|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1345 occurrences of 497 keywords
|
|
|
Results
Found 2597 publication records. Showing 2597 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | Jun-Chou Chuang, Chin-Chen Chang 0001 |
Detection and Restoration of a Tampered Medical Image. |
MIAR |
2004 |
DBLP DOI BibTeX RDF |
Authentication, watermarking, medical imaging, confidentiality |
16 | Hong-Sen Yan, Hsing-Hui Huang |
The Secret and Beauty of Ancient Chinese Padlocks. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 |
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
Kerckhoffs' assumption, provable security, chosen-ciphertext security |
16 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Secure Applications of Pedersen's Distributed Key Generation Protocol. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
distributed key generation, discrete logarithm, random oracle model, Threshold cryptography, exact security |
16 | Oded Regev 0001 |
New lattice based cryptographic constructions. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
average-case hardness, cryptography, quantum computing, lattices, public key encryption |
16 | Mohamed Al-Ibrahim |
A Signcryption Scheme Based on Secret Sharing Technique. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
16 | M. Jason Hinek, Mo King Low, Edlyn Teske |
On Some Attacks on Multi-prime RSA. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Chou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang |
A Solution to Mobile IP Registration for AAA. |
CDMA International Conference |
2002 |
DBLP DOI BibTeX RDF |
|
16 | John A. Clark, Jeremy L. Jacob |
Fault Injection and a Timing Channel on an Analysis Technique. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
Heuristic Optimisation, identification schemes, timing channels |
16 | Vipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila |
Performance analysis of elliptic curve cryptography for SSL. |
Workshop on Wireless Security |
2002 |
DBLP DOI BibTeX RDF |
secure socket layer (SSL), wireless, elliptic curve cryptography (ECC), internet security |
16 | Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung |
Observability Analysis - Detecting When Improved Cryptosystems Fail. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems |
16 | Ivan Damgård, Jesper Buus Nielsen |
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Kyung-Ah Chang, Byung-Rae Lee, Tai-Yun Kim |
Authentication Service Model Supporting Multiple Domains in Distributed Computing. |
International Conference on Computational Science (1) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Kyung-Ah Chang, Byung-Rae Lee, Tai-Yun Kim |
Flexible Authentication with Multiple Domains of Electronic Commerce. |
EC-Web |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Joan Mir, Joan Borrell |
Protecting General Flexible Itineraries of Mobile Agents. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Naoki Masuda, Kazuyuki Aihara |
Cryptosystems based on space-discretization of chaotic maps. |
ISCAS (3) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Minoru Kuribayashi, Hatsukazu Tanaka |
A New Anonymous Fingerprinting Scheme with High Enciphering Rate. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Lejla Batina, Geeke Muurling |
Another Way of Doing RSA Cryptography in Hardware. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation |
16 | Kyung-Ah Chang, Tae-Seung Lee, Bang-Hung Chun, Tai-Yun Kim |
Ticket-Based Secure Delegation Service Supporting Multiple Domain Models. |
PRDC |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Colin D. Walter |
Sliding Windows Succumbs to Big Mac Attack. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Cryptography, smart card, RSA, differential power analysis, DPA, blinding, sliding windows, exponentiation |
16 | Éliane Jaulmes, Antoine Joux |
A Chosen-Ciphertext Attack against NTRU. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
16 | Arjen K. Lenstra |
Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester |
Some Bounds and a Construction for Secure Broadcast Encryption. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Akihiro Yamamura |
Public-Key Cryptosystems Using the Modular Group. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Marie Henderson |
Applications of Linearised and Sub-linearised Polynomials to Information Security. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater |
Cerebral Cryptography. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Mohssen Alabbadi, Stephen B. Wicker |
A Digital Signature Scheme Based on Linear Error-correcting Block Codes. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
16 | Thomas Beth, Dejan E. Lazic, A. Mathias |
Cryptanalysis of Cryptosystems Based on Remote Chaos Replication. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
16 | Ishai Ben-Aroya, Eli Biham |
Differential Cryptanalysis of Lucifer. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
