Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit |
Attacking a polynomial-based cryptosystem: Polly Cracker. |
Int. J. Inf. Sec. |
2002 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Public key cryptography, Multivariate polynomials |
20 | Andrew Burnett, Keith Winters, Tom Dowling |
A Java implementation of an elliptic curve cryptosystem. |
PPPJ/IRE |
2002 |
DBLP BibTeX RDF |
Java |
20 | James P. Hughes 0001 |
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Douglas Wikström |
A Note on the Malleability of the El Gamal Cryptosystem. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Serge Vaudenay |
Cryptanalysis of the Chor - Rivest Cryptosystem. |
J. Cryptol. |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu |
RSA cryptosystem design based on the Chinese remainder theorem. |
ASP-DAC |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Amr M. Youssef, Guang Gong |
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Tatsuaki Okamoto, David Pointcheval |
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongtaek Chee, Choonsik Park |
New Public Key Cryptosystem Using Finite Non Abelian Groups. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Louis Goubin, Nicolas T. Courtois |
Cryptanalysis of the TTM Cryptosystem. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee |
A Generalized Takagi-Cryptosystem with a modulus of the form prqs. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Chih-Yuang Su, Shih-Am Hwang, Po-Song Chen, Cheng-Wen Wu |
An improved Montgomery's algorithm for high-speed RSA public-key cryptosystem. |
IEEE Trans. Very Large Scale Integr. Syst. |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Colin D. Walter |
Moduli for Testing Implementations of the RSA Cryptosystem. |
IEEE Symposium on Computer Arithmetic |
1999 |
DBLP DOI BibTeX RDF |
RSA modulus, implementation validation benchmark, verification, testing, cryptography, Computer arithmetic, correctness |
20 | Lijun Gao, Sarvesh Shrivastava, Hanho Lee, Gerald E. Sobelman |
A Compact Fast Variable Key Size Elliptic Curve Cryptosystem Coprocessor. |
FCCM |
1999 |
DBLP DOI BibTeX RDF |
FPGA, Elliptic curve cryptography, Reconfigurable hardware, Scalar multiplication, Galois field, Coprocessor |
20 | Ran Canetti, Shafi Goldwasser |
An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Che-Han Wu, Ming-Der Shieh, Chien-Hsing Wu 0002, Ming-Hwa Sheu, Jia-Lin Sheu |
A VLSI architecture of fast high-radix modular multiplication for RSA cryptosystem. |
ISCAS (1) |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Jen-Shiun Chiang, Jian-Kao Chen |
An efficient VLSI architecture for RSA public-key cryptosystem. |
ISCAS (1) |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Aviad Kipnis, Adi Shamir |
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Hung-Min Sun |
Improving the Security of the McEliece Public-Key Cryptosystem. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama |
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Tatsuaki Okamoto, Shigenori Uchiyama |
A New Public-Key Cryptosystem as Secure as Factoring. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Serge Vaudenay |
Cryptanalysis of the Chor-Rivest Cryptosystem. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
20 | David Naccache, Jacques Stern |
A New Public-Key Cryptosystem. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Phong Q. Nguyen, Jacques Stern |
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi |
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Public-key Encryption Schemes, Computational Problems in Lattices |
20 | Keith Gibson |
The Security of the Gabidulin Public Key Cryptosystem. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
20 | Bernd Meyer 0002, Volker Müller 0001 |
A Public Key Cryptosystem Based on Elliptic Curves over Z/nZ Equivalent to Factoring. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
20 | Feng Bao 0004, Yoshihide Igarashi |
A Randomized Algorithm to Finite Automata Public Key Cryptosystem. |
ISAAC |
1994 |
DBLP DOI BibTeX RDF |
|
20 | Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone |
On the Development of a Fast Elliptic Curve Cryptosystem. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
20 | J. K. Gibson |
Equivalent Goppa Codes and Trapdoors to McEliece's Public Key Cryptosystem. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Torben P. Pedersen |
A Threshold Cryptosystem without a Trusted Party (Extended Abstract). |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Valery I. Korzhik, Andrew I. Turkin |
Cryptanalysis of McEliece's Public-Key Cryptosystem. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Jacques Stern, Philippe Toffin |
Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
20 | Thomas W. Cusick, Michael C. Wood |
The REDOC II Cryptosystem. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
20 | Henri Gilbert, Guy Chassé |
A Statistical Attack of the FEAL-8 Cryptosystem. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
20 | Spyros S. Magliveras, Nasir D. Memon |
Properties of Cryptosystem PGM. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
20 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
20 | Jarkko Kari |
A Cryptosystem Based on Propositional Logic. |
IMYCS |
1988 |
DBLP DOI BibTeX RDF |
|
20 | Pil Joong Lee, Ernest F. Brickell |
An Observation on the Security of McEliece's Public-Key Cryptosystem. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
20 | Brigitte Vallée, Marc Girault, Philippe Toffin |
How to Break Okamoto's Cryptosystem by Reducing Lattice Bases. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
20 | Johan van Tilburg |
On the McEliece Public-Key Cryptosystem. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
20 | Carlisle M. Adams, Henk Meijer |
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
public key cryptosystems, goppa codes |
20 | Bernhard Smeets |
A Comment on Niederreiter's Public Key Cryptosystem. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
20 | Yvo Desmedt, Andrew M. Odlyzko |
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
20 | Taher El Gamal |
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
20 | Benny Chor, Ronald L. Rivest |
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
16 | Oded Regev 0001 |
On lattices, learning with errors, random linear codes, and cryptography. |
J. ACM |
2009 |
DBLP DOI BibTeX RDF |
average-case hardness, cryptography, quantum computation, Lattice, public key encryption |
16 | Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk |
Practical Threshold Signatures with Linear Secret Sharing Schemes. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Linear secret sharing, function sharing, threshold cryptography |
16 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Provably Secure Timed-Release Public Key Encryption. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
key-insulated encryption, timed-release, authenticated encryption |
16 | Tuncer C. Aysal, Kenneth E. Barner |
Sensor Data Cryptography in Wireless Sensor Networks. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Shangping Wang, Zhiqiang Chen, Xiaofeng Wang |
