The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptosystem with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1982 (23) 1983-1984 (18) 1985 (16) 1986-1987 (18) 1988 (17) 1989 (18) 1990 (16) 1991 (29) 1992-1993 (19) 1994 (18) 1995-1996 (22) 1997 (28) 1998 (43) 1999 (38) 2000 (30) 2001 (61) 2002 (60) 2003 (86) 2004 (109) 2005 (150) 2006 (144) 2007 (133) 2008 (128) 2009 (114) 2010 (73) 2011 (84) 2012 (65) 2013 (74) 2014 (67) 2015 (97) 2016 (66) 2017 (70) 2018 (115) 2019 (119) 2020 (112) 2021 (112) 2022 (94) 2023 (87) 2024 (24)
Publication types (Num. hits)
article(1164) incollection(28) inproceedings(1396) phdthesis(9)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1345 occurrences of 497 keywords

Results
Found 2597 publication records. Showing 2597 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit Attacking a polynomial-based cryptosystem: Polly Cracker. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptanalysis, Public key cryptography, Multivariate polynomials
20Andrew Burnett, Keith Winters, Tom Dowling A Java implementation of an elliptic curve cryptosystem. Search on Bibsonomy PPPJ/IRE The full citation details ... 2002 DBLP  BibTeX  RDF Java
20James P. Hughes 0001 A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Douglas Wikström A Note on the Malleability of the El Gamal Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Serge Vaudenay Cryptanalysis of the Chor - Rivest Cryptosystem. Search on Bibsonomy J. Cryptol. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu RSA cryptosystem design based on the Chinese remainder theorem. Search on Bibsonomy ASP-DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Amr M. Youssef, Guang Gong Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Tatsuaki Okamoto, David Pointcheval REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongtaek Chee, Choonsik Park New Public Key Cryptosystem Using Finite Non Abelian Groups. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Louis Goubin, Nicolas T. Courtois Cryptanalysis of the TTM Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee A Generalized Takagi-Cryptosystem with a modulus of the form prqs. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Chih-Yuang Su, Shih-Am Hwang, Po-Song Chen, Cheng-Wen Wu An improved Montgomery's algorithm for high-speed RSA public-key cryptosystem. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Colin D. Walter Moduli for Testing Implementations of the RSA Cryptosystem. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1999 DBLP  DOI  BibTeX  RDF RSA modulus, implementation validation benchmark, verification, testing, cryptography, Computer arithmetic, correctness
20Lijun Gao, Sarvesh Shrivastava, Hanho Lee, Gerald E. Sobelman A Compact Fast Variable Key Size Elliptic Curve Cryptosystem Coprocessor. Search on Bibsonomy FCCM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF FPGA, Elliptic curve cryptography, Reconfigurable hardware, Scalar multiplication, Galois field, Coprocessor
20Ran Canetti, Shafi Goldwasser An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Che-Han Wu, Ming-Der Shieh, Chien-Hsing Wu 0002, Ming-Hwa Sheu, Jia-Lin Sheu A VLSI architecture of fast high-radix modular multiplication for RSA cryptosystem. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Jen-Shiun Chiang, Jian-Kao Chen An efficient VLSI architecture for RSA public-key cryptosystem. Search on Bibsonomy ISCAS (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Aviad Kipnis, Adi Shamir Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Hung-Min Sun Improving the Security of the McEliece Public-Key Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Tatsuaki Okamoto, Shigenori Uchiyama A New Public-Key Cryptosystem as Secure as Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Serge Vaudenay Cryptanalysis of the Chor-Rivest Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20David Naccache, Jacques Stern A New Public-Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Phong Q. Nguyen, Jacques Stern Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Public-key Encryption Schemes, Computational Problems in Lattices
20Keith Gibson The Security of the Gabidulin Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
20Bernd Meyer 0002, Volker Müller 0001 A Public Key Cryptosystem Based on Elliptic Curves over Z/nZ Equivalent to Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
20Feng Bao 0004, Yoshihide Igarashi A Randomized Algorithm to Finite Automata Public Key Cryptosystem. Search on Bibsonomy ISAAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
20Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone On the Development of a Fast Elliptic Curve Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
20J. K. Gibson Equivalent Goppa Codes and Trapdoors to McEliece's Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Valery I. Korzhik, Andrew I. Turkin Cryptanalysis of McEliece's Public-Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Jacques Stern, Philippe Toffin Cryptanalysis of a Public-Key Cryptosystem Based on Approximations by Rational Numbers. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
20Thomas W. Cusick, Michael C. Wood The REDOC II Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
20Henri Gilbert, Guy Chassé A Statistical Attack of the FEAL-8 Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
20Spyros S. Magliveras, Nasir D. Memon Properties of Cryptosystem PGM. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
20Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
20Jarkko Kari A Cryptosystem Based on Propositional Logic. Search on Bibsonomy IMYCS The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
20Pil Joong Lee, Ernest F. Brickell An Observation on the Security of McEliece's Public-Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
20Brigitte Vallée, Marc Girault, Philippe Toffin How to Break Okamoto's Cryptosystem by Reducing Lattice Bases. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
20Johan van Tilburg On the McEliece Public-Key Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
20Carlisle M. Adams, Henk Meijer Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF public key cryptosystems, goppa codes
20Bernhard Smeets A Comment on Niederreiter's Public Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
20Yvo Desmedt, Andrew M. Odlyzko A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
20Taher El Gamal A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
20Benny Chor, Ronald L. Rivest A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
16Oded Regev 0001 On lattices, learning with errors, random linear codes, and cryptography. Search on Bibsonomy J. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF average-case hardness, cryptography, quantum computation, Lattice, public key encryption
16Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk Practical Threshold Signatures with Linear Secret Sharing Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear secret sharing, function sharing, threshold cryptography
16Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Provably Secure Timed-Release Public Key Encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-insulated encryption, timed-release, authenticated encryption
