The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CRYPTO"( http://dblp.L3S.de/Venues/CRYPTO )

URL (DBLP): http://dblp.uni-trier.de/db/conf/crypto

Publication years (Num. hits)
1981 (40) 1982 (36) 1983 (30) 1984 (41) 1985 (45) 1986 (37) 1987 (44) 1988 (44) 1989 (60) 1990 (49) 1991 (39) 1992 (44) 1993 (41) 1994 (40) 1995 (37) 1996 (31) 1997 (38) 1998 (36) 1999 (40) 2000 (34) 2001 (34) 2002 (40) 2003 (37) 2004 (35) 2005 (34) 2006 (37) 2007 (35) 2008 (33) 2009 (40) 2010 (40) 2011 (44) 2012 (51)
Publication types (Num. hits)
inproceedings(1234) proceedings(32)
Venues (Conferences, Journals, ...)
CRYPTO(1266)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 559 occurrences of 325 keywords

Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin On 2-Round Secure Multiparty Computation. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF lower bounds, Secure multiparty computation, round complexity
1Jakob Jonsson, Burton S. Kaliski Jr. On the Security of RSA Encryption in TLS. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key encapsulation, RSA encryption, TLS
1Dani Halevy, Adi Shamir The LSD Broadcast Encryption Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Anna Lysyanskaya Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Unique signatures, verifiable random functions, application of groups with DH-DDH separation
1Jesper Buus Nielsen A Threshold Pseudorandom Function Construction and Its Applications. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Anna Lysyanskaya Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators
1Wen-Ching W. Li, Mats Näslund, Igor E. Shparlinski Hidden Number Problem with the Trace and Bit Security of XTR and LUC. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1John Black, Phillip Rogaway, Thomas Shrimpton Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Joy Algesheimer, Jan Camenisch, Victor Shoup Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF safe primes, distributed primality test, RSA, threshold cryptography
1Ilya Mironov (Not So) Random Shuffles of RC4. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Emmanuel Bresson, Jacques Stern, Michael Szydlo Threshold Ring Signatures and Applications to Ad-hoc Groups. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Claude Carlet A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF stream ciphers, nonlinearity, resilient functions
1Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 Tweakable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tweakable block ciphers, initialization vector, block ciphers, modes of operation
1Moti Yung (eds.) Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Nicholas J. Hopper, John Langford 0001, Luis von Ahn Provably Secure Steganography. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Gene Itkis, Leonid Reyzin SiBIR: Signer-Base Intrusion-Resilient Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Phong Q. Nguyen, David Pointcheval Analysis and Improvements of NTRU Encryption Paddings. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1David A. Wagner 0001 A Generalized Birthday Problem. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier Universal Padding Schemes for RSA. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Probabilistic Signature Scheme, Provable Security
1Karl Rubin, Alice Silverberg Supersingular Abelian Varieties in Cryptology. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron Security Proof for Partial-Domain Hash Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle Model, Signature Schemes
1Paulo S. L. M. Barreto, Hae Yong Kim, Ben Lynn, Michael Scott Efficient Algorithms for Pairing-Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Don Coppersmith, Shai Halevi, Charanjit S. Jutla Cryptanalysis of Stream Ciphers with Linear Masking. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis
1Palash Sarkar 0001 The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF synchronous stream ciphers, nonlinear filter model, nonlinear combiner model, filter-combiner model, cellular automata, linear feedback shift registers
1Sean Murphy, Matthew J. B. Robshaw Essential Algebraic Structure within the AES. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF (Finite) Galois Field, (Field) Conjugate, Multivariate Quadratic (MQ) Equations, Advanced Encryption Standard, AES, Rijndael, Algebraic Structure, BES
1Moni Naor Deniable Ring Authentication. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Robert P. Gallant, Robert J. Lambert, Scott A. Vanstone Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Igor E. Shparlinski On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Dalit Naor, Moni Naor, Jeffery Lotspiech Revocation and Tracing Schemes for Stateless Receivers. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Revocation scheme, Tracing scheme, Copyright Protection, Broadcast Encryption
1Yan Zong Ding Oblivious Transfer in the Bounded Storage Model. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Matthew K. Franklin Identity-Based Encryption from the Weil Pairing. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Boaz Barak, Oded Goldreich 0001, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang 0005 On the (Im)possibility of Obfuscating Programs. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Alfredo De Santis, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, Amit Sahai Robust Non-interactive Zero Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Eric Brier, Christophe Clavier, Jean-Sébastien Coron, David Naccache Cryptanalysis of RSA Signatures with Fixed-Pattern Padding. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fixed-pattern padding, affine redundancy, RSA signatures
1James Manger A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF PKCS, RSA, chosen ciphertext attack, OAEP
1Oded Goldreich 0001, Yehuda Lindell Session-Key Generation Using Human Passwords Only. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jun Furukawa 0001, Kazue Sako An Efficient Scheme for Proving a Shuffle. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Universal Verifiability, Permutation, Electronic Voting, Mix-net
1Ronald Cramer, Ivan Damgård Secure Distributed Linear Algebra in a Constant Number of Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Gene Itkis, Leonid Reyzin Forward-Secure Signatures with Optimal Signing and Verifying. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Eonkyung Lee, Sangjin Lee, Sang Geun Hahn Pseudorandomness from Braid Groups. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Martin Hirt, Ueli M. Maurer Robustness for Free in Unconditional Multi-party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Joe Kilian (eds.) Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon Nonlinear Vector Resilient Functions. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF linearized polynomials, nonlinearity, correlation immunity, Resilient functions
