|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 197 occurrences of 155 keywords
|
|
|
Results
Found 527 publication records. Showing 527 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Liqun Chen 0002 |
A DAA Scheme Requiring Less TPM Resources. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Nie, Jiwu Jing, Yuewu Wang |
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zhigang Gao, Dengguo Feng |
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Jian Weng 0001, Jianying Zhou 0001, Ying Qiu |
Optionally Identifiable Private Handshakes. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xuexian Hu, Wenfen Liu |
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa, Bingsheng Zhang |
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Deian Stefan |
Hardware Framework for the Rabbit Stream Cipher. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ping Li, Bing Sun 0001, Chao Li 0002 |
Integral Cryptanalysis of ARIA. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Feng Cheng 0002, Sebastian Roschke, Robert Schuppenies, Christoph Meinel |
Remodeling Vulnerability Information. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Takeo Mizuno, Hiroshi Doi |
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Renauld, François-Xavier Standaert |
Algebraic Side-Channel Attacks. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan |
Breaking and Building of Threshold Signcryption Schemes. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fengjiao Wang, Yuqing Zhang |
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Reza Z'aba, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong |
Linearity within the SMS4 Block Cipher. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sean Policarpio, Yan Zhang 0003 |
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel |
Cryptanalysis of the ESSENCE Family of Hash Functions. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan |
Sanitizable Signatures with Strong Transparency in the Standard Model. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhang 0002, Hideki Imai |
Constructing Better KEMs with Partial Message Recovery. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0012, Wenling Wu, Liting Zhang |
Proposition of Two Cipher Structures. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Moti Yung, Peng Liu 0005, Dongdai Lin (eds.) |
Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Johann Großschädl |
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wei Zhao, Dingfeng Ye |
Pairing-Based Nominative Signatures with Selective and Universal Convertibility. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jiqiang Lu |
Differential Attack on Five Rounds of the SC2000 Block Cipher. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xianmeng Meng, Jingguo Bi |
Weak Keys in RSA with Primes Sharing Least Significant Bits. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Charles Faugère, Ludovic Perret |
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Saba Jalal, Brian King |
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Elie Bursztein, John C. Mitchell |
Using Strategy Objectives for Network Security Analysis. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang |
Gemstone: A New Stream Cipher Using Coupled Map Lattice. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing. |
Inscrypt |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Feng Bao 0001 |
Batch ZK Proof and Verification of OR Logic. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Batch proof and verification, knowledge statements linked with OR logic |
1 | Zonghua Zhang, Ruo Ando, Youki Kadobayashi |
Hardening Botnet by a Rational Botmaster. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, malware, botnet |
1 | Peng Wang 0009, Dengguo Feng, Changlu Lin, Wenling Wu |
Security of Truncated MACs. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Robust unforgeability, Message authentication code, Universal hash function, Unforgeability, Unpredictability |
1 | Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo |
Privacy for Private Key in Signatures. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack |
1 | Mahabir Prasad Jhanwar, Rana Barua |
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption |
1 | Peng Liu 0005 |
Secure and Privacy-Preserving Information Brokering. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhang 0002, Hideki Imai |
Strong Anonymous Signatures. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
anonymity, digital signatures |
1 | Duo Liu, Zhiyong Tan, Yiqi Dai |
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
identity-based signcryption, multi-PKG, Ad hoc networks, provable security, bilinear pairings |
1 | Mooseop Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Huaqun Wang, Hong Yu |
Cryptanalysis of Two Ring Signcryption Schemes. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography |
1 | Bo-Chao Cheng, Huan Chen 0002, Guo-Tan Liao |
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
DoS/DDoS, WSN, Traceback, PPM, Convergence time |
1 | Ziyao Xu, Yeping He, Lingli Deng |
An Integrity Assurance Mechanism for Run-Time Programs. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Integrity Assurance, Virtual Trusted Platform Module, Trusted Computing, Virtual Machine Monitor |
1 | Sushmita Ruj, Bimal K. Roy |
Key Predistribution Schemes Using Codes in Wireless Sensor Networks. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Scalability, Codes, Reed Solomon code |
1 | Kun Peng, Feng Bao 0001 |
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
PBD shuffling, AAAP attack, optimisation, correction |
1 | Wenying Zhang, Jing Han |
Impossible Differential Analysis of Reduced Round CLEFIA. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Block cipher, Data complexity, Impossible differential cryptanalysis, CLEFIA |
1 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
(strong) pseudorandom permutations, variable-length PRPs, block ciphers |
1 | Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.) |
Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Key Evolution Systems in Untrusted Update Environments. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Piyi Yang, Zhenfu Cao, Xiaolei Dong |
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack |
1 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Publicly Verifiable Privacy-Preserving Group Decryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography |
1 | Mengjun Li, Ti Zhou, Zhoujun Li 0001 |
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
non-termination characterization and prediction, abstract and refinement, security protocol |
1 | Tong-Lee Lim, Tieyan Li, Yingjiu Li |
A Security and Performance Evaluation of Hash-Based RFID Protocols. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
RFID Security and Privacy, Authentication Protocols |
1 | Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
Inter-domain Identity-Based Proxy Re-encryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan |
Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Stickelberger-Swan Theorem, ??LFSR, Finite Field, Linear Feedback Shift Register(LFSR), Irreducible Polynomial |
1 | Wei Zhao, Changlu Lin, Dingfeng Ye |
Provably Secure Convertible Nominative Signature Scheme. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Nominative signature, Digital signature, Selectively, Universally, Convertible |