16 | Ueli M. Maurer, Yacov Yacobi |
A Remark on a Non-interactive Public-Key Distribution System. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
16 | Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi |
Results of Switching-Closure-Test on FEAL (Extended Abstract). |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
16 | Steven Rudich |
The Use of Interaction in Public Cryptosystems (Extended Abstract). |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
16 | Charles Rackoff, Daniel R. Simon |
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
16 | Kenji Koyama |
Direct Demonstration of the Power to Break Public-Key Cryptosystems. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Paul C. van Oorschot |
A Comparison of Practical Public Key Cryptosystems Based on Integer Factorization and Discrete Logarithms. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Tatsuaki Okamoto |
A Digital Multisignature Schema Using Bijective Public-Key Cryptosystems. |
ACM Trans. Comput. Syst. |
1988 |
DBLP DOI BibTeX RDF |
|
16 | Amir Herzberg, Shlomit S. Pinter |
Public Protection of Software. |
ACM Trans. Comput. Syst. |
1987 |
DBLP DOI BibTeX RDF |
|
16 | Hugh C. Williams |
An M³ Public-Key Encryption Scheme. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
16 | Amir Herzberg, Shlomit S. Pinter |
Public Protection of Software. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
13 | Che Wun Chiou, Jim-Min Lin, Chiou-Yng Lee, Chi-Ting Ma |
Novel Mastrovito Multiplier over GF(2m) Using Trinomial. |
ICGEC |
2011 |
DBLP DOI BibTeX RDF |
Mastrovito multiplier, cryptography, elliptic curve cryptosystem, public-key cryptosystems, finite field multiplier |
13 | Yuichi Baba, Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki |
Design of Tamper-Resistant Registers for Multiple-Valued Cryptographic Processors. |
ISMVL |
2010 |
DBLP DOI BibTeX RDF |
cryptographic processors, side-channel attacks, multiple-valued logic, RSA cryptosystem |
13 | Xin Zhao, Yuqin Lv, Tet Hin Yeap, Bin Hou |
A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
authentication and key agreement, ECC-based self-certified public key cryptosystem, wireless mesh networks |
13 | Patrick Longa, Catherine H. Gebotys |
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
multiple scalar multiplication, precomputation scheme, conjugate addition, Elliptic curve cryptosystem, scalar multiplication |
13 | Chun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai |
A Verifiable Electronic Voting Scheme over the Internet. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Security, Electronic voting, Blind signature, Verifiability, Cryptosystem |
13 | A. John Prakash, V. Rhymend Uthariaraj |
Secure Authenticated Key Establishment Protocol for Ad Hoc Networks. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Multicrypt, N-way Cryptosystem, Key management, Multicast Security |
13 | Patrick Longa, Catherine H. Gebotys |
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
multibase non-adjacent form, fractional window, Elliptic curve cryptosystem, scalar multiplication, double base number system |
13 | Aggelos Kiayias, Serdar Pehlivanoglu |
On the security of a public-key traitor tracing scheme with sublinear ciphertext size. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
blackbox tracing, public key cryptosystem, traitor tracing |
13 | Huafei Zhu, Feng Bao 0001 |
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security |
13 | Chou Chen Yang, Ju-Chun Hsiao, Hung-Wen Yang |
Identity-Based DRM in Ubiquitous Multimedia System. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
Ubiquitous Multimedia System, DRM, Identity-based cryptosystem |
13 | Hao Wang 0007, Qiuliang Xu, Tao Ban |
A Provably Secure Two-Party Attribute-Based Key Agreement Protocol. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
attribute-based cryptosystem, random oracle model, key agreement protocol |
13 | Yu-Wei Lai, Chin-Chen Chang 0001, Shih-Chang Chang |
Novel Efficient Electronic Voting Mechanism Based upon Elliptic Curve. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
authentication, anonymity, elliptic curve cryptosystem, Electronic voting |
13 | Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang |
SSE Implementation of Multivariate PKCs on Modern x86 CPUs. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
multivariate public key cryptosystem (MPKC), ?IC, vector instructions, SSSE3, Wiedemann, TTS, rainbow, SSE2 |
13 | Shan Suthaharan |
Enhanced Accuracy Moment Invariants for Biometric Recognition and Cryptosystems. |
ICIAR |
2009 |
DBLP DOI BibTeX RDF |
Central moments, hamming window, biometric cryptosystem, pattern recognition, moment invariants, geometric transformation |
13 | Tim Güneysu, Christof Paar, Jan Pelzl |
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. |