A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Electronic Cash Scheme, Group Signatures, Certificateless |
16 | Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan |
Side Channels in the McEliece PKC. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
side channel attack, timing attack, post quantum cryptography |
16 | Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri |
An Image Encryption System by Cellular Automata with Memory. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
image security, Lossy method, Cryptography, Cellular automata, image encryption, CA |
16 | Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng |
Could SFLASH be Repaired?. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
signature, differential, multivariate cryptography, SFLASH |
16 | Shanqing Guo, Chunhua Zhang |
Identity-based Broadcast Encryption Scheme with Untrusted PKG. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Yingpeng Sang, Hong Shen 0001 |
Privacy preserving set intersection based on bilinear groups. |
ACSC |
2008 |
DBLP BibTeX RDF |
non interactive zero-knowledge proof, cryptographic protocol, privacy preservation, set intersection, bilinear groups |
16 | Thomas Plantard, Willy Susilo, Khin Than Win |
A Digital Signature Scheme Based on CVPinfinity. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Yanli Ren, Dawu Gu |
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Douglas Wikström |
Simplified Submission of Inputs to Protocols. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Guoyan Zhang, Shaohui Wang |
A Certificateless Signature and Group Signature Schemes against Malicious PKG. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
malicious PKG, group signature, certificateless signature |
16 | Zhiguo Wan, Kui Ren 0001, Bart Preneel |
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
roaming protocols, privacy, mobile networks |
16 | Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama |
Low-density attack revisited. |
Des. Codes Cryptogr. |
2007 |
DBLP DOI BibTeX RDF |
AMS Classification 68P25, 11H31, 94B75, 68Q25 |
16 | Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç |
Micro-Architectural Cryptanalysis. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ben Adida, Douglas Wikström |
How to Shuffle in Public. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Akinori Kawachi, Keisuke Tanaka, Keita Xagawa |
Multi-bit Cryptosystems Based on Lattice Problems. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen |
An Analytical Model for Time-Driven Cache Attacks. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Yun-feng Wang, Man-de Xie, Ai-Ming Ji |
Research on a Piecewise Linear Chaotic Map and Its Cryptographical Application. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Wei Li 0013, Dawu Gu |
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Woei-Jiunn Tsaur, Haw-Tyng Pai |
A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Woei-Jiunn Tsaur, Haw-Tyng Pai |
Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Bogdan Groza |
An Extension of the RSA Trapdoor in a KEM/DEM Framework. |
SYNASC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Adam L. Young, Moti Yung |
Space-Efficient Kleptography Without Random Oracles. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
twisted elliptic curves, elliptic curve, Key exchange, kleptography |
16 | Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Xuefei Cao |
Design of Secure Watermarking Scheme for Watermarking Protocol. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters |
Attribute-based encryption for fine-grained access control of encrypted data. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption |
16 | Yevgeniy Dodis, Prashant Puniya |
On the Relation Between the Ideal Cipher and the Random Oracle Models. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Dragos Trinca |
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption |
16 | Jintai Ding, Jason E. Gower |
Inoculating Multivariate Schemes Against Differential Attacks. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate |
16 | Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn |
A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Berry Schoenmakers, Pim Tuyls |
Efficient Binary Conversion for Paillier Encrypted Values. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Yuen-Yan Chan, Jin Li 0002 |
BGN Authentication and Its Extension to Convey Message Commitments. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto |
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | JeaHoon Park, Hoon-Jae Lee 0001, JaeCheol Ha, YongJe Choi, Howon Kim 0001, Sang-Jae Moon |
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Yan Zong Ding |
Error Correction in the Bounded Storage Model. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Phong Q. Nguyen, Jacques Stern |
Adapting Density Attacks to Low-Weight Knapsacks. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Lattices, Knapsack, Public-Key Cryptanalysis, Subset Sum |
16 | Kristian Gjøsteen |
Symmetric Subgroup Membership Problems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, standard model, public key encryption, hybrid encryption |
16 | Adama Diene, Jintai Ding, Jason E. Gower, Timothy J. Hodges, Zhijun Yin |
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems. |
WCC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Pierre-Alain Fouque, Louis Granboulan, Jacques Stern |
Differential Cryptanalysis for Multivariate Schemes. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou |
Encryption Based on Reversible Second-Order Cellular Automata. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Oded Regev 0001 |
On lattices, learning with errors, random linear codes, and cryptography. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
cryptography, quantum computing, lattices, public key encryption, computational learning theory, statistical queries |
16 | Chunxiang Gu, Yuefei Zhu, YaJuan Zhang |
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Oded Regev 0001 |
New lattice-based cryptographic constructions. |
J. ACM |
2004 |
DBLP DOI BibTeX RDF |
average-case hardness, cryptography, quantum computing, Lattice, public key encryption |
16 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Jens Groth |
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
On the Security of Cryptosystems with All-or-Nothing Transform. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
16 | David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar |
A Provably Secure Elliptic Curve Scheme with Fast Encryption. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Jordi Castellà-Roca, Josep Domingo-Ferrer |
On the Security of an Efficient TTP-Free Mental Poker Protocol. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
E-gambling, Cryptographic protocols without Trusted Third Party (TTP), Mental poker |
16 | Jan Pelzl, Thomas J. Wollinger, Christof Paar |
High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson |
Universal Re-encryption for Mixnets. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|