|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 391 occurrences of 265 keywords
|
|
|
Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Li Sun, Steven Versteeg, Serdar Boztas, Trevor Yann |
Pattern Recognition Techniques for the Classification of Malware Packers. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marek Klonowski, Michal Koza, Miroslaw Kutylowski |
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Some Observations on Indifferentiability. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Noboru Kunihiro |
Solving Generalized Small Inverse Problems. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer |
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Barbosa, Pooya Farshim |
Strong Knowledge Extractors for Public-Key Encryption Schemes. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rafik Chaabouni, Helger Lipmaa, Abhi Shelat |
Additive Combinatorics and Discrete Logarithm Based Range Protocols. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jun Shao 0001, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu 0005 |
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ron Steinfeld, Philip Hawkes (eds.) |
Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ruilin Li, Bing Sun 0001, Chao Li 0002, Longjiang Qu |
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Basie von Solms |
Is the Information Security King Naked?. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Information Security Governance, Insecure systems, Naked, Information Security, Ethics, Viruses, Social engineering |
1 | Serdar Boztas, Simon J. Puglisi, Andrew Turpin |
Testing Stream Ciphers by Finding the Longest Substring of a Given Density. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama |
Strengthening the Security of Distributed Oblivious Transfer. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
oblivious transfer, information theoretic security, secret sharing scheme |
1 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Attacking 9 and 10 Rounds of AES-256. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
1 | Mridul Nandi |
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
MD hash function, padding rule, suffix-free, collision resistant |
1 | Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson |
Jacobi Quartic Curves Revisited. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Efficient elliptic curve arithmetic, Jacobi model of elliptic curves, point multiplication |
1 | Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka |
Security on Hybrid Encryption with the Tag-KEM/DEM Framework. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nadia El Mrabet, Christophe Nègre |
Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
AMNS, discrete Fourrier transform, finite fields, Pairing |
1 | Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 |
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
ROX, ESh, Hash Functions, MPP, Domain Extension |
1 | Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto |
Multi-recipient Public-Key Encryption from Simulators in Security Proofs. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption |
1 | Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin |
Inside the Hypercube. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dang Vinh Pham, Dogan Kesdogan |
A Combinatorial Approach for an Anonymity Metric. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Leonie Simpson, Matthew Henricksen, Wun-She Yap |
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Common Scrambling Algorithm, Cryptanalysis, Stream Cipher, Digital Video Broadcasting |
1 | Michael Tunstall |
Random Order m-ary Exponentiation. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
random order countermeasure, side channel analysis, Exponentiation algorithms |
1 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
1 | Hongbo Yu, Xiaoyun Wang 0001 |
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
MAC, distinguishing attack, SHA-256 |
1 | Ahto Buldas, Aivo Jürgenson, Margus Niitsoo |
Efficiency Bounds for Adversary Constructions in Black-Box Reductions. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | L. Jean Camp |
Hardening the Network from the Friend Within. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Kazumaro Aoki |
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
RIPEMD, double branch, preimage, meet-in-the-middle |
1 | Colin Boyd, Juan Manuel González Nieto (eds.) |
Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji, Masahiro Sukegawa |
New Correlations of RC4 PRGA Using Nonzero-Bit Differences. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park |
Fair Threshold Decryption with Semi-Trusted Third Parties. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Akira Numayama, Keisuke Tanaka |
On the Weak Ideal Compression Functions. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
weak ideal compression function, indifferentiability, hash construction, random oracle |
1 | Peter Lory |
Reducing the Complexity in the Distributed Computation of Private RSA Keys. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng |
Conditional Proxy Broadcast Re-Encryption. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption |
1 | Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch |
Measurement Study on Malicious Web Servers in the .nz Domain. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Douglas Wikström |
A Commitment-Consistent Proof of a Shuffle. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair |
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Hight, Impossible Differential Attack, Present, Related-Key Attack, Rectangle Attack |
1 | Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap |
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Generalized Unbalanced Feistel Network, Differential Probability, Linear Hull Probability, Block Ciphers |
1 | Irfan Ahmed 0001, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong |
On Improving the Accuracy and Performance of Content-Based File Type Identification. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
file type identification, byte frequency distribution, cluster analysis, Mahalanobis distance, cosine similarity, linear discriminant |
1 | Jiang Wu 0001, Douglas R. Stinson |
A Highly Scalable RFID Authentication Protocol. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Douglas Stebila, Berkant Ustaoglu |
Towards Denial-of-Service-Resilient Key Agreement Protocols. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Isamu Teranishi, Wakaha Ogata |
Relationship between Two Approaches for Defining the Standard Model PA-ness. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Standard Model, Plaintext Awareness |
1 | Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa |
Secure Biometric Authentication with Improved Accuracy. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Secure Biometric Authentication, Cryptography, Classifier |
1 | Sunghyun Kim, Heejo Lee |
Reducing Payload Scans for Attack Signature Matching Using Rule Classification. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alfred Menezes, Berkant Ustaoglu |
Comparing the Pre- and Post-specified Peer Models for Key Agreement. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Reza Rezaeian Farashahi |
Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Deterministic extractor, Hyperelliptic curve, Jacobian |
1 | Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg |
Multidimensional Linear Cryptanalysis of Reduced Round Serpent. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong |
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Grain-v1, Grain-128, Related-key chosen IV attack, Cryptanalysis, Stream cipher |
1 | Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao 0001 |
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
stealth malware, hardware-assisted VMM, Virtual machine monitor |
1 | Christophe Doche, Laurent Habsieger |
A Tree-Based Approach for Computing Double-Base Chains. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
elliptic curve cryptography, scalar multiplication, Double-base number system |
1 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang |
Efficient Disjointness Tests for Private Datasets. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Private Set Disjointness, Private Matching, Secure Multi-Party Computation |
1 | Pankaj Kohli, Bezawada Bruhadeshwar |
FormatShield: A Binary Rewriting Defense against Format String Attacks. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Format String Attacks, Intrusion Detection, System Security, Binary Rewriting |
1 | Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson |
Efficient One-Round Key Exchange in the Standard Model. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Key exchange, standard model |
1 | Christophe Nègre, Thomas Plantard |
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Prime Field, Modular Number System, Lagrange Representation, Modular Multiplication |
1 | Huafei Zhu |
Fully-Simulatable Oblivious Set Transfer. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Oblivious set transfer, perfectly hiding commitment, perfectly binding commitment, real/ideal world simulation paradigm |
1 | Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 |
On the Improvement of the BDF Attack on LSBS-RSA. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB) |
1 | Yu Sasaki, Kazumaro Aoki |
Preimage Attacks on Step-Reduced MD5. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Message Expansion, Hash Function, MD5, Preimage Attack, One-Way, Local Collision |
1 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Non-linear Reduced Round Attacks against SHA-2 Hash Family. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
security analysis, differential cryptanalysis, linear cryptanalysis |
1 | Yi Mu 0001, Willy Susilo, Jennifer Seberry (eds.) |
Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Takato Hirano, Koichiro Wada, Keisuke Tanaka |
Public-Key Cryptosystems with Primitive Power Roots of Unity. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism |
1 | Jiayuan Sui, Douglas R. Stinson |
A Critical Analysis and Improvement of AACS Drive-Host Authentication. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0012, Wentao Zhang, Wenling Wu |
Cryptanalysis of Reduced-Round SMS4 Block Cipher. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
SMS4, Differential characteristic, Block cipher, Differential cryptanalysis, Rectangle attack |
1 | Subhamoy Maitra, Goutam Paul 0001 |
Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Permutation, Fault Analysis, RC4, Keystream |
1 | Xavier Boyen |
New Paradigms for Password Security. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar |
Signature Generation and Detection of Malware Families. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Static Analysis, Malware Detection, Signature Generation |
