The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptosystem with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1982 (23) 1983-1984 (18) 1985 (16) 1986-1987 (18) 1988 (17) 1989 (18) 1990 (16) 1991 (29) 1992-1993 (19) 1994 (18) 1995-1996 (22) 1997 (28) 1998 (43) 1999 (38) 2000 (30) 2001 (61) 2002 (60) 2003 (86) 2004 (109) 2005 (150) 2006 (144) 2007 (133) 2008 (128) 2009 (114) 2010 (73) 2011 (84) 2012 (65) 2013 (74) 2014 (67) 2015 (97) 2016 (66) 2017 (70) 2018 (115) 2019 (119) 2020 (112) 2021 (112) 2022 (94) 2023 (87) 2024 (24)
Publication types (Num. hits)
article(1164) incollection(28) inproceedings(1396) phdthesis(9)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1345 occurrences of 497 keywords

Results
Found 2597 publication records. Showing 2597 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Jun-Chou Chuang, Chin-Chen Chang 0001 Detection and Restoration of a Tampered Medical Image. Search on Bibsonomy MIAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Authentication, watermarking, medical imaging, confidentiality
16Hong-Sen Yan, Hsing-Hui Huang The Secret and Beauty of Ancient Chinese Padlocks. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Kerckhoffs' assumption, provable security, chosen-ciphertext security
16Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Applications of Pedersen's Distributed Key Generation Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed key generation, discrete logarithm, random oracle model, Threshold cryptography, exact security
16Oded Regev 0001 New lattice based cryptographic constructions. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF average-case hardness, cryptography, quantum computing, lattices, public key encryption
16Mohamed Al-Ibrahim A Signcryption Scheme Based on Secret Sharing Technique. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16M. Jason Hinek, Mo King Low, Edlyn Teske On Some Attacks on Multi-prime RSA. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Chou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang A Solution to Mobile IP Registration for AAA. Search on Bibsonomy CDMA International Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16John A. Clark, Jeremy L. Jacob Fault Injection and a Timing Channel on an Analysis Technique. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Heuristic Optimisation, identification schemes, timing channels
16Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila Performance analysis of elliptic curve cryptography for SSL. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure socket layer (SSL), wireless, elliptic curve cryptography (ECC), internet security
16Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems
16Ivan Damgård, Jesper Buus Nielsen Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Kyung-Ah Chang, Byung-Rae Lee, Tai-Yun Kim Authentication Service Model Supporting Multiple Domains in Distributed Computing. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Kyung-Ah Chang, Byung-Rae Lee, Tai-Yun Kim Flexible Authentication with Multiple Domains of Electronic Commerce. Search on Bibsonomy EC-Web The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Joan Mir, Joan Borrell Protecting General Flexible Itineraries of Mobile Agents. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Naoki Masuda, Kazuyuki Aihara Cryptosystems based on space-discretization of chaotic maps. Search on Bibsonomy ISCAS (3) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Minoru Kuribayashi, Hatsukazu Tanaka A New Anonymous Fingerprinting Scheme with High Enciphering Rate. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Lejla Batina, Geeke Muurling Another Way of Doing RSA Cryptography in Hardware. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation
16Kyung-Ah Chang, Tae-Seung Lee, Bang-Hung Chun, Tai-Yun Kim Ticket-Based Secure Delegation Service Supporting Multiple Domain Models. Search on Bibsonomy PRDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Colin D. Walter Sliding Windows Succumbs to Big Mac Attack. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation
16Éliane Jaulmes, Antoine Joux A Chosen-Ciphertext Attack against NTRU. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Adam L. Young, Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal
16Arjen K. Lenstra Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester Some Bounds and a Construction for Secure Broadcast Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Akihiro Yamamura Public-Key Cryptosystems Using the Modular Group. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Marie Henderson Applications of Linearised and Sub-linearised Polynomials to Information Security. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater Cerebral Cryptography. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Mohssen Alabbadi, Stephen B. Wicker A Digital Signature Scheme Based on Linear Error-correcting Block Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
16Thomas Beth, Dejan E. Lazic, A. Mathias Cryptanalysis of Cryptosystems Based on Remote Chaos Replication. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
16Ishai Ben-Aroya, Eli Biham Differential Cryptanalysis of Lucifer. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
16Ueli M. Maurer, Yacov Yacobi A Remark on a Non-interactive Public-Key Distribution System. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
16Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi Results of Switching-Closure-Test on FEAL (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
16Steven Rudich The Use of Interaction in Public Cryptosystems (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
16Charles Rackoff, Daniel R. Simon Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
16Kenji Koyama Direct Demonstration of the Power to Break Public-Key Cryptosystems. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
16Paul C. van Oorschot A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
16Tatsuaki Okamoto A Digital Multisignature Schema Using Bijective Public-Key Cryptosystems. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
16Amir Herzberg, Shlomit S. Pinter Public Protection of Software. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
