|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
30 | Nam-Su Jho, Eun Sun Yoo, Jung Hee Cheon, Myung-Hwan Kim |
New broadcast encryption scheme using tree-based circle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pp. 37-44, 2005, ACM, 1-59593-230-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
punctured interval, broadcast encryption, tree structure, cascade |
30 | Yuliang Zheng 0001, Yongge Wang |
Efficient and provably secure ciphers for storage device block level encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 103-107, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
storage device encryption, hash function, symmetric cipher |
30 | Eric Corndorf, Chuang Liang, Gregory S. Kanter, Prem Kumar, Horace P. Yuen |
Quantum-noise: protected data encryption for WDM fiber-optic networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 34(5), pp. 21-30, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
quantum cryptography, data encryption |
30 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
Custodian-Hiding Verifiable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 51-64, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Publicly Verifiable, Anonymity, Verifiable Encryption |
30 | Palash Sarkar 0001 |
HEAD: Hybrid Encryption with Delegated Decryption Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 230-244, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
DHIES, delegated decryption, public key encryption |
30 | Kenneth G. Paterson, Arnold K. L. Yau |
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 305-323, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
padding oracle attack, CBC-mode encryption, ISO standard |
30 | Kaoru Kurosawa, Yvo Desmedt |
A New Paradigm of Hybrid Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 426-442, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
KEM, standard model, hybrid encryption |
30 | Omer Horvitz, Virgil D. Gligor |
Weak Key Authenticity and the Computational Completeness of Formal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 530-547, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Weak Key Authenticity, Authentication, Cryptography, Encryption, Completeness, Formal Reasoning |
30 | Davor Runje, Mario Kovac |
Universal Strong Encryption FPGA Core Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 1998 Design, Automation and Test in Europe (DATE '98), February 23-26, 1998, Le Palais des Congrès de Paris, Paris, France, pp. 923-924, 1998, IEEE Computer Society, 0-8186-8359-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Chip Architecture, FPGA, Encryption, IDEA |
30 | Paul C. van Oorschot, Michael J. Wiener |
A Known Plaintext Attack on Two-Key Triple Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 318-325, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
Triple encryption, cryptanalysis, DES |
30 | Nuttapong Attrapadung, Hideki Imai |
Conjunctive Broadcast and Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings, pp. 248-265, 2009, Springer, 978-3-642-03297-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Key policy, Revocable ABE, Disjunctive multi-authority ABE, Broadcast encryption, Attribute-based encryption, Ciphertext policy |
30 | David Galindo |
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 389-398, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
non-interactive proofs, standard model, public key encryption, identity-based encryption |
30 | Cameron Laird |
Taking a Hard-Line Approach to Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(3), pp. 13-15, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Encryption-enabled hard drives, information security, Data encryption |
30 | Sherman S. M. Chow |
Token-Controlled Public Key Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 315-332, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Token-controlled, provable security, standard model, public key encryption, timed-release encryption |
30 | Yinxia Sun, Futai Zhang, Joonsang Baek |
Strongly Secure Certificateless Public Key Encryption Without Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 194-208, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
certificateless public key encryption, public key encryption, Computational Diffie-Hellman problem |
30 | Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky |
Searchable symmetric encryption: improved definitions and efficient constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 79-88, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
searchable symmetric encryption, security definitions, multi-user, searchable encryption |
28 | Yuichi Komano, Kazuo Ohta |
Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 366-382, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Tatsuaki Okamoto, David Pointcheval |
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 159-175, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Adam J. Elbirt, Christof Paar |
An FPGA implementation and performance evaluation of the Serpent block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2000, Monterey, CA, USA, February 10-11, 2000, pp. 33-40, 2000, ACM, 1-58113-193-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, cryptography, VHDL, block cipher |
28 | Michael Walker 0001 |
On the Security of 3GPP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 102-103, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(10), pp. 1801-1811, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
28 | Bian Yang, Christoph Busch 0001, Mohammad Omar Derawi, Patrick Bours, Davrondzhon Gafurov |
Geometric-Aligned Cancelable Fingerprint Templates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: Image Analysis and Processing - ICIAP 2009, 15th International Conference Vietri sul Mare, Italy, September 8-11, 2009, Proceedings, pp. 490-499, 2009, Springer, 978-3-642-04145-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cancelable fingerprint template, fingerprint alignment, coordinate encryption, template protection |
28 | Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee |
