The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Rio LaVigne, Chen-Da Liu Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi Topology-Hiding Computation for Networks with Unknown Delays. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Ran Canetti, Pratik Sarkar, Xiao Wang 0012 Blazing Fast OT for Three-Round UC OT Extension. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28André Chailloux, Thomas Debris-Alazard Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28T.-H. Hubert Chan, Rafael Pass, Elaine Shi Sublinear-Round Byzantine Agreement Under Corrupt Majority. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Shi Bai 0001, Dipayan Das 0001, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang MPSign: A Signature from Small-Secret Middle-Product Learning with Errors. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh Generic Authenticated Key Exchange in the Quantum Random Oracle Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Zvika Brakerski, Yael Kalai Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Ali El Kaafarani, Shuichi Katsumata, Federico Pintore Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Cyril Bouvier, Laurent Imbert Faster Cofactorization with ECM Using Mixed Representations. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Abida Haque, Alessandra Scafuro Threshold Ring Signatures: New Definitions and Post-quantum Security. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker Bandwidth-Efficient Threshold EC-DSA. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam Going Beyond Dual Execution: MPC for Functions with Efficient Verification. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia Improved Classical Cryptanalysis of SIKE in Practice. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Aurore Guillevic A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Luca De Feo, Michael Meyer 0001 Threshold Schemes from Isogeny Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Dario Fiore 0001, Anca Nitulescu, David Pointcheval Boosting Verifiable Computation on Encrypted Data. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Chloé Hébant, Duong Hieu Phan, David Pointcheval Linearly-Homomorphic Signatures and Scalable Mix-Nets. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Olivier Sanders Efficient Redactable Signature and Application to Anonymous Credentials. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Suvradip Chakraborty, Manoj Prabhakaran 0001, Daniel Wichs Witness Maps and Applications. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Nairen Cao, Adam O'Neill, Mohammad Zaheri Toward RSA-OAEP Without Random Oracles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Chris Peikert, Sina Shiehian Constraining and Watermarking PRFs from Milder Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Junichi Tomida, Yuto Kawahara, Ryo Nishimaki Fast, Compact, and Expressive Attribute-Based Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Masayuki Abe, Miguel Ambrona, Miyako Ohkubo On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan Verifiable Inner Product Encryption Scheme. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Qiqi Lai, Feng-Hao Liu, Zhedong Wang Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Rishiraj Bhattacharyya Memory-Tight Reductions for Practical Key Encapsulation Mechanisms. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28David Derler, Kai Samelin, Daniel Slamanig Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Shifeng Sun 0001, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu Public-Key Puncturable Encryption: Modular and Compact Constructions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen 0002, Huaxiong Wang PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Roman Langrehr, Jiaxin Pan Hierarchical Identity-Based Encryption with Tight Multi-challenge Security. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Sanjam Garg, Romain Gay, Mohammad Hajiabadi Master-Key KDM-Secure IBE from Pairings. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Vanesa Daza, Carla Ràfols, Alexandros Zacharakis Updateable Inner Product Argument with Logarithmic Verifier and Applications. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Benjamin Dowling, Paul Rösler, Jörg Schwenk Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Behzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac 0001 On QA-NIZK in the BPK Model. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Romain Gay A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu Adaptive Simulation Security for Inner Product Functional Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Dongdai Lin, Kazue Sako (eds.) Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Dongdai Lin, Kazue Sako (eds.) Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Oded Goldreich 0001 On the impact of cryptography on complexity theory. Search on Bibsonomy Providing Sound Foundations for Cryptography The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Yael Tauman Kalai, Leonid Reyzin A survey of leakage-resilient cryptography. Search on Bibsonomy Providing Sound Foundations for Cryptography The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Oded Goldreich 0001 On the foundations of cryptography. Search on Bibsonomy Providing Sound Foundations for Cryptography The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Sherman S. M. Chow, Alexander Russell, Qiang Tang 0005, Moti Yung, Yongjun Zhao 0001, Hong-Sheng Zhou Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Ryo Nishimaki, Takashi Yamakawa Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Aijun Ge 0001, Puwen Wei Identity-Based Broadcast Encryption with Efficient Revocation. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Alonso González Shorter Ring Signatures from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Eyal Kushilevitz, Tamer Mour Sub-logarithmic Distributed Oblivious RAM with Small Block Size. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Benoît Libert, Khoa Nguyen 0002, Benjamin Hong Meng Tan, Huaxiong Wang Zero-Knowledge Elementary Databases with More Expressive Queries. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Michael Clear, Ciaran McGoldrick Additively Homomorphic IBE from Higher Residuosity. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Geoffroy Couteau, Michael Reichle Non-interactive Keyed-Verification Anonymous Credentials. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Roman Langrehr, Jiaxin Pan Tightly Secure Hierarchical Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Michael Backes 0001, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Xavier Bultel, Pascal Lafourcade 0001, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan Efficient Invisible and Unlinkable Sanitizable Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Dana Dachman-Soled, Mukul Kulkarni Upper and Lower Bounds for Continuous Non-Malleable Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva 0001 Shorter Quadratic QA-NIZK Proofs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti Publicly Verifiable Proofs from Blockchains. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Lydia Garms, Anja Lehmann Group Signatures with Selective Linkability. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Takahiro Matsuda 0002, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Benoît Libert, Chen Qian 0002 Lossy Algebraic Filters with Short Tags. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Dennis Hofheinz, Ngoc Khanh Nguyen 0001 On Tightly Secure Primitives in the Multi-instance Setting. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Zhedong Wang, Xiong Fan, Feng-Hao Liu FE for Inner Products and Its Application to Decentralized ABE. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Yunhua Wen, Shengli Liu 0001, Dawu Gu Generic Constructions of Robustly Reusable Fuzzy Extractor. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Zhe Li, Chaoping Xing, Sze Ling Yeo Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Thomas Pornin, Thomas Prest More Efficient Algorithms for the NTRU Key Generation Using the Field Norm. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Lisa Kohl Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar Registration-Based Encryption from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Simon-Philipp Merz, Christophe Petit 0001 Factoring Products of Braids via Garside Normal Form. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Alessandra Scafuro Break-glass Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Aloni Cohen What About Bob? The Inadequacy of CPA Security for Proxy Reencryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki Towards Non-Interactive Zero-Knowledge for NP from LWE. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Jan-Pieter D'Anvers, Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak Adaptively Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner Decentralizing Inner-Product Functional Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Shuichi Katsumata, Shota Yamada 0001 Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Nuttapong Attrapadung, Takahiro Matsuda 0002, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Tobias Schneider 0002, Clara Paglialonga, Tobias Oder, Tim Güneysu Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Rishab Goyal, Satyanarayana Vusirikala, Brent Waters Collusion Resistant Broadcast and Trace from Positional Witness Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Haodong Jiang, Zhenfeng Zhang, Zhi Ma 0001 Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Ward Beullens, Hoeteck Wee Obfuscating Simple Functionalities from Knowledge Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna Function Private Predicate Encryption for Low Min-Entropy Predicates. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Ricardo Dahab (eds.) Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Ricardo Dahab (eds.) Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs Multi-Key Searchable Encryption, Revisited. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Federico Giacon, Eike Kiltz, Bertram Poettering Hybrid Encryption in a Multi-user Setting, Revisited. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Daniel Hart, DoHoon Kim, Giacomo Micheli, Guillermo Pascual-Perez, Christophe Petit 0001, Yuxuan Quek A Practical Cryptanalysis of WalnutDSA TM. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Gottfried Herold, Elena Kirshanova, Thijs Laarhoven Speed-Ups and Time-Memory Trade-Offs for Tuple Lattice Sieving. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Fuyuki Kitagawa, Keisuke Tanaka Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Christian Badertscher, Ueli Maurer, Björn Tackmann On Composable Security for Digital Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Peter Scholl Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Federico Giacon, Felix Heuer, Bertram Poettering KEM Combiners. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Yarkin Doröz, Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman, Berk Sunar, William Whyte, Zhenfei Zhang Fully Homomorphic Encryption from the Finite Field Isomorphism Problem. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Yuval Ishai, Manika Mittal, Rafail Ostrovsky On the Message Complexity of Secure Multiparty Computation. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 18658 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license