16Hugh C. Williams An M³ Public-Key Encryption Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
16Amir Herzberg, Shlomit S. Pinter Public Protection of Software. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
13Che Wun Chiou, Jim-Min Lin, Chiou-Yng Lee, Chi-Ting Ma Novel Mastrovito Multiplier over GF(2m) Using Trinomial. Search on Bibsonomy ICGEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Mastrovito multiplier, cryptography, elliptic curve cryptosystem, public-key cryptosystems, finite field multiplier
13Yuichi Baba, Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki Design of Tamper-Resistant Registers for Multiple-Valued Cryptographic Processors. Search on Bibsonomy ISMVL The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cryptographic processors, side-channel attacks, multiple-valued logic, RSA cryptosystem
13Xin Zhao, Yuqin Lv, Tet Hin Yeap, Bin Hou A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication and key agreement, ECC-based self-certified public key cryptosystem, wireless mesh networks
13Patrick Longa, Catherine H. Gebotys Novel Precomputation Schemes for Elliptic Curve Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple scalar multiplication, precomputation scheme, conjugate addition, Elliptic curve cryptosystem, scalar multiplication
13Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai A Verifiable Electronic Voting Scheme over the Internet. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Electronic voting, Blind signature, Verifiability, Cryptosystem
13A. John Prakash, V. Rhymend Uthariaraj Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multicrypt, N-way Cryptosystem, Key management, Multicast Security
13Patrick Longa, Catherine H. Gebotys Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multibase non-adjacent form, fractional window, Elliptic curve cryptosystem, scalar multiplication, double base number system
13Aggelos Kiayias, Serdar Pehlivanoglu On the security of a public-key traitor tracing scheme with sublinear ciphertext size. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF blackbox tracing, public key cryptosystem, traitor tracing
13Huafei Zhu, Feng Bao 0001 Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security
13Chou Chen Yang, Ju-Chun Hsiao, Hung-Wen Yang Identity-Based DRM in Ubiquitous Multimedia System. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ubiquitous Multimedia System, DRM, Identity-based cryptosystem
13Hao Wang 0007, Qiuliang Xu, Tao Ban A Provably Secure Two-Party Attribute-Based Key Agreement Protocol. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attribute-based cryptosystem, random oracle model, key agreement protocol
13Yu-Wei Lai, Chin-Chen Chang 0001, Shih-Chang Chang Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, anonymity, elliptic curve cryptosystem, Electronic voting
13Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang SSE Implementation of Multivariate PKCs on Modern x86 CPUs. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multivariate public key cryptosystem (MPKC), ?IC, vector instructions, SSSE3, Wiedemann, TTS, rainbow, SSE2
13Shan Suthaharan Enhanced Accuracy Moment Invariants for Biometric Recognition and Cryptosystems. Search on Bibsonomy ICIAR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Central moments, hamming window, biometric cryptosystem, pattern recognition, moment invariants, geometric transformation
13Tim Güneysu, Christof Paar, Jan Pelzl Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pollard's rho, cryptanalysis, elliptic curve cryptosystem, Discrete logarithm
13Xiaolei Dong, Zhenfu Cao, Licheng Wang New designing of cryptosystems based on quadratic fields. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quadratic field cryptography, quadratic fields, provable security, public key cryptosystem
13Shimin Wei, Zepeng Zhuo Research on PKI Model Based on NTRU. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTRU cryptosystem, NTRU signature, PKI
13Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gröbner basis, multivariate public key cryptosystem
13Patrick Longa, Ali Miri New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF point operation, precomputation scheme, Elliptic curve cryptosystem, scalar multiplication, composite operation
13S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem
13Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 A GF(p) elliptic curve group operator resistant against side channel attacks. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack
13Eun-Jun Yoon, Kee-Young Yoo An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography, Password, Elliptic curve cryptosystem, Key establishment, Perfect forward secrecy
13Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin Breaking Instance II of New TTM Cryptosystems. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack, cryptosystem
13Changji Wang, Rongbo Lu A Certificateless Restrictive Partially Blind Signature Scheme. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Certificateless Public Key Cryptosystem, Restrictive Partially Blind Signature
13Hyun Min Choi, Chun Pyo Hong, Chang Hoon Kim High Performance Elliptic Curve Cryptographic Processor Over GF(2^163). Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptographic Processor, VLSI, Finite Field, Elliptic Curve Cryptosystem, Gaussian Normal Basis
13HyeongRag Kim, Hoon-Jae Lee 0001, Sang-Jae Moon A Security Enhancement of the E0 Cipher in Bluetooth System. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCC-SG, Stream cipher, Cryptosystem
13Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel processing, elliptic curve cryptography(ECC), public-key cryptosystem, binary fields
13Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud On Kabatianskii-Krouk-Smeets Signatures. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF random error-correcting codes, Niederreiter cryptosystem, digital signature, Code-based cryptography
13Xin Jiang, Jintai Ding, Lei Hu Kipnis-Shamir Attack on HFE Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MinRank, relinearization, Gröbner basis, multivariate public key cryptosystem, XL algorithm, HFE