1 | Sebastian Gajek, Mark Manulis, Jörg Schwenk |
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin |
Looking Back at a New Hash Function. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan |
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Information Theoretic Security, Mobile Adversary |
1 | Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski |
Distributed Verification of Mixing - Local Forking Proofs Model. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
distributed system, anonymity, mix |
1 | B. John Oommen, Ebaa Fayyoumi |
Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Silvana Medos, Serdar Boztas |
Montgomery Residue Representation Fault-Tolerant Computation in GF(2k). |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
fault tolerant computation, finite field, fault attacks |
1 | Florian Mendel, Martin Schläffer |
Collisions for Round-Reduced LAKE. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, collision attack |
1 | Peng Wang 0009, Dengguo Feng, Wenling Wu, Liting Zhang |
On the Unprovable Security of 2-Key XCBC. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Blockcipher mode of operation, Provable security, Message authentication code, Related-key attack, Blockcipher |
1 | Risto M. Hakala, Kaisa Nyberg |
Linear Distinguishing Attack on Shannon. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
stream ciphers, linear cryptanalysis, Distinguishing attacks, Shannon |
1 | Yongdong Wu, Feng Bao 0001, Robert H. Deng |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Toshinori Araki, Satoshi Obana |
Flaws in Some Secret Sharing Schemes Against Cheating. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury |
Strengthening NLS Against Crossword Puzzle Attack. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Crossword Puzzle attack, Stream ciphers, eSTREAM, Linear Approximations, Modular Addition, NLS |
1 | Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini |
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
manual channel, eTCR hash family, randomized hashing, hash function security, Message authentication |
1 | Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin |
On Building Hash Functions from Multivariate Quadratic Equations. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan |
On Proactive Perfectly Secure Message Transmission. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Perfectly Secure Communication, Proactive security |
1 | Christophe Tartary, Huaxiong Wang |
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Adversarial Network, Prediction Hashing, Erasure Codes, Hash Chains, Stream Authentication, Polynomial Reconstruction |
1 | Toshinori Araki |
Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
anonymous signatures, group signatures, ring signatures |
1 | Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.) |
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata |
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jun Yajima, Yu Sasaki, Yusuke Naito 0001, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta |
A New Strategy for Finding a Differential Path of SHA-1. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay |
TCHo: A Hardware-Oriented Trapdoor Cipher. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
hardware, linear feedback shift register, public-key cryptosystem, polynomial multiples, post-quantum cryptography |
1 | Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum |
An Analysis of the Hermes8 Stream Ciphers. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Hermes8, Cryptanalysis, Stream Cipher |
1 | Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang 0001, Sébastien Zimmer |
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
privacy, Authentication, biometrics |
1 | Ivan Damgård, Martin Geisler 0001, Mikkel Krøigaard |
Efficient and Secure Comparison for On-Line Auctions. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Anonymity on Paillier's Trap-Door Permutation. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Paillier’s function, Paillier’s trap-door permutation, anonymity, encryption, key-privacy |
1 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Duncan S. Wong, Wei Wu 0001 |
Certificateless Signature Revisited. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Certificateless cryptology, Signature, Security model, Random oracle |
1 | Qiong Huang 0001, Duncan S. Wong |
Generic Certificateless Key Encapsulation Mechanism. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jovan Dj. Golic, Madalina Baltatu |
Soft Generation of Secure Biometric Keys. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Biometric key, Reed-Solomon codes, biometric authentication, Shannon entropy, template protection, Euclidean metric |
1 | Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson |
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
filter function, stream ciphers, initialization, algebraic attacks, clock-control |
1 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Practical Compact E-Cash. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
constant-size, bilinear pairings, compact, E-Cash |
1 | Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume |
Double-Size Bipartite Modular Multiplication. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
bipartite modular multiplication, double-size technique, RSA, smartcard, crypto-coprocessor |
Displaying result #401 - #500 of 930 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|