ACM Trans. Reconfigurable Technol. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Pollard's rho, cryptanalysis, elliptic curve cryptosystem, Discrete logarithm |
13 | Xiaolei Dong, Zhenfu Cao, Licheng Wang |
New designing of cryptosystems based on quadratic fields. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
quadratic field cryptography, quadratic fields, provable security, public key cryptosystem |
13 | Shimin Wei, Zepeng Zhuo |
Research on PKI Model Based on NTRU. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
NTRU cryptosystem, NTRU signature, PKI |
13 | Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang |
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
Gröbner basis, multivariate public key cryptosystem |
13 | Patrick Longa, Ali Miri |
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
point operation, precomputation scheme, Elliptic curve cryptosystem, scalar multiplication, composite operation |
13 | S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan |
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem |
13 | Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 |
A GF(p) elliptic curve group operator resistant against side channel attacks. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack |
13 | Eun-Jun Yoon, Kee-Young Yoo |
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
Cryptography, Password, Elliptic curve cryptosystem, Key establishment, Perfect forward secrecy |
13 | Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin |
Breaking Instance II of New TTM Cryptosystems. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
attack, cryptosystem |
13 | Changji Wang, Rongbo Lu |
A Certificateless Restrictive Partially Blind Signature Scheme. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Cryptosystem, Restrictive Partially Blind Signature |
13 | Hyun Min Choi, Chun Pyo Hong, Chang Hoon Kim |
High Performance Elliptic Curve Cryptographic Processor Over GF(2^163). |
DELTA |
2008 |
DBLP DOI BibTeX RDF |
Cryptographic Processor, VLSI, Finite Field, Elliptic Curve Cryptosystem, Gaussian Normal Basis |
13 | HyeongRag Kim, Hoon-Jae Lee 0001, Sang-Jae Moon |
A Security Enhancement of the E0 Cipher in Bluetooth System. |
KES-AMSTA |
2008 |
DBLP DOI BibTeX RDF |
CCC-SG, Stream cipher, Cryptosystem |
13 | Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
parallel processing, elliptic curve cryptography(ECC), public-key cryptosystem, binary fields |
13 | Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud |
On Kabatianskii-Krouk-Smeets Signatures. |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
random error-correcting codes, Niederreiter cryptosystem, digital signature, Code-based cryptography |
13 | Xin Jiang, Jintai Ding, Lei Hu |
Kipnis-Shamir Attack on HFE Revisited. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
MinRank, relinearization, Gröbner basis, multivariate public key cryptosystem, XL algorithm, HFE |
13 | Tim Güneysu, Christof Paar, Jan Pelzl |
Attacking elliptic curve cryptosystems with special-purpose hardware. |
FPGA |
2007 |
DBLP DOI BibTeX RDF |
Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm |
13 | Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee |
Eta Pairing Computation on General Divisors over Hyperelliptic Curves y2 = x7-x+/-1. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
Eta pairing, divisors, Tate pairing, hyperelliptic curves, resultant, pairing-based cryptosystem |
13 | Nick A. Moldovyan |
New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. |
IF&GIS |
2007 |
DBLP DOI BibTeX RDF |
public encryption, Digital signature, public key cryptosystem, key agreement protocol |
13 | Erik Dahmen, Katsuyuki Okeya, Daniel Schepers |
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
affine coordinates, elliptic curve cryptosystem, scalar multiplication, precomputation |
13 | Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka |
Efficient Implementation of the Pairing on Mobilephones Using BREW. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Mobilephone, Efficient Implementation, Pairing Based Cryptosystem, BREW |
13 | Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi 0001 |
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Elliptic curves, Pairing based cryptosystem |
13 | Hung-Yu Chien |
ID-Based Key Agreement with Anonymity for Ad Hoc Networks. |
EUC |
2007 |
DBLP DOI BibTeX RDF |
ad hoc networks, anonymity, bilinear pairing, key agreement, identity-based cryptosystem |
13 | Bangju Wang, Huanguo Zhang, Zhang-yi Wang, Yuhua Wang |
Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers. |
MCAM |
2007 |
DBLP DOI BibTeX RDF |
signed binary representation (SBR), elliptic curve cryptosystems (ECC), public key cryptosystem, scalar multiplication |
13 | Gilbert Baumslag, Benjamin Fine, Xiaowei Xu |
Cryptosystems using Linear Groups. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Free group, Linear group, Modular group, Reidemeister-Schreier Process, Cryptosystem |