Collect and broadcast news in security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 912-917, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cipher text, plaintext, algorithm, encryption, decryption |
28 | Kathryn Garson, Carlisle Adams |
Security and privacy system architecture for an e-hospital environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 122-130, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy-based encryption, privacy, authentication, health care |
28 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 280-286, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher |
28 | Manuel Barbosa, Pooya Farshim |
Secure Cryptographic Workflow in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 379-393, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption |
28 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 362-371, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Public key encryption, Identity based, Bilinear groups |
28 | Erkay Savas, Berk Sunar |
A Practical and Secure Communication Protocol in the Bounded Storage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 707-717, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
hyper-encryption, information theoretical security, pervasive networks, Bounded storage model |
28 | Tomas Sander, Adam L. Young, Moti Yung |
Non-Interactive CryptoComputing For NC1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 40th Annual Symposium on Foundations of Computer Science, FOCS '99, 17-18 October, 1999, New York, NY, USA, pp. 554-567, 1999, IEEE Computer Society, 0-7695-0409-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
cryptocomputing, cryptography, public key, complexity theory, homomorphic encryption, secure computation |
28 | David Pointcheval |
New Public Key Cryptosystems Based on the Dependent-RSA Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 239-254, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks |
28 | Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi |
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 105-111, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Public-key Encryption Schemes, Computational Problems in Lattices |
28 | Benoît Chevallier-Mames, Marc Joye |
Chosen-Ciphertext Secure RSA-Type Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 32-46, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RSA-based encryption schemes, instance-independence assumptions, one-time mappable chameleon hashing, standard model, public-key encryption, Chosen-ciphertext security |
28 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 16-31, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator |
28 | Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang |
The Secure DAES Design for Embedded System Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 617-626, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
branch number, repeating property, symmetric encryption algorithms, embedded system, Advanced Encryption Standard, data security |
28 | Kristian Gjøsteen |
Symmetric Subgroup Membership Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 104-119, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, standard model, public key encryption, hybrid encryption |
28 | Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, pp. 114-127, 2001, Springer, 3-540-43026-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption |
28 | Stephen R. Dussé, Burton S. Kaliski Jr. |
A Cryptographic Library for the Motorola DSP56000. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 230-244, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
Encryption hardware, Message digest, Montgomery reduction, Motorola DSP56000, RSA, Data Encryption Standard (DES), Modular arithmetic, Multiple-precision arithmetic |
27 | Denis Osin, Vladimir Shpilrain |
Public Key Encryption and Encryption Emulation Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, Third International Computer Science Symposium in Russia, CSR 2008, Moscow, Russia, June 7-12, 2008, Proceedings, pp. 252-260, 2008, Springer, 978-3-540-79708-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 217-232, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Debrup Chakraborty, Palash Sarkar 0001 |
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 293-309, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
tweakable encryption, strong pseudo-random permutation, mode of operation |
27 | Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno |
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 330-346, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, Stream cipher, encryption, MAC |
25 | Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy |
Compiler-Assisted Memory Encryption for Embedded Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. High Perform. Embed. Archit. Compil. ![In: Transactions on High-Performance Embedded Architectures and Compilers II, pp. 23-44, 2009, Springer, 978-3-642-00903-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Jirí Giesl, Ladislav Behal, Karel K. Vlcek |
Hardware solution of chaos based image encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DDECS ![In: Proceedings of the 2009 IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2009, April 15-17, 2009, Liberec, Czech Republic, pp. 198-201, 2009, IEEE Computer Society, 978-1-4244-3341-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev 0001, Hovav Shacham, Scott Yilek |
Hedged Public-Key Encryption: How to Protect against Bad Randomness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 232-249, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Dennis Hofheinz, Scott Yilek |
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 1-35, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Giuseppe Ateniese, Karyn Benson, Susan Hohenberger |
Key-Private Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 279-294, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Karl Martin, Konstantinos N. Plataniotis |
Coding and encryption of visual objects for privacy protected surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 1360-1363, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yang Lu 0001, Jiguo Li 0001, Junmo Xiao |
