|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Rio LaVigne, Chen-Da Liu Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi |
Topology-Hiding Computation for Networks with Unknown Delays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 215-245, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Ran Canetti, Pratik Sarkar, Xiao Wang 0012 |
Blazing Fast OT for Three-Round UC OT Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 299-327, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | André Chailloux, Thomas Debris-Alazard |
Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 453-479, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | T.-H. Hubert Chan, Rafael Pass, Elaine Shi |
Sublinear-Round Byzantine Agreement Under Corrupt Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 246-265, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden |
The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 3-36, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Shi Bai 0001, Dipayan Das 0001, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang |
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 66-93, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh |
Generic Authenticated Key Exchange in the Quantum Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 389-422, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Zvika Brakerski, Yael Kalai |
Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 97-123, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Ali El Kaafarani, Shuichi Katsumata, Federico Pintore |
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 157-186, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Cyril Bouvier, Laurent Imbert |
Faster Cofactorization with ECM Using Mixed Representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 483-504, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Abida Haque, Alessandra Scafuro |
Threshold Ring Signatures: New Definitions and Post-quantum Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 423-452, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker |
Bandwidth-Efficient Threshold EC-DSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 266-296, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam |
Going Beyond Dual Execution: MPC for Functions with Efficient Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 328-356, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia |
Improved Classical Cryptanalysis of SIKE in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 505-534, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Aurore Guillevic |
A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 535-564, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Luca De Feo, Michael Meyer 0001 |
Threshold Schemes from Isogeny Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 187-212, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Dario Fiore 0001, Anca Nitulescu, David Pointcheval |
Boosting Verifiable Computation on Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 124-154, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Chloé Hébant, Duong Hieu Phan, David Pointcheval |
Linearly-Homomorphic Signatures and Scalable Mix-Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 597-627, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Olivier Sanders |
Efficient Redactable Signature and Application to Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II, pp. 628-656, 2020, Springer, 978-3-030-45387-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Suvradip Chakraborty, Manoj Prabhakaran 0001, Daniel Wichs |
Witness Maps and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 220-246, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Nairen Cao, Adam O'Neill, Mohammad Zaheri |
Toward RSA-OAEP Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 279-308, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Chris Peikert, Sina Shiehian |
Constraining and Watermarking PRFs from Milder Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 431-461, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Junichi Tomida, Yuto Kawahara, Ryo Nishimaki |
Fast, Compact, and Expressive Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 3-33, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz |
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 187-219, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki |
Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 374-395, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Masayuki Abe, Miguel Ambrona, Miyako Ohkubo |
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 558-589, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan |
Verifiable Inner Product Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 65-94, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Qiqi Lai, Feng-Hao Liu, Zhedong Wang |
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 652-681, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Rishiraj Bhattacharyya |
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 249-278, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | David Derler, Kai Samelin, Daniel Slamanig |
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 462-492, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Shifeng Sun 0001, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu |
Public-Key Puncturable Encryption: Modular and Compact Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 309-338, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen 0002, Huaxiong Wang |
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 396-427, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Roman Langrehr, Jiaxin Pan |
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 153-183, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Sanjam Garg, Romain Gay, Mohammad Hajiabadi |
Master-Key KDM-Secure IBE from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 123-152, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Vanesa Daza, Carla Ràfols, Alexandros Zacharakis |
Updateable Inner Product Argument with Logarithmic Verifier and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 527-557, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Benjamin Dowling, Paul Rösler, Jörg Schwenk |
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 341-373, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac 0001 |
On QA-NIZK in the BPK Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 590-620, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Romain Gay |
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 95-120, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu |
Adaptive Simulation Security for Inner Product Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I, pp. 34-64, 2020, Springer, 978-3-030-45373-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Dongdai Lin, Kazue Sako (eds.) |
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![Springer, 978-3-030-17252-7 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Dongdai Lin, Kazue Sako (eds.) |
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![Springer, 978-3-030-17258-9 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Oded Goldreich 0001 |
On the impact of cryptography on complexity theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Providing Sound Foundations for Cryptography ![In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 497-526, 2019, ACM, 978-1-4503-7266-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Yael Tauman Kalai, Leonid Reyzin |
A survey of leakage-resilient cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Providing Sound Foundations for Cryptography ![In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 727-794, 2019, ACM, 978-1-4503-7266-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Oded Goldreich 0001 |
On the foundations of cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Providing Sound Foundations for Cryptography ![In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 411-496, 2019, ACM, 978-1-4503-7266-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Sherman S. M. Chow, Alexander Russell, Qiang Tang 0005, Moti Yung, Yongjun Zhao 0001, Hong-Sheng Zhou |
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 221-251, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Ryo Nishimaki, Takashi Yamakawa |
Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 466-495, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Aijun Ge 0001, Puwen Wei |
Identity-Based Broadcast Encryption with Efficient Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 405-435, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Alonso González |
Shorter Ring Signatures from Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 99-126, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Eyal Kushilevitz, Tamer Mour |
Sub-logarithmic Distributed Oblivious RAM with Small Block Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 3-33, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler |
