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu 0001 More Efficient Digital Signatures with Tight Multi-user Security. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Ariel Hamlin, Mayank Varia Two-Server Distributed ORAM with Sublinear Computation and Constant Rounds. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Khoa Nguyen 0002, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28David Niehues Verifiable Random Functions with Optimal Tightness. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, Jaspal Singh Private Set Operations from Oblivious Switching. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Adam O'Neill, Mohammad Zaheri On Selective-Opening Security of Deterministic Primitives. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Andrea Caforio, F. Betül Durak, Serge Vaudenay Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Pedro Branco 0005, Nico Döttling, Sihang Pu Multiparty Cardinality Testing for Threshold Private Intersection. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito Revisiting (R)CCA Security and Replay Protection. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Yuval Ishai, Russell W. F. Lai, Giulio Malavolta A Geometric Approach to Homomorphic Secret Sharing. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis BETA: Biometric-Enabled Threshold Authentication. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Alexandre Bois, Ignacio Cascudo, Dario Fiore 0001, Dongwoo Kim 0003 Flexible and Efficient Verifiable Computation on Encrypted Data. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Miguel Ambrona Generic Negation of Pair Encodings. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Saikrishna Badrinarayanan, Peihan Miao 0001, Srinivasan Raghuraman, Peter Rindal Multi-party Threshold Private Set Intersection with Sublinear Communication. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Marc Fischlin, Felix Rohrbach Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Koji Nuida Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Balthazar Bauer, Georg Fuchsbauer, Chen Qian 0002 Transferable E-Cash: A Cleaner Model and the First Practical Instantiation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Nils Fleischhacker, Mark Simkin 0001 On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Hilder Vitor Lima Pereira Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One Second. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Morten Øygarden, Patrick Felke, Håvard Raddum Analysis of Multivariate Encryption Schemes: Application to Dob. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Shengyuan Feng, Junqing Gong 0001, Jie Chen 0021 Master-Key KDM-Secure ABE via Predicate Encoding. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Julien Devevey, Benoît Libert, Khoa Nguyen 0002, Thomas Peters, Moti Yung Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Xu Liu, Mingqiang Wang QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi 0002 Two-Party Adaptor Signatures from Identification Schemes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha Banquet: Short and Fast Signatures from AES. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner Multi-Client Functional Encryption for Separable Functions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Olivier Sanders Improving Revocation for Group Signature with Redactable Signature. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Jesus Diaz, Anja Lehmann Group Signatures with User-Controlled and Sequential Linkability. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Tsz Hon Yuen, Handong Cui, Xiang Xie Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld On the Integer Polynomial Learning with Errors Problem. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Qiqi Lai, Feng-Hao Liu, Zhedong Wang Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Vadim Lyubashevsky, Ngoc Khanh Nguyen 0001, Gregor Seiler Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi Updatable Signatures and Message Authentication Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Ivan Damgård, Claudio Orlandi, Akira Takahashi 0002, Mehdi Tibouchi Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from Lattices. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Netanel Raviv, Ben Langton, Itzhak Tamo Multivariate Public Key Cryptosystem from Sidon Spaces. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Pascal Bemmann, Rongmao Chen, Tibor Jager Subversion-Resilient Public Key Encryption with Practical Watchdogs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Maxime Plançon, Thomas Prest Exact Lattice Sampling from Non-Gaussian Distributions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto Isogeny-Based Key Compression Without Pairings. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Cyril Bouvier, Laurent Imbert An Alternative Approach for SIDH Arithmetic. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Nico Döttling, Ryo Nishimaki Universal Proxy Re-Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Eamonn W. Postlethwaite, Fernando Virdia On the Success Probability of Solving Unique SVP via BKZ. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Michael Walter 0001 The Convergence of Slide-Type Reductions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Tibor Jager, Rafael Kurek, David Niehues Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas (eds.) Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas (eds.) Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Sven Schäge, Jörg Schwenk, Sebastian Lauer Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Irene Giacomelli Mon$\mathbb {Z}_{2^{k}}$a: Fast Maliciously Secure Two Party Computation on $\mathbb {Z}_{2^{k}}$. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 18658 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license