The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CPA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1963-2000 (15) 2001-2003 (17) 2004-2005 (42) 2006 (44) 2007 (46) 2008 (62) 2009 (56) 2010-2011 (28) 2012 (32) 2013 (37) 2014-2015 (19) 2016-2017 (25) 2018-2019 (21) 2020-2021 (34) 2022-2023 (26) 2024 (2)
Publication types (Num. hits)
article(107) incollection(1) inproceedings(389) phdthesis(1) proceedings(8)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 161 occurrences of 114 keywords

Results
Found 506 publication records. Showing 506 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Michael J. O'Sullivan, Dan Grigoras Mobile Cloud Application Models Facilitated by the CPA. Search on Bibsonomy EAI Endorsed Trans. Scalable Inf. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Mridul Nandi, Tapas Pandit Generic Conversions from CPA to CCA secure Functional Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
21Vít Baisa, Jane Bradbury, Silvie Cinková, Ismaïl El Maarouf, Adam Kilgarriff, Octavian Popescu SemEval-2015 Task 15: A CPA dictionary-entry-building task. Search on Bibsonomy SemEval@NAACL-HLT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai Vulnerability Analysis of PRINCE and RECTANGLE using CPA. Search on Bibsonomy CPSS@ASIACSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Numanul Subhani, Robert D. Kent Continuous process auditing (CPA): An audit rule ontology based approach to audit-as-a-service. Search on Bibsonomy SysCon The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Ben Smyth, Yoshikazu Hanatani, Hirofumi Muratani NM-CPA Secure Encryption with Proofs of Plaintext Knowledge. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Sungkyoung Choi, Sungyoung Lee, Ik-Soo Huh, Heungsun Hwang, Taesung Park Competitive pathway analysis using Structural Equation Models (CPA-SEM) for gene expression data. Search on Bibsonomy BIBM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine A model of the leakage in the frequency domain and its application to CPA and DPA. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Wei-Kang Wang, Wen-Min Lu, Qian Long Kweh, I-Ting Cheng Does intellectual capital matter? Assessing the performance of CPA firms based on additive efficiency decomposition DEA. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Johannes Blömer, Gennadij Liske Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
21Sébastien Tiran, Guillaume Reymond, Jean-Baptiste Rigaud, Driss Aboulkassimi, Benedikt Gierlichs, Mathieu Carbone, Gilles R. Ducharme, Philippe Maurine Analysis Of Variance and CPA in SCA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
21Peter Giesl, Sigurdur F. Hafstein Implementation of a fan-like triangulation for the CPA method to compute Lyapunov functions. Search on Bibsonomy ACC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Antonio Marcedone, Claudio Orlandi Obfuscation ⇒ (IND-CPA Security !⇒ Circular Security). Search on Bibsonomy SCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Kaoru Kurosawa, Jun Furukawa 0001 2-Pass Key Exchange Protocols from CPA-Secure KEM. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Noriyuki Miura, Daisuke Fujimoto, Rie Korenaga, Kohei Matsuda, Makoto Nagata An intermittent-driven supply-current equalizer for 11x and 4x power-overhead savings in CPA-resistant 128bit AES cryptographic processor. Search on Bibsonomy A-SSCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Weijun Shan, Lihui Wang, Qing Li 0064, Limin Guo, Shanshan Liu, Zhimin Zhang A Chosen-Plaintext Method of CPA on SM4 Block Cipher. Search on Bibsonomy CIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Octavian Popescu, Martha Palmer, Patrick Hanks Mapping CPA Patterns onto OntoNotes Senses. Search on Bibsonomy LREC The full citation details ... 2014 DBLP  BibTeX  RDF
21Yang Wang, Chao Chen, Xuefeng Yan Structure and weight optimization of neural network based on CPA-MLR and its application in naphtha dry point soft sensor. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Vien Tran, Khoi Nguyen, Tran Cao Son, Enrico Pontelli A conformant planner based on approximation: CpA(H). Search on Bibsonomy ACM Trans. Intell. Syst. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Rui Xue 0001 IK-CPA security implies IE-CCA security in the random oracle model. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas On the Resilience and Uniqueness of CPA for Secure Broadcast. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
21Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine A Frequency Leakage Model and its application to CPA and DPA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
21Antonio Marcedone, Claudio Orlandi Obfuscation ==> (IND-CPA Security =/=> Circular Security). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
21Siqian Liu, Bei Gou, Hongxiang Li Capacity analysis for secure communication under CPA attack in smart grid. Search on Bibsonomy EIT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Sigurdur F. Hafstein Implementation of Simplicial Complexes for CPA Functions in C++11 using the Armadillo Linear Algebra Library. Search on Bibsonomy SIMULTECH The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Michael J. O'Sullivan, Dan Grigoras Mobile Cloud Application Models Facilitated by the CPA. Search on Bibsonomy MOBILWARE The full citation details ... 2013 DBLP  BibTeX  RDF
21Renato Menicocci, Alessandro Trifiletti, Francesco Bruno Trotta A logic level countermeasure against CPA side channel attacks on AES. Search on Bibsonomy MIXDES The full citation details ... 2013 DBLP  BibTeX  RDF
21Yi Ouyang, Jianguo Xing Human Action Recognition algorithm based on Minimum Spanning Tree of CPA Models. Search on Bibsonomy J. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Jung Sik Jeong, Gyei-Kark Park, Kwang-Il Kim 0001 Risk Assessment Model of Maritime Traffic in Time-Variant CPA Environments in Waterway. Search on Bibsonomy J. Adv. Comput. Intell. Intell. Informatics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Min-Ku Kim, Dong-Guk Han, Jeong Choon Ryoo, Okyeon Yi CPA performance enhancement based on spectrogram. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Aesun Park, Dong-Guk Han, Jeong Choon Ryoo CPA performance comparison based on Wavelet Transform. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Noura Benhadjyoussef, Hassen Mestiri, Mohsen Machhout, Rached Tourki Implementation of CPA analysis against AES design on FPGA. Search on Bibsonomy ICCIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Chenxu Wang, Mingyan Yu, Jinxiang Wang, Peihe Jiang, Xiaochen Tang A more practical CPA attack against present hardware implementation. Search on Bibsonomy CCIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Yuichi Komano, Hideo Shimizu, Shin-ichi Kawamura BS-CPA: Built-In Determined Sub-Key Correlation Power Analysis. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21B. Brian Lee, Moosa Khan, Rahim Quazi, William V. Vetter Pre-college preparedness and institutional factors for student success on the uniform CPA examination in Texas. Search on Bibsonomy Int. J. Serv. Stand. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
21Matthew Green 0001, Susan Hohenberger CPA and CCA-Secure Encryption Systems that are not 2-Circular Secure. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
21Qing Yang 0003, Alvin S. Lim, Kenan Casey, Raghu Neelisetti An Empirical Study on Real-Time Target Tracking with Enhanced CPA Algorithm in Wireless Sensor Networks. Search on Bibsonomy Ad Hoc Sens. Wirel. Networks The full citation details ... 2009 DBLP  BibTeX  RDF
21Qing Yang 0003, Alvin S. Lim, Kenan Casey, Raghu-Kisore Neelisetti An Enhanced CPA Algorithm for Real-Time Target Tracking in Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Pilar León Araúz, Arianne Reimerink, Pamela Faber Knowledge Extraction on Multidimensional Concepts: Corpus Pattern Analysis (CPA) and Concordances. Search on Bibsonomy TIA The full citation details ... 2009 DBLP  BibTeX  RDF
21Carlos Diego Moreno-Moreno, Francisco J. Quiles 0002, Manuel Ortiz, María Brox, Javier Hormigo, Julio Villalba, Emilio L. Zapata Efficient mapping on FPGA of convolution computation based on combined CSA-CPA accumulator. Search on Bibsonomy ICECS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Frédéric Besson CPA beats ∞-CFA. Search on Bibsonomy FTfJP@ECOOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework Search on Bibsonomy CoRR The full citation details ... 2005 DBLP  BibTeX  RDF
21Victor K. Wei Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
21David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge L. Villar An IND-CPA cryptosystem from Demytko's primitive. Search on Bibsonomy ITW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Kazukuni Kobara, Hideki Imai OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