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 344-373, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Khoa Nguyen 0002, Benjamin Hong Meng Tan, Huaxiong Wang |
Zero-Knowledge Elementary Databases with More Expressive Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 255-285, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Michael Clear, Ciaran McGoldrick |
Additively Homomorphic IBE from Higher Residuosity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 496-515, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Geoffroy Couteau, Michael Reichle |
Non-interactive Keyed-Verification Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 66-96, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Roman Langrehr, Jiaxin Pan |
Tightly Secure Hierarchical Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 436-465, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Michael Backes 0001, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov |
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 286-313, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Xavier Bultel, Pascal Lafourcade 0001, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan |
Efficient Invisible and Unlinkable Sanitizable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 159-189, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled, Mukul Kulkarni |
Upper and Lower Bounds for Continuous Non-Malleable Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 519-548, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva 0001 |
Shorter Quadratic QA-NIZK Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 314-343, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti |
Publicly Verifiable Proofs from Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 374-401, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Lydia Garms, Anja Lehmann |
Group Signatures with Selective Linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 190-220, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Matsuda 0002, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka |
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 549-580, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Chen Qian 0002 |
Lossy Algebraic Filters with Short Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 34-65, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Dennis Hofheinz, Ngoc Khanh Nguyen 0001 |
On Tightly Secure Primitives in the Multi-instance Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 581-611, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima |
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, pp. 127-158, 2019, Springer, 978-3-030-17252-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Zhedong Wang, Xiong Fan, Feng-Hao Liu |
FE for Inner Products and Its Application to Decentralized ABE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 97-127, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Yunhua Wen, Shengli Liu 0001, Dawu Gu |
Generic Constructions of Robustly Reusable Fuzzy Extractor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 349-378, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Zhe Li, Chaoping Xing, Sze Ling Yeo |
Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 599-617, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Thomas Pornin, Thomas Prest |
More Efficient Algorithms for the NTRU Key Generation Using the Field Norm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 504-533, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Lisa Kohl |
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 408-437, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar |
Registration-Based Encryption from Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 63-93, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Simon-Philipp Merz, Christophe Petit 0001 |
Factoring Products of Braids via Garside Normal Form. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 646-678, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu |
Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 441-471, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Alessandra Scafuro |
Break-glass Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 34-62, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Aloni Cohen |
What About Bob? The Inadequacy of CPA Security for Proxy Reencryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 287-316, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki |
Towards Non-Interactive Zero-Knowledge for NP from LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 472-503, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Jan-Pieter D'Anvers, Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede |
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 565-598, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak |
Adaptively Secure Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 317-346, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner |
Decentralizing Inner-Product Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 128-157, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Shuichi Katsumata, Shota Yamada 0001 |
Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 158-188, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Nuttapong Attrapadung, Takahiro Matsuda 0002, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa |
Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 223-253, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Tobias Schneider 0002, Clara Paglialonga, Tobias Oder, Tim Güneysu |
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 534-564, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Rishab Goyal, Satyanarayana Vusirikala, Brent Waters |
Collusion Resistant Broadcast and Trace from Positional Witness Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 3-33, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson |
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 379-407, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Haodong Jiang, Zhenfeng Zhang, Zhi Ma 0001 |
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 618-645, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Ward Beullens, Hoeteck Wee |
Obfuscating Simple Functionalities from Knowledge Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 254-283, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna |
Function Private Predicate Encryption for Low Min-Entropy Predicates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, pp. 189-219, 2019, Springer, 978-3-030-17258-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Ricardo Dahab (eds.) |
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![Springer, 978-3-319-76577-8 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Ricardo Dahab (eds.) |
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![Springer, 978-3-319-76580-8 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 |
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 253-279, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs |
Multi-Key Searchable Encryption, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 95-124, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Federico Giacon, Eike Kiltz, Bertram Poettering |
Hybrid Encryption in a Multi-user Setting, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 159-189, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Hart, DoHoon Kim, Giacomo Micheli, Guillermo Pascual-Perez, Christophe Petit 0001, Yuxuan Quek |
A Practical Cryptanalysis of WalnutDSA TM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 381-406, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Gottfried Herold, Elena Kirshanova, Thijs Laarhoven |
Speed-Ups and Time-Memory Trade-Offs for Tuple Lattice Sieving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 407-436, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Fuyuki Kitagawa, Keisuke Tanaka |
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 32-61, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Christian Badertscher, Ueli Maurer, Björn Tackmann |
On Composable Security for Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 494-523, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Peter Scholl |
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 554-583, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Federico Giacon, Felix Heuer, Bertram Poettering |
KEM Combiners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 190-218, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai |
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 587-619, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yarkin Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang |
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 125-155, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yuval Ishai, Manika Mittal, Rafail Ostrovsky |
On the Message Complexity of Secure Multiparty Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 698-711, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 18658 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|