16Tuncer C. Aysal, Kenneth E. Barner Sensor Data Cryptography in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Shangping Wang, Zhiqiang Chen, Xiaofeng Wang A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Cash Scheme, Group Signatures, Certificateless
16Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan Side Channels in the McEliece PKC. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attack, timing attack, post quantum cryptography
16Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri An Image Encryption System by Cellular Automata with Memory. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF image security, Lossy method, Cryptography, Cellular automata, image encryption, CA
16Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng Could SFLASH be Repaired?. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signature, differential, multivariate cryptography, SFLASH
16Shanqing Guo, Chunhua Zhang Identity-based Broadcast Encryption Scheme with Untrusted PKG. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Yingpeng Sang, Hong Shen 0001 Privacy preserving set intersection based on bilinear groups. Search on Bibsonomy ACSC The full citation details ... 2008 DBLP  BibTeX  RDF non interactive zero-knowledge proof, cryptographic protocol, privacy preservation, set intersection, bilinear groups
16Thomas Plantard, Willy Susilo, Khin Than Win A Digital Signature Scheme Based on CVPinfinity. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Yanli Ren, Dawu Gu Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Douglas Wikström Simplified Submission of Inputs to Protocols. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Guoyan Zhang, Shaohui Wang A Certificateless Signature and Group Signature Schemes against Malicious PKG. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious PKG, group signature, certificateless signature
16Zhiguo Wan, Kui Ren 0001, Bart Preneel A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF roaming protocols, privacy, mobile networks
16Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama Low-density attack revisited. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AMS Classification 68P25, 11H31, 94B75, 68Q25
16Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç Micro-Architectural Cryptanalysis. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ben Adida, Douglas Wikström How to Shuffle in Public. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Akinori Kawachi, Keisuke Tanaka, Keita Xagawa Multi-bit Cryptosystems Based on Lattice Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen An Analytical Model for Time-Driven Cache Attacks. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yun-feng Wang, Man-de Xie, Ai-Ming Ji Research on a Piecewise Linear Chaotic Map and Its Cryptographical Application. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Wei Li 0013, Dawu Gu An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Woei-Jiunn Tsaur, Haw-Tyng Pai A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Woei-Jiunn Tsaur, Haw-Tyng Pai Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Bogdan Groza An Extension of the RSA Trapdoor in a KEM/DEM Framework. Search on Bibsonomy SYNASC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Adam L. Young, Moti Yung Space-Efficient Kleptography Without Random Oracles. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF twisted elliptic curves, elliptic curve, Key exchange, kleptography
16Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Xuefei Cao Design of Secure Watermarking Scheme for Watermarking Protocol. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters Attribute-based encryption for fine-grained access control of encrypted data. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption
16Yevgeniy Dodis, Prashant Puniya On the Relation Between the Ideal Cipher and the Random Oracle Models. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Dragos Trinca Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption
16Jintai Ding, Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate
16Laurence Tianruo Yang, Li Xu, Man Lin, John P. Quinn A Parallel GNFS Algorithm with the Biorthogonal Block Lanczos Method for Integer Factorization. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Berry Schoenmakers, Pim Tuyls Efficient Binary Conversion for Paillier Encrypted Values. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Yuen-Yan Chan, Jin Li 0002 BGN Authentication and Its Extension to Convey Message Commitments. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16JeaHoon Park, Hoon-Jae Lee 0001, JaeCheol Ha, YongJe Choi, Howon Kim 0001, Sang-Jae Moon A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Yan Zong Ding Error Correction in the Bounded Storage Model. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Michael Backes 0001, Christian Cachin Public-Key Steganography with Active Attacks. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Phong Q. Nguyen, Jacques Stern Adapting Density Attacks to Low-Weight Knapsacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Lattices, Knapsack, Public-Key Cryptanalysis, Subset Sum
16Kristian Gjøsteen Symmetric Subgroup Membership Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF subgroup membership problem, standard model, public key encryption, hybrid encryption
16Adama Diene, Jintai Ding, Jason E. Gower, Timothy J. Hodges, Zhijun Yin Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Pierre-Alain Fouque, Louis Granboulan, Jacques Stern Differential Cryptanalysis for Multivariate Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Zhenchuan Chai, Zhenfu Cao, Yuan Zhou Encryption Based on Reversible Second-Order Cellular Automata. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Oded Regev 0001 On lattices, learning with errors, random linear codes, and cryptography. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, quantum computing, lattices, public key encryption, computational learning theory, statistical queries
16Chunxiang Gu, Yuefei Zhu, YaJuan Zhang An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Oded Regev 0001 New lattice-based cryptographic constructions. Search on Bibsonomy J. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF average-case hardness, cryptography, quantum computing, Lattice, public key encryption
16Dae Hyun Yum, Pil Joong Lee Identity-Based Cryptography in Public Key Management. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Jens Groth Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai On the Security of Cryptosystems with All-or-Nothing Transform. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
16David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar A Provably Secure Elliptic Curve Scheme with Fast Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Jordi Castellà-Roca, Josep Domingo-Ferrer On the Security of an Efficient TTP-Free Mental Poker Protocol. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF E-gambling, Cryptographic protocols without Trusted Third Party (TTP), Mental poker
16Jan Pelzl, Thomas J. Wollinger, Christof Paar High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson Universal Re-encryption for Mixnets. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 2597 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license