The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Tianjie Cao, Dongdai Lin, Rui Xue 0001 ID-Based Ring Authenticated Encryption. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Kevin M. Greenan, Mark W. Storer, Ethan L. Miller, Carlos Maltzahn POTSHARDS : Storing Data for the Long-term Without Encryption. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Data Security, Distributed Storage, Secure Storage, Survivable Storage
25Xixiang Lv, Bo Yang Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Yinian Mao, Min Wu 0001 Security evaluation for communication-friendly encryption of multimedia. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Rakesh Agrawal 0001, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu Order-Preserving Encryption for Numeric Data. (PDF / PS) Search on Bibsonomy SIGMOD Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Eric J. Swankoski, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin A Parallel Architecture for Secure FPGA Symmetric Encryption. Search on Bibsonomy IPDPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar A Provably Secure Elliptic Curve Scheme with Fast Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Shiguo Lian, Jinsheng Sun, Zhongxin Li, Zhiquan Wang A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network. Search on Bibsonomy ICONIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Peeter Laud, Ricardo Corin Sound Computational Interpretation of Formal Encryption with Composed Keys. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni Broadcast Encryption's Bright Future. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Chanathip Namprempre Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Christian Geuer-Pollmann XML pool encryption. Search on Bibsonomy XML Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Jee Hea An, Yevgeniy Dodis, Tal Rabin On the Security of Joint Signature and Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard. Search on Bibsonomy DFT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Masayuki Abe Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Adrian Baldwin, Simon Shiu Encryption and Key management in a SAN. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Scott R. Fluhrer, Stefan Lucks Analysis of the E0 Encryption System. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval Key-Privacy in Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Jee Hea An, Mihir Bellare Does Encryption with Redundancy Provide Authenticity? Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Ivan Damgård, Jesper Buus Nielsen Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25Helena Handschuh, Serge Vaudenay A Universal Encryption Standard. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Xiaolin Wu 0001, Peter W. Moo Joint Image/Video Compression and Encryption via High-Order Conditional Entropy Coding of Wavelet Coefficients. Search on Bibsonomy ICMCS, Vol. 2 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Image and video compression, multimedia security
25Stefan Lucks Accelerated Remotely Keyed Encruption. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky Deniable Encryption. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
25George Anastasios Spanos, Tracy Bradley Maples Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Multimedia, Network Security, ATM Networks, MPEG, Video Compression, Real-Time Video
25Ludek Kucera A Generalized Encryption Scheme Based on Random Graphs. Search on Bibsonomy WG The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
25Ruth Nelson, John H. Heimann SDNS Architecture and End-to-End Encryption. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
25Eiji Okamoto Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
25Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing Provably secure and efficient bounded ciphertext policy attribute based encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute based encryption
25Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai Conditional proxy re-encryption secure against chosen-ciphertext attack. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security
25Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri Image Encryption Using Chaotic Signal and Max-Heap Tree. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Max-Heap Tree, Chaotic Signal, Image Encryption
25Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung A New Randomness Extraction Paradigm for Hybrid Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction
25Wei Lu, Zheng-an Yao Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction. Search on Bibsonomy ADMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random Isomap reduction, encryption, nearest neighbor, geodesic distance, sensitive information
25Alexandra Boldyreva, Vipul Goyal, Virendra Kumar Identity-based encryption with efficient revocation. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provable security, revocation, identity-based encryption
25Mahabir Prasad Jhanwar, Rana Barua A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption
25Piyi Yang, Zhenfu Cao, Xiaolei Dong Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack
25Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF guardian proxy, insubvertible encryption, RFID
25Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang Traceable and Retrievable Identity-Based Encryption. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PKG, Trust, Retrievability, Traceability, Identity-based Encryption
25R. Aparna, B. B. Amberker Authenticated Secure Group Communication using Broadcast Encryption Key Computation. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key
25Lantian Zheng, Andrew C. Myers Securing nonintrusive web encryption through information flow. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption, type system, information flow control