21Max M. J. L. van de Kamp Depolarization due to rain: the XPD-CPA relation. Search on Bibsonomy Int. J. Satell. Commun. Netw. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Lijun Dong, Aixia Yan, Xingguo Chen, Hongping Xu, Zhide Hu Research and Prediction of Coordination Reactions Between CPA-mA and Some Metal Ions using Artificial Neural Networks. Search on Bibsonomy Comput. Chem. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Stacy E. Kovar, Kimberly Gladden Burke, Brian R. Kovar Consumer Responses to the CPA WEBTRUST™ Assurance. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Vicki Dobbs Beck Certified public accountants (CPA) "Pin heads". Search on Bibsonomy SIGGRAPH Visual Proceedings The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21Kuo-Bin Li, Bryan C. Sanctuary Automated Extracting of Amino Acid Spin Systems in Proteins Using 3D HCCH-COSY/TOCSY Spectroscopy and Constrained Partitioning Algorithm (CPA). Search on Bibsonomy J. Chem. Inf. Comput. Sci. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
21Michael C. McFarland, Thaddeus J. Kowalski Symbolic analysis and verification of CPA descriptions. Search on Bibsonomy CHARME The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
21Jun Xu, Bryan C. Sanctuary CPA: Constrained partitioning algorithm for initial assignment of protein proton resonances from MQF-COSY. Search on Bibsonomy J. Chem. Inf. Comput. Sci. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
21Michael C. McFarland, Thaddeus J. Kowalski Specifying System Behavior in CPA. Search on Bibsonomy ICCD The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
21Arthur B. Kahn Skeletal structure of PERT and CPA computer programs. Search on Bibsonomy Commun. ACM The full citation details ... 1963 DBLP  DOI  BibTeX  RDF
14Nagavijayalakshmi Vydyanathan, Sriram Krishnamoorthy, Gerald M. Sabin, Ümit V. Çatalyürek, Tahsin M. Kurç, P. Sadayappan, Joel H. Saltz An Integrated Approach to Locality-Conscious Processor Allocation and Scheduling of Mixed-Parallel Applications. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Fred R. M. Barnes, Carl G. Ritson Checking process-oriented operating system behaviour using CSP and refinement. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Dang-Vien Tran, Hoang-Khoi Nguyen, Enrico Pontelli, Tran Cao Son Improving Performance of Conformant Planners: Static Analysis of Declarative Planning Domain Specifications. Search on Bibsonomy PADL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conformant Planning, Planning, Reasoning about Actions
14Ying Xu, Aabhas S. Agarwal, Brian T. Davis Prediction in Dynamic SDRAM Controller Policies. Search on Bibsonomy SAMOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access Control Policy, Memory Latency, SDRAM
14Lie Liu, Chun Yuan Trace and revoke systems with short ciphertexts. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF revoke, trace, broadcast encryption, ciphertext
14Yang Cui 0001, Kirill Morozov, Kazukuni Kobara, Hideki Imai Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic encryption, code-based encryption, database security, hybrid encryption, searchable encryption
14Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa Efficient Public Key Encryption Based on Ideal Lattices. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Jonathan Katz, Arkady Yerukhimovich On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Amitabh Saxena, Brecht Wyseur, Bart Preneel Towards Security Notions for White-Box Cryptography. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill Order-Preserving Symmetric Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Alexander W. Dent A Brief History of Security Models for Confidentiality. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Giuseppe Ateniese, Karyn Benson, Susan Hohenberger Key-Private Proxy Re-encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Yevgeniy Dodis, Yael Tauman Kalai, Shachar Lovett On cryptography with auxiliary input. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF auxiliary information, encryption schemes, learning parity with noise, error-correcting codes, randomness extractors, code obfuscation
14Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov Semantic security for the McEliece cryptosystem without random oracles. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 11T71
14Hamid Nazerzadeh, Amin Saberi, Rakesh Vohra Dynamic cost-per-action mechanisms and applications to online advertising. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cost-per-action, mechanism design, internet advertising
14Kenneth G. Paterson, Sriramkrishnan Srinivasan Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi-TA IBE, multiple trusted authorities, anonymity, identity-based encryption
14Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Chosen Ciphertext Security with Optimal Ciphertext Overhead. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Mridul Nandi Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online cipher, CBC, universal hash function, random permutation
14Qiang Tang 0001 Type-Based Proxy Re-encryption and Its Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Weijia Jia 0001, Dai Bin, Lin Liao Architecture of secure cross-platform and network communications. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cross-network, security, network, Wi-Fi, 3G, cross-platform
14Kento Aida, Henri Casanova Scheduling mixed-parallel applications with advance reservations. Search on Bibsonomy HPDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mixed parallelism, scheduling, advance reservation
14Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan Hybrid Damgård Is CCA1-Secure under the DDH Assumption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems
14Jacques Patarin A Proof of Security in O(2n) for the Benes Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information-theoretic primitive, design of keyed hash functions, security above the birthday bound, unconditional security, Pseudorandom function
14Alexandra Boldyreva, Serge Fehr, Adam O'Neill On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Geoffrey Smith 0001 Adversaries and Information Leaks (Tutorial). Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Sven Laur, Helger Lipmaa A New Protocol for Conditional Disclosure of Secrets and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption
14Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations
14Palash Sarkar 0001, Sanjit Chatterjee Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Clifford Behrens, Devasis Bassu, Hyong Sop Shim Collaborative Panel Administrator: A framework and implementation for expert panel lifecycle management. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Xianxian Li, Jinpeng Huai Cryptographic protocol security analysis based on bounded constructing algorithm. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic protocol, formal analysis, security verification
14Marco Antonio Cruz-Chavez, Juan Frausto Solís A New Algorithm That Obtains an Approximation of the Critical Path in the Job Shop Scheduling Problem. Search on Bibsonomy MICAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF schedule, metaheuristic, Critical path, neighborhood, slack time
14Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai Applying Fujisaki-Okamoto to Identity-Based Encryption. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
14Ryotaro Hayashi 0001, Keisuke Tanaka PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yiliang Han, Xiaoyuan Yang 0002, Ping Wei 0005, Yuming Wang, Yupu Hu ECGSC: Elliptic Curve Based Generalized Signcryption. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Ian F. Blake, Aldar C.-F. Chan Conditionally Verifiable Signature. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto Universally Composable Identity-Based Encryption. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IND-ID-CCA2, universal composition, identity-based encryption
14Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank Black-box constructions for secure computation. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF theory of cryptography, oblivious transfer, secure computation, black-box reductions
14Nagavijayalakshmi Vydyanathan, Sriram Krishnamoorthy, Gerald Sabin, Ümit V. Çatalyürek, Tahsin M. Kurç, P. Sadayappan, Joel H. Saltz An Integrated Approach for Processor Allocation and Scheduling of Mixed-Parallel Applications. Search on Bibsonomy ICPP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Katja Schmidt-Samoa, Tsuyoshi Takagi Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Helger Lipmaa An Oblivious Transfer Protocol with Log-Squared Communication. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer
14Hung-Wen Tung, Raymund J. Lin Automated Contract Negotiation Using a Mediation Service. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Ran Canetti, Shai Halevi, Jonathan Katz Chosen-Ciphertext Security from Identity-Based Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Symon Chang, Qiming Chen, Meichun Hsu Managing Security Policy in a Large Distributed Web Services Environment. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Jacques Patarin Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 506 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license