|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
ID-Based Ring Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 591-596, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Kevin M. Greenan, Mark W. Storer, Ethan L. Miller, Carlos Maltzahn |
POTSHARDS : Storing Data for the Long-term Without Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: 3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA, pp. 12-20, 2005, IEEE Computer Society, 0-7695-2537-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Data Security, Distributed Storage, Secure Storage, Survivable Storage |
25 | Xixiang Lv, Bo Yang |
Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 1092-1097, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yinian Mao, Min Wu 0001 |
Security evaluation for communication-friendly encryption of multimedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the 2004 International Conference on Image Processing, ICIP 2004, Singapore, October 24-27, 2004, pp. 569-572, 2004, IEEE, 0-7803-8554-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Rakesh Agrawal 0001, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu |
Order-Preserving Encryption for Numeric Data. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004, pp. 563-574, 2004, ACM, 1-58113-859-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Eric J. Swankoski, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin |
A Parallel Architecture for Secure FPGA Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), CD-ROM / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, USA, 2004, IEEE Computer Society, 0-7695-2132-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar |
A Provably Secure Elliptic Curve Scheme with Fast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 245-259, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Shiguo Lian, Jinsheng Sun, Zhongxin Li, Zhiquan Wang |
A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP ![In: Neural Information Processing, 11th International Conference, ICONIP 2004, Calcutta, India, November 22-25, 2004, Proceedings, pp. 720-725, 2004, Springer, 3-540-23931-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Peeter Laud, Ricardo Corin |
Sound Computational Interpretation of Formal Encryption with Composed Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 55-66, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni |
Broadcast Encryption's Bright Future. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(8), pp. 57-63, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Chanathip Namprempre |
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 515-532, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Christian Geuer-Pollmann |
XML pool encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, pp. 1-9, 2002, ACM, 1-58113-632-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Jee Hea An, Yevgeniy Dodis, Tal Rabin |
On the Security of Joint Signature and Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 83-107, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2002), 6-8 November 2002, Vancouver, BC, Canada, Proceedings, pp. 51-59, 2002, IEEE Computer Society, 0-7695-1831-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Masayuki Abe |
Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 277-289, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Adrian Baldwin, Simon Shiu |
Encryption and Key management in a SAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002, pp. 35-44, 2002, IEEE Computer Society, 0-7695-1888-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Scott R. Fluhrer, Stefan Lucks |
Analysis of the E0 Encryption System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 38-48, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval |
Key-Privacy in Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 566-582, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Jee Hea An, Mihir Bellare |
Does Encryption with Redundancy Provide Authenticity? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 512-528, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Ivan Damgård, Jesper Buus Nielsen |
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 432-450, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Helena Handschuh, Serge Vaudenay |
A Universal Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, pp. 1-12, 1999, Springer, 3-540-67185-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Xiaolin Wu 0001, Peter W. Moo |
Joint Image/Video Compression and Encryption via High-Order Conditional Entropy Coding of Wavelet Coefficients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 2 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume II, pp. 908-912, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Image and video compression, multimedia security |
25 | Stefan Lucks |
Accelerated Remotely Keyed Encruption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 112-123, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky |
Deniable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 90-104, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
25 | George Anastasios Spanos, Tracy Bradley Maples |
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 2, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Multimedia, Network Security, ATM Networks, MPEG, Video Compression, Real-Time Video |
25 | Ludek Kucera |
A Generalized Encryption Scheme Based on Random Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WG ![In: 17th International Workshop, WG '91, Fischbachau, Germany, June 17-19, 1991, Proceedings, pp. 180-186, 1991, Springer, 3-540-55121-2. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
25 | Ruth Nelson, John H. Heimann |
SDNS Architecture and End-to-End Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 356-366, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
25 | Eiji Okamoto |
Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pp. 361-373, 1988, Springer, 3-540-50251-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
25 | Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing |
Provably secure and efficient bounded ciphertext policy attribute based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 343-352, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute based encryption |
25 | Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
Conditional proxy re-encryption secure against chosen-ciphertext attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 322-332, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security |