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 296-300, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Manoj Prabhakaran 0001, Mike Rosulek |
Homomorphic Encryption with CCA Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 667-678, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda |
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: FPL 2008, International Conference on Field Programmable Logic and Applications, Heidelberg, Germany, 8-10 September 2008, pp. 23-28, 2008, IEEE, 978-1-4244-1961-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yang Lu 0001, Jiguo Li 0001, Junmo Xiao |
Generic Construction of Certificate-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1589-1594, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Zhao Song 0005, Hengjian Li, Yan Xu |
A Secure and Efficient Fingerprint Images Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2803-2808, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Kazumasa Omote, Kazuhiko Kato |
Protection and Recovery of Disk Encryption Key Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 106-111, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Chigullapally Narsimha Raju, Ganugula Umadevi, Kannan Srinathan, C. V. Jawahar |
Fast and Secure Real-Time Video Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICVGIP ![In: Sixth Indian Conference on Computer Vision, Graphics & Image Processing, ICVGIP 2008, Bhubaneswar, India, 16-19 December 2008, pp. 257-264, 2008, IEEE Computer Society, 978-0-7695-3476-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Jonathan Katz, Amit Sahai, Brent Waters |
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 146-162, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ayoub Massoudi, Frédéric Lefèbvre, Christophe De Vleeschouwer, François-Olivier Devaux |
Secure and Low Cost Selective Encryption for JPEG2000. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Tenth IEEE International Symposium on Multimedia (ISM2008), December 15-17, 2008, Berkeley, California, USA, pp. 31-38, 2008, IEEE Computer Society, 978-0-7695-3454-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yanli Ren, Dawu Gu |
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 104-115, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Chien-Pen Chuang, Tin-Ying Huang, Li-Chi Yeh |
Encryption and Decryption with Space Transformation for Bi-directional Association. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 121-126, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yvo Desmedt, Duong Hieu Phan |
A CCA Secure Hybrid Damgård's ElGamal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 68-82, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky |
Circular-Secure Encryption from Decision Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 108-125, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker |
Towards an Information Theoretic Analysis of Searchable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 345-360, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou |
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(1), pp. 103-108, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-user cryptography, proven security, random oracle, ID-based cryptography |
25 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(3), pp. 265-294, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Shujun Li, Guanrong Chen, Albert Cheung, Bharat K. Bhargava, Kwok-Tung Lo |
On the Design of Perceptual MPEG-Video Encryption Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 17(2), pp. 214-223, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Alexandra Boldyreva, Kaoru Kurosawa, Jessica Staddon |
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 53(11), pp. 3927-3943, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Zhaohui Cheng, Liqun Chen 0002, Li Ling, Richard Comley |
General and Efficient Certificateless Public Key Encryption Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 83-107, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Cécile Delerablée, Pascal Paillier, David Pointcheval |
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 39-59, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Youngjun Kim, Jason Kim 0004 |
U-City User Authentication Methods and Encryption Techniques Based on Biometric Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FBIT ![In: Frontiers in the Convergence of Bioscience and Information Technologies 2007, FBIT 2007, Jeju Island, Korea, October 11-13, 2007, pp. 695-697, 2007, IEEE Computer Society, 978-0-7695-2999-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Gale D. Fritsche, Sara K. Rodgers |
Encryption technologies: testing and identifying campus needs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services 2007, Orlando, Florida, USA, October 7-10, 2007, pp. 109-112, 2007, ACM, 978-1-59593-634-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
breach, mandate, privacy, evaluation, protection, compliance, sensitive data |
25 | Ji-Seon Lee, Jik Hyun Chang |
Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 825-830, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Michael O. Rabin |
DISC 20th Anniversary: Invited Talk Provably Unbreakable Hyper-Encryption Using Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings, pp. 506-508, 2007, Springer, 978-3-540-75141-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Chong Fu, Zhen-chuan Zhang, Ying Chen, Xingwei Wang 0001 |
An Improved Chaos-Based Image Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2007, 7th International Conference Beijing, China, May 27-30, 2007, Proceedings, Part I, pp. 575-582, 2007, Springer, 978-3-540-72583-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Petre Anghelescu, Silviu Ionita, Emil Sofron |
Block Encryption Using Hybrid Additive Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS ![In: 7th International Conference on Hybrid Intelligent Systems, HIS 2007, Kaiserslautern, Germany, September 17-19, 2007, pp. 132-137, 2007, IEEE Computer Society, 0-7695-2946-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 1086-1095, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Alexandra Boldyreva, Adam O'Neill |