13 | Ben Adida, Ronald L. Rivest |
Scratch & vote: self-contained paper-based cryptographic voting. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
cryptographic voting, homomorphic tallying, paillier cryptosystem, paper ballot, scratch surface, barcode |
13 | Colin D. Walter, David Samyde |
Data Dependent Power Use in Multipliers. |
IEEE Symposium on Computer Arithmetic |
2005 |
DBLP DOI BibTeX RDF |
EMA, smart card, Differential power analysis, DPA, multiplication, multiplier, RSA cryptosystem |
13 | Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto |
A Proposal of Short Proxy Signature using Pairing. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
general hash function, bilinear pairing, elliptic curve cryptosystem, proxy signature, short signature |
13 | Bob Blakley 0001, G. R. Blakley |
All sail, no anchor II: Acceptable high-end PKI. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation |
13 | Antoine Joux |
A One Round Protocol for Tripartite Diffie-Hellman. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve, Key exchange, Discrete logarithm, Pairing, Cryptosystem |
13 | Paulo S. L. M. Barreto, Ben Lynn, Michael Scott |
Efficient Implementation of Pairing-Based Cryptosystems. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve construction, Tate pairing, Efficient implementation, Pairing-based cryptosystem |
13 | Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo |
Fast Parallel Molecular Algorithms for DNA-based Computation: Factoring Integers. |
BIBE |
2004 |
DBLP DOI BibTeX RDF |
Biological Parallel Computing, DNA-based Supercomputing, the RSA Public-key cryptosystem |
13 | Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 |
PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM |
13 | Paul Camion, Hervé Chabanne |
On the Powerline System. |
Appl. Algebra Eng. Commun. Comput. |
1999 |
DBLP DOI BibTeX RDF |
Chor-Rivest, Powerline, Fractional Powerline, Quadratic Fractional Power System, Berlekamp-Massey, RSA, Identification, Public Key Cryptosystem (PKC), Knapsack |
13 | Colin D. Walter |
Exponentiation Using Division Chains. |
IEEE Trans. Computers |
1998 |
DBLP DOI BibTeX RDF |
bit recoding, m-ary method, mixed basis arithmetic, radix representation, Modular exponentiation, RSA cryptosystem, addition chains |
13 | Naofumi Takagi |
A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation. |
IEEE Trans. Computers |
1992 |
DBLP DOI BibTeX RDF |
division subtraction, radix-4 modular multiplication hardware algorithm, residue calculation, repeated multiply-add, serial-parallel modular multiplier, cellular array structure, VLSI, cryptography, digital arithmetic, public-key cryptosystems, modular exponentiation, RSA cryptosystem, redundant representation, bit slice |
13 | Subhrajyoti Deb, Abhilash Kumar Das, Nirmalya Kar |
An Applied Image Cryptosystem on Moore's Automaton Operating on δ (qk)/2. |
ACM Trans. Multim. Comput. Commun. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Malik Obaid Ul Islam, Shabir A. Parah |
Fast and Lightweight Image Cryptosystem for IoMT Applications. |
Internet Things |
2024 |
DBLP DOI BibTeX RDF |
|
13 | R. Vaishali, S. Manohar Naik |
A DNA Cryptosystem Using Diffie-Hellman Key Exchange. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Thomas Prantl, Lukas Horn, Simon Engel, Lukas Iffländer, Lukas Beierlieb, Christian Krupitzer, André Bauer 0001, Mansi Sakarvadia, Ian T. Foster, Samuel Kounev |
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | |
Retraction Note: Paillier homomorphic cryptosystem with poker shuffling transformation based water marking method for the secured transmission of digital medical images. |
Pers. Ubiquitous Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Cyrius Nugier, Vincent Migliore |
Acceleration of a Classic McEliece Postquantum Cryptosystem With Cache Processing. |
IEEE Micro |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Walid El-Shafai, Fatma Khallaf, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie |
Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services. |
J. Ambient Intell. Humaniz. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ekta Bindal, Abhay Kumar Singh |
Secure and Compact: A New Variant of McEliece Cryptosystem. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wen-Long Chin, Pin-Wei Chen, Shih-Hsiang Chou, Yu-Hua Yang, Pei-Yin Chen, Tao Jiang 0002 |
Cryptosystem for IoT Devices With Feedback Operation Modes Based on Shared Buffer and Unrolled-Pipeline Techniques. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xiaodong Li, Hehe Gao, Jianyi Zhang, Shuya Yang, Xin Jin 0015, Kim-Kwang Raymond Choo |
GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Prabhjot Kaur, Nitin Kumar |
SIFTBCS: scale invariant feature transform based fuzzy vault scheme in biometric cryptosystem. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 2597 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|