25 | Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri |
Image Encryption Using Chaotic Signal and Max-Heap Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 19-28, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Max-Heap Tree, Chaotic Signal, Image Encryption |
25 | Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung |
A New Randomness Extraction Paradigm for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 590-609, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction |
25 | Wei Lu, Zheng-an Yao |
Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 5th International Conference, ADMA 2009, Beijing, China, August 17-19, 2009. Proceedings, pp. 246-252, 2009, Springer, 978-3-642-03347-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Random Isomap reduction, encryption, nearest neighbor, geodesic distance, sensitive information |
25 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar |
Identity-based encryption with efficient revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 417-426, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provable security, revocation, identity-based encryption |
25 | Mahabir Prasad Jhanwar, Rana Barua |
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 314-331, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption |
25 | Piyi Yang, Zhenfu Cao, Xiaolei Dong |
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 201-216, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack |
25 | Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 733-740, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
guardian proxy, insubvertible encryption, RFID |
25 | Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang |
Traceable and Retrievable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 94-110, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PKG, Trust, Retrievability, Traceability, Identity-based Encryption |
25 | R. Aparna, B. B. Amberker |
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 348-353, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key |
25 | Lantian Zheng, Andrew C. Myers |
Securing nonintrusive web encryption through information flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, Tucson, AZ, USA, June 8, 2008, pp. 125-134, 2008, ACM, 978-1-59593-936-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
encryption, type system, information flow control |
25 | Alexander W. Dent, Benoît Libert, Kenneth G. Paterson |
Certificateless Encryption Schemes Strongly Secure in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 344-359, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
strong security, standard model, certificateless encryption |
25 | Benoît Libert, Damien Vergnaud |
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 360-379, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption |
25 | Christos Strydis, Di Zhu, Georgi Gaydadjiev |
Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conf. Computing Frontiers ![In: Proceedings of the 5th Conference on Computing Frontiers, 2008, Ischia, Italy, May 5-7, 2008, pp. 231-240, 2008, ACM, 978-1-60558-077-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
implantable devices, microarchitectural profiling, symmetric encryption, ultra-low power |
25 | Jong Hwan Park, Dong Hoon Lee 0001 |
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 101-115, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Public Key Broadcast Encryption, Full Collusion-Security |
25 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 203-220, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
threshold key-insulation, standard model, identity-based encryption, key-exposure |
25 | Zong Wang, Tughrul Arslan, Ahmet T. Erdogan |
Implementation of Hardware Encryption Engine for Wireless Communication on a Reconfigurable Instruction Cell Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DELTA ![In: 4th IEEE International Symposium on Electronic Design, Test and Applications, DELTA 2008, Hong Kong, January 23-25, 2008, pp. 148-152, 2008, IEEE Computer Society, 978-0-7695-3110-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hardware Encryption, RICA, AES, RC4 |
25 | Seny Kamara, Jonathan Katz |
How to Encrypt with a Malicious Random Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 303-315, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Private-key encryption, random number generation |
25 | Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
New constructions of fuzzy identity-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 368-370, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
efficient constructions, fuzzy identity-based encryption |
25 | Chunxiang Gu, Yuefei Zhu, Heng Pan |
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 372-383, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
provable secure, keyword search, public key encryption, pairings |
25 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 392-406, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ID-based Encryption, Pairing |
25 | Yang Ou, Chul Sur, Kyung Hyune Rhee |
Region-Based Selective Encryption for Medical Imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FAW ![In: Frontiers in Algorithmics, First Annual International Workshop, FAW 2007, Lanzhou, China, August 1-3, 2007, Proceedings, pp. 62-73, 2007, Springer, 978-3-540-73813-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Bit Flipping, Quality Layer Organization, Medical Imaging, Region of Interest, Selective Encryption |
25 | Hakjae Kim, Sungju Lee, Daesung Moon, Yongwha Chung |
Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (3) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, Third International Conference on Intelligent Computing, ICIC 2007, Qingdao, China, August 21-24, 2007. Proceedings, pp. 858-867, 2007, Springer, 978-3-540-74281-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Biometrics/Fingerprint, Data Hiding/Fingerprinting, Encryption |
25 | Guilhem Castagnos, Benoît Chevallier-Mames |
Towards a DL-Based Additively Homomorphic Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 362-375, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model |
25 | Zhen Liu, Lifeng Xi |
Image Information Hiding Encryption Using Chaotic Sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 202-208, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
wavelet transform, Information hiding, encryption algorithm, chaotic sequence |
25 | Gannan Yuan, Fuyou Wang, Yanling Hao |