1 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Efficient Signcryption Key Encapsulation without Random Oracles. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Hybrid signcryption, KEM, tag-KEM, standard model |
1 | Ningbo Mu, Yupu Hu, Leyou Zhang |
On the Computational Efficiency of XTR+. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lingli Deng, Yeping He, Ziyao Xu |
Separation of Duty in Trust-Based Collaboration. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Secure Collaboration, Statically Mutual Exclusive Roles, Role-Based Access Control, Separation of Duty |
1 | Bart Preneel |
The State of Hash Functions and the NIST SHA-3 Competition. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 |
Further Observations on Certificateless Public Key Encryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Luk Bettale, Jean-Charles Faugère, Ludovic Perret |
Security Analysis of Multivariate Polynomials for Hashing. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shiwei Chen, Chenhui Jin |
An Improved Collision Attack on MD5 Algorithm. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Chuangui Ma, Rui Cheng |
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
hierarchical secret sharing, ad-hoc network, key management, verifiable secret sharing |
1 | Christophe Tartary, Josef Pieprzyk, Huaxiong Wang |
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme |
1 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
Orthogonality between Key Privacy and Data Privacy, Revisited. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Daoshun Wang, Xiaobo Li 0001, Feng Yi |
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Probabilistic schemes, Pixel expansion, Visual secret sharing |
1 | Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis |
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
filter functions, linearized polynomials, stream ciphers, linear feedback shift registers, linear complexity, Binary sequences |
1 | Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Zan Li, Kai Fan 0001 |
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert |
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
stream cipher, algebraic attacks, clock-control |
1 | Shaoquan Jiang |
Deniable Authentication on the Internet. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Protocol, Key Exchange, Deniability |
1 | Andrey Bogdanov |
Linear Slide Attacks on the KeeLoq Block Cipher. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks |
1 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
1 | Jin-Song Wang, Wen-Feng Qi 0001 |
Linear Equation on Polynomial Single Cycle T-Functions. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
single cycle, pseudorandom generator, polynomial function |
1 | Yi Deng 0002, Dongdai Lin |
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Resettable Zero Knowledge, Concurrent Soundness, the Bare Public-Key Model, Resettably sound Zero Knowledge |
1 | Marc Mouffron, Frederic Rousseau 0002, Huafei Zhu |
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Squared Euclidean Distance, Stand-alone and simulation-based model, Secure two-party computation |
1 | Weijia Wang, Lei Hu, Yong Li 0002 |
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
1 | Feng Cheng 0002, Christian Wolter, Christoph Meinel |
A Simple, Smart and Extensible Framework for Network Security Measurement. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Longjiang Qu, Chao Li 0002 |
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Weight Support, Algebraic Attack, Algebraic Immunity, Symmetric Boolean Function |
1 | Fouz Sattar, Muid Mufti |
On Modeling Post Decryption Error Processes in UMTS Air Interface. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
3G Security, Wireless Confidentiality, UMTS Encryption, Markov Modeling, Error probability |
1 | Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern |
Cryptanalysis of the SFLASH Signature Scheme. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
signature, differential cryptanalysis, multivariate cryptography, SFLASH |
1 | Yang Xiang, Qiang Li 0008 |
Online Tracing Scanning Worm with Sliding Window. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Propagation path, Online tracing, Detection window, Worm |
1 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent |
1 | Jun-Wu Dong, Dingyi Pei, Xueli Wang |
A Key Predistribution Scheme Based on 3-Designs. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
key predistribution schemes, 3-designs, Möbius planes, sensor networks, combinatorial designs |
1 | Jin-Song Wang, Wen-Feng Qi 0001 |
Four Families of Binary Sequences with Low Correlation and Large Linear Complexity. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Gold sequence family, Gold-like sequence family, low correlation |
1 | Sujing Zhou, Dongdai Lin |
Unlinkable Randomizable Signature and Its Application in Group Signature. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Randomizable Signature, Sigma-protocol, Digital Signature, Group Signature |
1 | Fuchun Guo, Yi Mu 0001, Zhide Chen, Li Xu 0002 |
Multi-Identity Single-Key Decryption without Random Oracles. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
ID-based Systems, Encryption, Pairing |
1 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Undeniable Signatures, Identity-based, Convertible |
1 | Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis |
A Provably Secure One-Pass Two-Party Key Establishment Protocol. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation |
1 | Chunxiang Gu, Yuefei Zhu |
An Efficient ID-Based Proxy Signature Scheme from Pairings. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
bilinear pairings, proxy signatures, ID-based cryptography |
1 | Jacek Cichon, Miroslaw Kutylowski |
Anonymity and k-Choice Identities. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
anonymity set, two-choice paradigm, identifier, birthday paradox |
1 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
ECDL problem, GDH problem, signcryption, ECDSA |
1 | Moti Yung |
On the Evolution of User Authentication: Non-bilateral Factors. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai |
Cryptanalysis of General Lu-Lee Type Systems. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Lu-Lee type systems, cryptanalysis, lattice reduction |
1 | Ning Ding 0001, Dawu Gu |
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Zhixiong Chen 0002, Ning Zhang, Guozhen Xiao |
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
elliptic curves, discrete logarithm, discrepancy, linear complexity, pseudo-random sequences, character sums |
1 | Chin-Chen Chang 0001, Yi-Fang Cheng, Iuon-Chang Lin |
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Chunxiang Gu, Yuefei Zhu, Heng Pan |
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
provable secure, keyword search, public key encryption, pairings |
1 | Jintai Ding, Bo-Yin Yang |
Multivariates Polynomials for Hashing. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
hash function, multivariate polynomials, sparse |
1 | Jing Zhan, Huanguo Zhang, Fei Yan |
Building Trusted Sub-domain for the Grid with Trusted Computing. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security |
Displaying result #401 - #500 of 527 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|