25Alexander W. Dent, Benoît Libert, Kenneth G. Paterson Certificateless Encryption Schemes Strongly Secure in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF strong security, standard model, certificateless encryption
25Benoît Libert, Damien Vergnaud Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption
25Christos Strydis, Di Zhu, Georgi Gaydadjiev Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF implantable devices, microarchitectural profiling, symmetric encryption, ultra-low power
25Jong Hwan Park, Dong Hoon Lee 0001 A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Public Key Broadcast Encryption, Full Collusion-Security
25Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu Identity-Based Threshold Key-Insulated Encryption without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold key-insulation, standard model, identity-based encryption, key-exposure
25Zong Wang, Tughrul Arslan, Ahmet T. Erdogan Implementation of Hardware Encryption Engine for Wireless Communication on a Reconfigurable Instruction Cell Architecture. Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hardware Encryption, RICA, AES, RC4
25Seny Kamara, Jonathan Katz How to Encrypt with a Malicious Random Number Generator. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private-key encryption, random number generation
25Joonsang Baek, Willy Susilo, Jianying Zhou 0001 New constructions of fuzzy identity-based encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF efficient constructions, fuzzy identity-based encryption
25Chunxiang Gu, Yuefei Zhu, Heng Pan Efficient Public Key Encryption with Keyword Search Schemes from Pairings. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF provable secure, keyword search, public key encryption, pairings
25Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based Encryption, Pairing
25Yang Ou, Chul Sur, Kyung Hyune Rhee Region-Based Selective Encryption for Medical Imaging. Search on Bibsonomy FAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bit Flipping, Quality Layer Organization, Medical Imaging, Region of Interest, Selective Encryption
25Hakjae Kim, Sungju Lee, Daesung Moon, Yongwha Chung Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Biometrics/Fingerprint, Data Hiding/Fingerprinting, Encryption
25Guilhem Castagnos, Benoît Chevallier-Mames Towards a DL-Based Additively Homomorphic Encryption Scheme. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model
25Zhen Liu, Lifeng Xi Image Information Hiding Encryption Using Chaotic Sequence. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wavelet transform, Information hiding, encryption algorithm, chaotic sequence
25Gannan Yuan, Fuyou Wang, Yanling Hao Research on Data Encryption Technology Based on Chaos Theory. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data encryption, Power spectrum, Logistic model, Lyapunov exponent
25Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Fragmentation and Encryption to Enforce Privacy in Data Storage. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy, encryption, fragmentation
25Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III Public Key Encryption That Allows PIR Queries. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data
25Noam Kogan, Yuval Shavitt, Avishai Wool A practical revocation scheme for broadcast encryption using smartcards. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart cards, Broadcast encryption
25Dirk Westhoff, Joao Girão, Mithun Acharya Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF robustness and reliability, Wireless sensor networks, data aggregation, key predistribution, data encryption, privacy homomorphism
25Kai-Chi Leung, Suk-Ling Li, Lee-Ming Cheng, Chi-Kwong Chan A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual attractors, neural network, cryptography, encryption, Hopfield network
25Stéphanie Delaune, Florent Jacquemard Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption
25Chuanfu Chen, Zhiqiang Wu 0002, Laichu Tang, Congjing Ran Encryption and Program Realization of Information Resources in DRM. Search on Bibsonomy WISE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Encryption, RSA, Copyright Protection, DRM, DES, Information Resources
25Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code
25Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna A Partial Image Encryption Method with Pseudo Random Sequences. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Partial encryption, Residual intelligence, Pseudo random sequence
25Benoît Libert, Jean-Jacques Quisquater On Constructing Certificateless Cryptosystems from Identity Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF provable security, bilinear maps, Certificateless encryption
25Haiqing Hu, Peijun Xue, Haiyan Fu S-Rough Recognition of Knowledge and General Threshold Encryption Authentication Scheme of Recognition Conclusion. Search on Bibsonomy ISDA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF S-rough sets, S-rough recognition, composition structure, threshold encryption authentication, algorithm
25Kiyoshi Yanagimoto, Takaaki Hasegawa, Makoto Takano A New Encoding Approach Realizing High Security and High Performance Based on Double Common Encryption Using Static Keys and Dynamic Keys. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Common key encryption, Security, Network security, Database security
25Xiping He, Qingsheng Zhu, Ping Gu A New Chaos-Based Encryption Method for Color Image. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ergodic matrix, encryption, attack, diffusion, S-box, confusion, Chaotic map
25Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto Universally Composable Identity-Based Encryption. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IND-ID-CCA2, universal composition, identity-based encryption
25JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow
25Fuwen Liu, Hartmut König A novel encryption algorithm for high resolution video. Search on Bibsonomy NOSSDAV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multimedia com-munication, real-time video encryption, video compression, data security
25Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators
25Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang Secure Multicast Using Proxy Encryption. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multicast key management, cipher sequences, proxy encryption, ElGamal cryptosystem, Secure multicast
25Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, Authenticated encryption, security proofs
25Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik Brief announcement: secret handshakes from CA-oblivious encryption. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, authentication, anonymity, encryption
25Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim Efficient Broadcast Encryption Using Multiple Interpolation Methods. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation, partition, Broadcast encryption
25Swee-Huay Heng, Kaoru Kurosawa k-Resilient Identity-Based Encryption in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption
25Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system overheads trade-off, one-way mapping, key management, broadcast encryption, pseudorandom number generators, erasure channels
25Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, Johannes Wolkerstorfer Efficient AES Implementations on ASICs and FPGAs. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FPGA, Advanced Encryption Standard (AES), ASIC
25Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 The EAX Mode of Operation. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC
25Dimitrios Simitopoulos, Nikolaos Zissis, Panagiotis Georgiadis 0002, Vasileios Emmanouilidis, Michael G. Strintzis Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DVD copy protection, Watermarking, Encryption, Copyright protection
25Apostolos Dollas, Christopher Kachris, Nikolaos G. Bourbakis Performance Analysis of Fixed, Reconfigurable, and Custom Architectures for the SCAN Image and Video Encryption Algorithm. Search on Bibsonomy FCCM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, Architecture, Reconfigurable, Encryption
25Eonkyung Lee, Je Hong Park Cryptanalysis of the Public-Key Encryption Based on Braid Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Burau representation, Cryptanalysis, Public-key encryption, Braid group
25Ran Canetti, Shai Halevi, Jonathan Katz A Forward-Secure Public-Key Encryption Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure
25Tomoyuki Asano Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stateless receiver, master key, subset difference, key management, digital rights management, revocation, broadcast encryption
25Xiaofeng Chen 0001, Byoungcheon Lee, Kwangjo Kim Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bid-rigging, Receipt-free, Auction, Homomorphic encryption
25Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, authenticated encryption, security proofs, SSH
25Takeshi Imamura, Andy Clark, Hiroshi Maruyama A stream-based implementation of XML encryption. Search on Bibsonomy XML Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF stream-based processing, XML, encryption
25Thomas Pornin Transparent Harddisk Encryption. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF bitslice, harddisk, mobile computing, encryption
25Lars R. Knudsen, Willi Meier Correlations in RC6 with a Reduced Number of Rounds. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6
25Giuseppe Ateniese Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF contract signing problem, digital signatures, public-key cryptography, fair exchange, proof of knowledge, verifiable encryption
25Douglas R. Stinson, Ruizhong Wei Key Preassigned Traceability Schemes for Broadcast Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF key preassigned scheme, traceability, broadcast encryption, secret sharing schemes, combinatorial designs
25Matt Blaze, Joan Feigenbaum, Moni Naor A Formal Treatment of Remotely Keyed Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Remotely Keyed Encryption, Smart-cards, Block Ciphers, Pseudorandomness, Session Keys
25Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway Relations Among Notions of Security for Public-Key Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness
25Manuel Blum 0001, Shafi Goldwasser An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF chosen cyphertext attack, integer factorization, partial information, probabilistic encryption, passive adversaries
25George I. Davida, David L. Wells, John B. Kam A Database Encryption System with Subkeys. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF subkeys, databases, encryption, data security, decryption
25Hua Guo, Xiyong Zhang, Yi Mu 0001, Zhoujun Li 0001 An Efficient Certificateless Encryption Scheme in the Standard Model. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Encryption, Standard Model, Certificateless Encryption
25Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan 0001 The Relationship between Public Key Encryption and Oblivious Transfer. Search on Bibsonomy FOCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF trapdoor predicates, cryptography, protocols, protocols, public key cryptography, key agreement, public key encryption, public-key encryption, oblivious transfer, secure multi-party computation, primitives, black-box reductions, trapdoor permutations
25John B. Kam, George I. Davida Structured Design of Substitution-Permutation Encryption Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1979 DBLP  DOI  BibTeX  RDF substitution-permutation (SP) networks, Complete SP networks, encryption, data security, data encryption standard
24Bruce Schneier, Doug Whiting Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 21739 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license