1Silvio Micali, Leonid Reyzin Soundness in the Public-Key Model. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup Secure and Efficient Asynchronous Broadcast Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Anna Lysyanskaya An Identity Escrow Scheme with Appointed Verifiers. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF formal model for group signatures, group signatures, privacy protection, Identity escrow
1Adi Shamir, Yael Tauman Improved Online/Offline Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF on-line/off-line, trapdoor hash functions, signature schemes
1Aggelos Kiayias, Moti Yung Self Protecting Pirates and Black-Box Traitor Tracing. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Hugo Krawczyk The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongtaek Chee, Choonsik Park New Public Key Cryptosystem Using Finite Non Abelian Groups. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jovan Dj. Golic Correlation Analysis of the Shrinking Generator. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF unconstrained irregular clocking, Stream ciphers, fast correlation attacks, posterior probabilities
1Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern RSA-OAEP Is Secure under the RSA Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Victor Shoup OAEP Reconsidered. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Marc Fischlin Universally Composable Commitments. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security analysis of protocols, non-malleability, Commitment schemes, concurrent composition
1Matthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky Minimal Complete Primitives for Secure Multi-party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Philip D. MacKenzie, Michael K. Reiter Two-Party Generation of DSA Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Dan Boneh Simplified OAEP for the RSA and Rabin Functions. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård, Serge Fehr On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre Online Ciphers and the Hash-CBC Construction. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Juan A. Garay, Jessica Staddon, Avishai Wool Long-Lived Broadcast Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Alon Rosen A Note on the Round-Complexity of Concurrent Zero-Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron On the Exact Security of Full Domain Hash. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Benny Pinkas Privacy Preserving Data Mining. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jürgen Bierbrauer, Holger Schellwat Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Low bias, almost independent arrays, Hermitian codes, Suzuki codes, Weil-Carlitz-Uchiyama bound, exponential sum method, Zyablov bound, authentication, Fourier transform, hashing, resiliency, Reed-Solomon codes
1Anand Desai New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Zulfikar Ramzan, Leonid Reyzin On the Round Security of Symmetric-Key Cryptographic Primitives. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Michael Semanko L-collision Attacks against Randomized MACs. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF L-collision, MACs, randomness, message authentication codes, birthday attacks
1Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth Weaknesses in the SL2(IFs2) Hashing Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ingrid Biehl, Bernd Meyer 0002, Volker Müller 0001 Differential Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF differential fault attack, elliptic curve cryptosystem
1Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama Quantum Public-Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Roger Fischlin Efficient Non-malleable Commitment Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Muxiang Zhang, Agnes Hui Chan Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Éliane Jaulmes, Antoine Joux A Chosen-Ciphertext Attack against NTRU. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Yejing Wang Sequential Traitor Tracing. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1John Black, Phillip Rogaway CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Moni Naor Timed Commitments. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Mihir Bellare (eds.) Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Christian Cachin, Jan Camenisch Optimistic Fair Secure Computation. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra, Eric R. Verheul The XTR Public Key System. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes
1Martín Abadi Taming the Adversary. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Jesper Buus Nielsen Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Thomas Johansson 0001, Fredrik Jönsson Fast Correlation Attacks through Reconstruction of Linear Polynomials. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF reconstruction of polynomials, Stream ciphers, learning theory, correlation attacks
1Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park New Public-Key Cryptosystem Using Braid Groups. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem
1Amos Beimel, Yuval Ishai, Tal Malkin Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Silvio Micali Parallel Reducibility for Information-Theoretically Secure Computation. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Nicolas Gisin, Stefan Wolf 0001 Linking Classical and Quantum Key Agreement: Is There "Bound Information"? Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF intrinsic information, secret-key rate, quantum privacy amplification, purification, entanglement, Secret-key agreement
1Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Message Authentication Codes, CBC-MAC
1Yevgeniy Dodis, Shai Halevi, Tal Rabin A Cryptographic Solution to a Game Theoretic Problem. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Anand Desai The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro An Improved Pseudo-random Generator Based on Discrete Log. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001, Subhamoy Maitra Nonlinearity Bounds and Constructions of Resilient Boolean Functions. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF combinatorial cryptography, boolean functions, stream ciphers, resiliency, nonlinearity, balancedness, correlation immunity, algebraic degree
1Masayuki Abe, Tatsuaki Okamoto Provably Secure Partially Blind Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Partially Blind Signatures, Blind Signatures, Witness Indistinguishability
1Aviad Kipnis, Adi Shamir Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Sara K. Miner A Forward-Secure Digital Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Berry Schoenmakers A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Markus Michels Separability and Efficiency for Generic Group Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway UMAC: Fast and Secure Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Don Coppersmith Weakness in Quaternion Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 1266 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license