Deterministic and Efficiently Searchable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 535-552, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Manoj Prabhakaran 0001, Mike Rosulek |
Rerandomizable RCCA Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 517-534, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy |
Compiler-Assisted Memory Encryption for Embedded Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPEAC ![In: High Performance Embedded Architectures and Compilers, Second International Conference, HiPEAC 2007, Ghent, Belgium, January 28-30, 2007, Proceedings, pp. 7-22, 2007, Springer, 978-3-540-69337-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Yinian Mao, Min Wu 0001 |
A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(7), pp. 2061-2075, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Panu Hämäläinen, Timo Alho, Marko Hännikäinen, Timo D. Hämäläinen |
Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: Ninth Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD 2006), 30 August - 1 September 2006, Dubrovnik, Croatia, pp. 577-583, 2006, IEEE Computer Society, 0-7695-2609-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater |
SEA: A Scalable Encryption Algorithm for Small Embedded Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 222-236, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Daniele Micciancio, Saurabh Panjwani |
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 70-82, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Yi Xin, Ran Tao 0003, Yue Wang 0001 |
Image Encryption Based on a Novel Reality-Preserving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (3) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 22-25, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Gang Chen 0001, Ke Chen 0005, Jinxiang Dong |
A Database Encryption Scheme for Enhanced Security and Easy Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 10th International Conference on CSCW in Design, CSCWD 2006, May 3-5, 2006, Southeast University, Nanjing, China, pp. 995-1000, 2006, IEEE, 1-4244-0165-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Fengling Han, Jiankun Hu, Xinghuo Yu 0001 |
A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (3) ![In: Computational Intelligence and Bioinformatics, International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Proceedings, Part III, pp. 342-351, 2006, Springer, 3-540-37277-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ulrich Kühn 0001 |
Analysis of a Database and Index Encryption Scheme - Problems and Fixes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, pp. 146-159, 2006, Springer, 978-3-540-38984-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval |
Encoding-Free ElGamal Encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 91-104, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai |
Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2D Von Neumann cellular automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ling Dong, Kefei Chen |
A Practical Clumped-Tree Multicast Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 165-176, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 298-308, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Martin Stanek, Lubica Staneková |
Unpuzzling Puzzle (analysis of a video encryption algorithm). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 20-24, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen |
Research on Applying Java Card to Database Encryption Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 575-578, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | James F. Ryan, Blair L. Reid |
Usable Encryption Enabled by AJAX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: 2006 International Conference on Networking and Services (ICNS 2006), 16-21 July 2006, Silicon Valley, California, USA, pp. 116, 2006, IEEE Computer Society, 0-7695-2622-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Chao-Shen Chen, Rong-Jian Chen |
Image Encryption and Decryption Using SCAN Methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 61-66, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Amir Said |
Measuring the strength of partial encryption schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (2) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 1126-1129, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Guido Appenzeller |
Identity-based encryption from algorithm to enterprise deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 406, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Adam L. Young, Moti Yung |
Questionable Encryption and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 210-221, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yevgeniy Dodis, Adam D. Smith |
Entropic Security and the Encryption of High Entropy Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 556-577, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Shakith Fernando, Yajun Ha |
Design of Networked Reconfigurable Encryption Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 13th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2005), 17-20 April 2005, Napa, CA, USA, Proceedings, pp. 285-286, 2005, IEEE Computer Society, 0-7695-2445-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | T. S. B. Sudarshan, Rahil Mir, S. Vijayalakshmi |
DRIL- A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings, pp. 625-639, 2005, Springer, 3-540-29643-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Blowfish, inner loop pipeline, loop folding, four - tier architecture, Platform independent architecture, DRIL Architecture, replication, Dynamic reconfiguration |
25 | Mamun Bin Ibne Reaz, Faisal Mohd-Yasin, S. L. Tan, H. Y. Tan, Muhammad I. Ibrahimy |
Partial encryption of compressed images employing FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (3) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 2385-2388, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 21739 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|