13Tim Güneysu, Christof Paar, Jan Pelzl Attacking elliptic curve cryptosystems with special-purpose hardware. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm
13Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee Eta Pairing Computation on General Divisors over Hyperelliptic Curves y2 = x7-x+/-1. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Eta pairing, divisors, Tate pairing, hyperelliptic curves, resultant, pairing-based cryptosystem
13Nick A. Moldovyan New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF public encryption, Digital signature, public key cryptosystem, key agreement protocol
13Erik Dahmen, Katsuyuki Okeya, Daniel Schepers Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF affine coordinates, elliptic curve cryptosystem, scalar multiplication, precomputation
13Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka Efficient Implementation of the Pairing on Mobilephones Using BREW. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobilephone, Efficient Implementation, Pairing Based Cryptosystem, BREW
13Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi 0001 Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic curves, Pairing based cryptosystem
13Hung-Yu Chien ID-Based Key Agreement with Anonymity for Ad Hoc Networks. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ad hoc networks, anonymity, bilinear pairing, key agreement, identity-based cryptosystem
13Bangju Wang, Huanguo Zhang, Zhang-yi Wang, Yuhua Wang Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers. Search on Bibsonomy MCAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF signed binary representation (SBR), elliptic curve cryptosystems (ECC), public key cryptosystem, scalar multiplication
13Gilbert Baumslag, Benjamin Fine, Xiaowei Xu Cryptosystems using Linear Groups. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Free group, Linear group, Modular group, Reidemeister-Schreier Process, Cryptosystem
13Ben Adida, Ronald L. Rivest Scratch & vote: self-contained paper-based cryptographic voting. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic voting, homomorphic tallying, paillier cryptosystem, paper ballot, scratch surface, barcode
13Colin D. Walter, David Samyde Data Dependent Power Use in Multipliers. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EMA, smart card, Differential power analysis, DPA, multiplication, multiplier, RSA cryptosystem
13Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto A Proposal of Short Proxy Signature using Pairing. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF general hash function, bilinear pairing, elliptic curve cryptosystem, proxy signature, short signature
13Bob Blakley 0001, G. R. Blakley All sail, no anchor II: Acceptable high-end PKI. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation
13Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve, Key exchange, Discrete logarithm, Pairing, Cryptosystem
13Paulo S. L. M. Barreto, Ben Lynn, Michael Scott Efficient Implementation of Pairing-Based Cryptosystems. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve construction, Tate pairing, Efficient implementation, Pairing-based cryptosystem
13Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo Fast Parallel Molecular Algorithms for DNA-based Computation: Factoring Integers. Search on Bibsonomy BIBE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Biological Parallel Computing, DNA-based Supercomputing, the RSA Public-key cryptosystem
13Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM
13Paul Camion, Hervé Chabanne On the Powerline System. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Chor-Rivest, Powerline, Fractional Powerline, Quadratic Fractional Power System, Berlekamp-Massey, RSA, Identification, Public Key Cryptosystem (PKC), Knapsack
13Colin D. Walter Exponentiation Using Division Chains. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1998 DBLP  DOI  BibTeX  RDF bit recoding, m-ary method, mixed basis arithmetic, radix representation, Modular exponentiation, RSA cryptosystem, addition chains
13Naofumi Takagi A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1992 DBLP  DOI  BibTeX  RDF division subtraction, radix-4 modular multiplication hardware algorithm, residue calculation, repeated multiply-add, serial-parallel modular multiplier, cellular array structure, VLSI, cryptography, digital arithmetic, public-key cryptosystems, modular exponentiation, RSA cryptosystem, redundant representation, bit slice
13Subhrajyoti Deb, Abhilash Kumar Das, Nirmalya Kar An Applied Image Cryptosystem on Moore's Automaton Operating on δ (qk)/2. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Malik Obaid Ul Islam, Shabir A. Parah Fast and Lightweight Image Cryptosystem for IoMT Applications. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13R. Vaishali, S. Manohar Naik A DNA Cryptosystem Using Diffie-Hellman Key Exchange. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Thomas Prantl, Lukas Horn, Simon Engel, Lukas Iffländer, Lukas Beierlieb, Christian Krupitzer, André Bauer 0001, Mansi Sakarvadia, Ian T. Foster, Samuel Kounev De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13 Retraction Note: Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Cyrius Nugier, Vincent Migliore Acceleration of a Classic McEliece Postquantum Cryptosystem With Cache Processing. Search on Bibsonomy IEEE Micro The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Walid El-Shafai, Fatma Khallaf, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Ekta Bindal, Abhay Kumar Singh Secure and Compact: A New Variant of McEliece Cryptosystem. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Wen-Long Chin, Pin-Wei Chen, Shih-Hsiang Chou, Yu-Hua Yang, Pei-Yin Chen, Tao Jiang 0002 Cryptosystem for IoT Devices With Feedback Operation Modes Based on Shared Buffer and Unrolled-Pipeline Techniques. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Xiaodong Li, Hehe Gao, Jianyi Zhang, Shuya Yang, Xin Jin 0015, Kim-Kwang Raymond Choo GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Prabhjot Kaur, Nitin Kumar SIFTBCS: scale invariant feature transform based fuzzy vault scheme in biometric cryptosystem. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 2597 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license