Research on Data Encryption Technology Based on Chaos Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 93-98, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data encryption, Power spectrum, Logistic model, Lyapunov exponent |
25 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Fragmentation and Encryption to Enforce Privacy in Data Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 171-186, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy, encryption, fragmentation |
25 | Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III |
Public Key Encryption That Allows PIR Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 50-67, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data |
25 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A practical revocation scheme for broadcast encryption using smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(3), pp. 325-351, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart cards, Broadcast encryption |
25 | Dirk Westhoff, Joao Girão, Mithun Acharya |
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(10), pp. 1417-1431, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
robustness and reliability, Wireless sensor networks, data aggregation, key predistribution, data encryption, privacy homomorphism |
25 | Kai-Chi Leung, Suk-Ling Li, Lee-Ming Cheng, Chi-Kwong Chan |
A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Process. Lett. ![In: Neural Process. Lett. 24(2), pp. 93-105, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
virtual attractors, neural network, cryptography, encryption, Hopfield network |
25 | Stéphanie Delaune, Florent Jacquemard |
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 36(1-2), pp. 85-124, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption |
25 | Chuanfu Chen, Zhiqiang Wu 0002, Laichu Tang, Congjing Ran |
Encryption and Program Realization of Information Resources in DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE Workshops ![In: Web Information Systems - WISE 2006 Workshops, WISE 2006 International Workshops, Wuhan, China, October 23-26, 2006, Proceedings, pp. 251-258, 2006, Springer, 3-540-47663-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Encryption, RSA, Copyright Protection, DRM, DES, Information Resources |
25 | Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi |
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 309-324, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code |
25 | Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna |
A Partial Image Encryption Method with Pseudo Random Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 315-325, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Partial encryption, Residual intelligence, Pseudo random sequence |
25 | Benoît Libert, Jean-Jacques Quisquater |
On Constructing Certificateless Cryptosystems from Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 474-490, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
provable security, bilinear maps, Certificateless encryption |
25 | Haiqing Hu, Peijun Xue, Haiyan Fu |
S-Rough Recognition of Knowledge and General Threshold Encryption Authentication Scheme of Recognition Conclusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (1) ![In: Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), October 16-18, 2006, Jinan, China, pp. 816-824, 2006, IEEE Computer Society, 0-7695-2528-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
S-rough sets, S-rough recognition, composition structure, threshold encryption authentication, algorithm |
25 | Kiyoshi Yanagimoto, Takaaki Hasegawa, Makoto Takano |
A New Encoding Approach Realizing High Security and High Performance Based on Double Common Encryption Using Static Keys and Dynamic Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006, Proceedings, pp. 293-301, 2006, Springer, 3-540-45776-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Common key encryption, Security, Network security, Database security |
25 | Xiping He, Qingsheng Zhu, Ping Gu |
A New Chaos-Based Encryption Method for Color Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings, pp. 671-678, 2006, Springer, 3-540-36297-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ergodic matrix, encryption, attack, diffusion, S-box, confusion, Chaotic map |
25 | Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto |
Universally Composable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 337-353, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IND-ID-CCA2, universal composition, identity-based encryption |
25 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 290-303, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
25 | Fuwen Liu, Hartmut König |
A novel encryption algorithm for high resolution video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 15th International Workshop, NOSSDAV 2005, Stevenson, Washington, USA, June 13-14, 2005, Proceedings, pp. 69-74, 2005, ACM, 1-58113-987-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multimedia com-munication, real-time video encryption, video compression, data security |
25 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 258-276, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators |
25 | Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang |
Secure Multicast Using Proxy Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 280-290, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multicast key management, cipher sequences, proxy encryption, ElGamal cryptosystem, Secure multicast |
25 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(2), pp. 206-241, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, Authenticated encryption, security proofs |
25 | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik |
Brief announcement: secret handshakes from CA-oblivious encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, PODC 2004, St. John's, Newfoundland, Canada, July 25-28, 2004, pp. 394, 2004, ACM, 1-58113-802-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, authentication, anonymity, encryption |
25 | Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim |
Efficient Broadcast Encryption Using Multiple Interpolation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 87-103, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
interpolation, partition, Broadcast encryption |
25 | Swee-Huay Heng, Kaoru Kurosawa |
k-Resilient Identity-Based Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 67-80, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption |
25 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 375-387, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
system overheads trade-off, one-way mapping, key management, broadcast encryption, pseudorandom number generators, erasure channels |
25 | Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, Johannes Wolkerstorfer |
Efficient AES Implementations on ASICs and FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Conference ![In: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, pp. 98-112, 2004, Springer, 3-540-26557-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
FPGA, Advanced Encryption Standard (AES), ASIC |
25 | Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 |
The EAX Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 389-407, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC |
25 | Dimitrios Simitopoulos, Nikolaos Zissis, Panagiotis Georgiadis 0002, Vasileios Emmanouilidis, Michael G. Strintzis |
Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 9(3), pp. 217-227, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
DVD copy protection, Watermarking, Encryption, Copyright protection |
25 | Apostolos Dollas, Christopher Kachris, Nikolaos G. Bourbakis |
Performance Analysis of Fixed, Reconfigurable, and Custom Architectures for the SCAN Image and Video Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 11th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2003), 8-11 April 2003, Napa, CA, USA, Proceedings, pp. 19-, 2003, IEEE Computer Society, 0-7695-1979-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
FPGA, Architecture, Reconfigurable, Encryption |
25 | Eonkyung Lee, Je Hong Park |
Cryptanalysis of the Public-Key Encryption Based on Braid Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 477-490, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Burau representation, Cryptanalysis, Public-key encryption, Braid group |
25 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 255-271, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure |
25 | Tomoyuki Asano |
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 317-332, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
stateless receiver, master key, subset difference, key management, digital rights management, revocation, broadcast encryption |
25 | Xiaofeng Chen 0001, Byoungcheon Lee, Kwangjo Kim |
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 259-273, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bid-rigging, Receipt-free, Auction, Homomorphic encryption |
25 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 1-11, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, authenticated encryption, security proofs, SSH |
25 | Takeshi Imamura, Andy Clark, Hiroshi Maruyama |
A stream-based implementation of XML encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, pp. 11-17, 2002, ACM, 1-58113-632-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
stream-based processing, XML, encryption |
25 | Thomas Pornin |
Transparent Harddisk Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 273-285, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
bitslice, harddisk, mobile computing, encryption |
25 | Lars R. Knudsen, Willi Meier |
Correlations in RC6 with a Reduced Number of Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 94-108, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6 |
25 | Giuseppe Ateniese |
Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '99, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1-4, 1999., pp. 138-146, 1999, ACM, 1-58113-148-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
contract signing problem, digital signatures, public-key cryptography, fair exchange, proof of knowledge, verifiable encryption |
25 | Douglas R. Stinson, Ruizhong Wei |
Key Preassigned Traceability Schemes for Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 144-156, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
key preassigned scheme, traceability, broadcast encryption, secret sharing schemes, combinatorial designs |
25 | Matt Blaze, Joan Feigenbaum, Moni Naor |
A Formal Treatment of Remotely Keyed Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 251-265, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Remotely Keyed Encryption, Smart-cards, Block Ciphers, Pseudorandomness, Session Keys |
25 | Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway |
Relations Among Notions of Security for Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 26-45, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness |
25 | Manuel Blum 0001, Shafi Goldwasser |
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pp. 289-302, 1984, Springer, 3-540-15658-5. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
chosen cyphertext attack, integer factorization, partial information, probabilistic encryption, passive adversaries |
25 | George I. Davida, David L. Wells, John B. Kam |
A Database Encryption System with Subkeys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 6(2), pp. 312-328, 1981. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
subkeys, databases, encryption, data security, decryption |
25 | Hua Guo, Xiyong Zhang, Yi Mu 0001, Zhoujun Li 0001 |
An Efficient Certificateless Encryption Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 302-309, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Encryption, Standard Model, Certificateless Encryption |
25 | Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan 0001 |
The Relationship between Public Key Encryption and Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA, pp. 325-335, 2000, IEEE Computer Society, 0-7695-0850-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
trapdoor predicates, cryptography, protocols, protocols, public key cryptography, key agreement, public key encryption, public-key encryption, oblivious transfer, secure multi-party computation, primitives, black-box reductions, trapdoor permutations |
25 | John B. Kam, George I. Davida |
Structured Design of Substitution-Permutation Encryption Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 28(10), pp. 747-753, 1979. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
substitution-permutation (SP) networks, Complete SP networks, encryption, data security, data encryption standard |
24 | Bruce Schneier, Doug Whiting |
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 242-259, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 21739 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|