The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Key with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1961 (38) 1962-1967 (15) 1968-1971 (15) 1972-1975 (23) 1976 (23) 1977-1978 (30) 1979 (23) 1980 (26) 1981 (25) 1982 (53) 1983 (44) 1984 (69) 1985 (89) 1986 (62) 1987 (110) 1988 (114) 1989 (186) 1990 (170) 1991 (144) 1992 (158) 1993 (203) 1994 (264) 1995 (365) 1996 (457) 1997 (522) 1998 (621) 1999 (881) 2000 (1219) 2001 (1632) 2002 (1849) 2003 (2429) 2004 (3346) 2005 (4194) 2006 (4700) 2007 (5290) 2008 (5168) 2009 (3729) 2010 (1592) 2011 (1223) 2012 (1158) 2013 (1296) 2014 (1347) 2015 (1422) 2016 (1724) 2017 (1551) 2018 (1665) 2019 (1786) 2020 (1898) 2021 (2024) 2022 (1948) 2023 (2119) 2024 (569)
Publication types (Num. hits)
article(19865) book(46) data(5) incollection(453) inproceedings(40846) phdthesis(295) proceedings(98)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 41555 occurrences of 11846 keywords

Results
Found 61687 publication records. Showing 61608 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Chin-Chen Chang 0001, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee A Scheme for Obtaining a Message from the Digital Multisignature. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF digital signature, multisignature, message recovery
27Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka Secure Hyperelliptic Cryptosystems and Their Performances. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Nina Kreyer, Key Pousttchi, Klaus Turowski Standardized Payment Procedures as Key Enabling Factor for Mobile Commerce. Search on Bibsonomy EC-Web The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Haowen Chan, Virgil D. Gligor, Adrian Perrig, Gautam Muralidharan On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Sensor networks, distributed algorithms, key management, key distribution, revocation
27Donggang Liu, Peng Ning Establishing pairwise keys in distributed sensor networks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sensor networks, key management, probabilistic key sharing
27Byoungcheon Lee, Kwangjo Kim Self-certified Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure
26Jun Zhou, Mingxing He An Improved Distributed Key Management Scheme in Wireless Sensor Networks. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed wireless sensor networks, Key management, Secret sharing, Continuity
26Jin Li 0002, Fangguo Zhang, Yanming Wang A Strong Identity Based Key-Insulated Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-insulated cryptosystem, Bilinear pairings, ID-based
26Hoonjung Lee, Donghyun Kim 0001, Sangjin Kim, Heekuck Oh Identity-Based Key Agreement Protocols in a Multiple PKG Environment. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multiple PKG, bilinear map, key agreement protocol, ID-based cryptosystem
26Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bede Liu, Jinyun Zhang Fast authenticated key establishment protocols for self-organizing sensor networks. Search on Bibsonomy Wireless Sensor Networks and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, sensor network, elliptic curve cryptography, key establishment
26Dae Hyun Yum, Pil Joong Lee Efficient Key Updating Signature Schemes Based on IBS. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key insulated signature, intrusion resilient siganture, identity based signature
26Raphael Chung-Wei Phan, Soichi Furuya Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF extended slide attacks, sliding property, cryptanalysis, Block ciphers, DES, key schedule
26Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan The Long-Short-Key Primitive and Its Applications to Key Security. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Kyungah Shim The Risks of Compromising Secret Information. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Authenticated key agreement protocol, insider, known-key attack, key-compromise impersonation attack
26Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
26Ratna Dutta, Tom Dowling Secure and Efficient Group Key Agreements for Cluster Based Networks. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF group key agreement and key management, clustering, wireless networks, provable security
26Zhicheng Dai, Zhi Li 0027, Bingwen Wang, Qiang Tang 0004 RTKPS: A Key Pre-distribution Scheme Based on Rooted-Tree in Wireless Sensor and Actor Network. Search on Bibsonomy ISNN (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF WSAN, Key Ring, WSN, Key Pre-distribution, Rooted-Tree
26Colleen Swanson, David Jao A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key agreement, certificateless public key cryptography
26Xing-Lan Zhang Authenticated Key Exchange Protocol in One-Round. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity
26Chau Q. Nguyen, Tuoi T. Phan Key phrase extraction: a hybrid assignment and extraction approach. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Vietnamese key phrase extraction, key phrase, natural language processing, Wikipedia, word segmentation, part-of-speech
26Christina Dörge, Carsten Schulte What are information technology's key qualifications? Search on Bibsonomy ITiCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IT key qualifications, educational lenses, key qualifications, pedagogy, gender, computers and society, curriculum issues, computer science education research, CS ed research, wider access
26Kazuki Yoneyama Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF password-based key exchange, password-based server aided key exchange, leakage of internal states, undetectable on-line dictionary attack
26David Galindo, Rodrigo Roman, Javier López 0001 A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF identity-based key agreement, key distribution, pairings, underwater wireless sensor networks
26Javier Salido, Loukas Lazos, Radha Poovendran Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, multicast, key management, Ad hoc, key distribution, secure group communication
26Sigurd Eskeland, Vladimir A. Oleshchuk Hierarchical Multi-Party Key Agreement for Wireless Networks. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF conference key protocols, hierarchical key agreement, Cryptographic protocols
26Weijia Wang, Lei Hu, Yong Li 0002 Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
26Xing Liao, Shizhong Xu, Sheng Wang 0006, Kaiyu Zhou A Method of Pair-Wise Key Distribution and Management in Distributed Wireless Sensor Networks. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed wireless sensor networks, key distribution and management, pair-wise key, scalable
26Tran Thanh Dai, Choong Seon Hong ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks. Search on Bibsonomy WWIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, key agreement, ID-based, random key pre-distribution
26Yinxia Sun, Futai Zhang, Joonsang Baek Strongly Secure Certificateless Public Key Encryption Without Pairing. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificateless public key encryption, public key encryption, Computational Diffie-Hellman problem
26Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy
26Weijia Wang, Lei Hu Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password, key distribution, authenticated key exchange, multi-party protocol
26Raphael Chung-Wei Phan, Bok-Min Goi Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF client-to-client, unknown key-share, cryptanalysis, replay attack, Password-authenticated key exchange
26Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002, Dowon Hong The Related-Key Rectangle Attack - Application to SHACAL-1. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack, SHACAL-1, Block Ciphers
26Kenji Imamoto, Kouichi Sakurai Key-Exchange Protocol Using Pre-agreed Session-ID. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Diffie-Hellman based key exchange protocol, Identity concealment, Pre-shared key model, Pre-Agreed Session ID
26Jianping Fan 0001, Xingquan Zhu 0001, Kayvan Najarian, Lide Wu Accessing Video Contents through Key Objects over IP. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF semantic object extraction, key object, key VOP, scalable coding
26Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee New WAKE Key Recovery Protocol on M-commerce. Search on Bibsonomy ICWE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Authentication, M-Commerce, Key Establishment, Key Recovery
26Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang A Group Key Distribution Scheme with Decentralised User Join. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key distribution schemes, group key distribution schemes, user join, traceability, secure multicast, user revocation
26Kuen-Pin Wu, Shanq-Jang Ruan, Feipei Lai, Chih-Kuang Tseng On Key Distribution in Secure Multicasting. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF video-conferencing systems, authorized recipients, message encryption, secure filter, cryptography, distributed processing, key distribution, teleconferencing, multicast communication, distributed environment, telecommunication security, secure multicasting, group key, pay per view
26Goutam Paul 0001, Subhamoy Maitra Permutation After RC4 Key Scheduling Reveals the Secret Key. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Permutation, Bias, RC4, Key Scheduling
26Junghyun Nam, Juryon Paik, Youngsook Lee, Jin Kwak, Ung-Mo Kim, Dongho Won Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees. Search on Bibsonomy KES (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Héctor Bellmann About the Determination of Key of a Musical Excerpt. Search on Bibsonomy CMMR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key change, tonality, dot product, surface features, key, MusicXML
25Kanokwan Kanyamee, Chanboon Sathitwiriyawong High-Availability Decentralized Multi-Agent Key Recovery System. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Yong Wang, Byrav Ramamurthy, Xukai Zou KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Qiang Tang, Vanessa Teague (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu 0008, Mehdi Tibouchi, Masayuki Abe Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone Improved Cryptanalysis of HFERP. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang 0002, Yu Yu 0001, Kaiyi Zhang 0001 sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Shuichi Katsumata, Yi-Fu Lai, Michael Reichle Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Anja Lehmann, Cavit Özbay Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong 0001, Jie Chen 0021 Registered Attribute-Based Signature. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Haruhisa Kosuge, Keita Xagawa Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Hannah Davis, Matthew D. Green, Nadia Heninger, Keegan Ryan, Adam Suhl On the Possibility of a Backdoor in the Micali-Schnorr Generator. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Balthazar Bauer, Georg Fuchsbauer, Fabian Regen On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Romain Gay, Bogdan Ursu On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Bertram Poettering, Simon Rastikian Formalizing Hash-then-Sign Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25San Ling, Khoa Nguyen 0002, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Christian Badertscher, Monosij Maitra, Christian Matt 0002, Hendrik Waldner Updatable Policy-Compliant Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Madalina Bolboceanu, Zvika Brakerski, Devika Sharma On Algebraic Embedding for Unstructured Lattices. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang A Refined Hardness Estimation of LWE in Two-Step Mode. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Sanjam Garg, Mohammad Hajiabadi, Peihan Miao 0001, Alice Murphy Laconic Branching Programs from the Diffie-Hellman Assumption. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Jiaxin Pan, Runzhi Zeng Selective Opening Security in the Quantum Random Oracle Model, Revisited. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran 0001, Rajeev Raghunath R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Yu Chen 0003, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu Private Set Operations from Multi-query Reverse Private Membership Test. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Pedro Branco 0005, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto Rate-1 Fully Local Somewhere Extractable Hashing from DDH. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Mingjie Chen, Antonin Leroux, Lorenz Panny SCALLOP-HD: Group Action from 2-Dimensional Isogenies. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, Bogdan Ursu On Structure-Preserving Cryptography and Lattices. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Maria Corte-Real Santos, Craig Costello, Sam Frengley An Algorithm for Efficient Detection of (N, N)-Splittings and Its Application to the Isogeny Problem in Dimension 2. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Yiming Li, Shengli Liu 0001 Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Cyprien Delpech de Saint Guilhem, Robi Pedersen New Proof Systems and an OPRF from CSIDH. Search on Bibsonomy Public Key Cryptography (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Benoît Libert Vector Commitments with Proofs of Smallness: Short Range Proofs and More. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Daniel Escudero 0001, Ivan Tjuawinata, Chaoping Xing On Information-Theoretic Secure Multiparty Computation with Local Repairability. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Benoît Libert Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Matteo Campanelli, Antonio Faonio, Dario Fiore 0001, Tianyu Li 0002, Helger Lipmaa Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Xindong Liu, Li-Ping Wang Short Code-Based One-out-of-Many Proofs and Applications. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Matteo Campanelli, Dario Fiore 0001, Hamidreza Khoshakhlagh Witness Encryption for Succinct Functional Commitments and Applications. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Claudia Bartoli, Ignacio Cascudo On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Zhedong Wang, Qiqi Lai, Feng-Hao Liu Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Moumita Dutta, Chaya Ganesh, Neha Jawalkar Succinct Verification of Compressed Sigma Protocols in the Updatable SRS Setting. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Foteini Baldimtsi, Ioanna Karantaidou, Srinivasan Raghuraman Oblivious Accumulators. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Yuncong Zhang, Shifeng Sun 0001, Dawu Gu Efficient KZG-Based Univariate Sum-Check and Lookup Argument. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Nidhish Bhimrajka, Ashish Choudhury, Supreeth Varadarajan Network-Agnostic Multi-party Computation Revisited (Extended Abstract). Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, Violetta Weger Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Luying Li, Wei Yu 0008, Peng Xu 0003 Fast and Simple Point Operations on Edwards448 and E448. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Navid Alamati, Varun Maram Quantum CCA-Secure PKE, Revisited. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Rachit Garg 0001, Rishab Goyal, George Lu Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Cong Peng 0005, Rongmao Chen, Yi Wang 0055, Debiao He, Xinyi Huang 0001 Parameter-Hiding Order-Revealing Encryption Without Pairings. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Yunxiao Zhou, Shengli Liu 0001, Shuai Han 0001 Multi-hop Fine-Grained Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Dennis Hofheinz, Kristina Hostáková, Julia Kastner, Karen Klein, Akin Ünal Compact Selective Opening Security from LWE. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Gabrielle De Micheli, Duhyeong Kim, Daniele Micciancio, Adam Suhl Faster Amortized FHEW Bootstrapping Using Ring Automorphisms. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Daniele Micciancio, Vinod Vaikuntanathan SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Alexandra Boldyreva, Vladimir Kolesnikov (eds.) Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Alexandra Boldyreva, Vladimir Kolesnikov (eds.) Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Elaine Shi, Nikhil Vanjani Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 61608 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license