|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
ID-Based Ring Authenticated Encryption. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Kevin M. Greenan, Mark W. Storer, Ethan L. Miller, Carlos Maltzahn |
POTSHARDS : Storing Data for the Long-term Without Encryption. |
IEEE Security in Storage Workshop |
2005 |
DBLP DOI BibTeX RDF |
Data Security, Distributed Storage, Secure Storage, Survivable Storage |
25 | Xixiang Lv, Bo Yang |
Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yinian Mao, Min Wu 0001 |
Security evaluation for communication-friendly encryption of multimedia. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Rakesh Agrawal 0001, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu |
Order-Preserving Encryption for Numeric Data. (PDF / PS) |
SIGMOD Conference |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Eric J. Swankoski, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin |
A Parallel Architecture for Secure FPGA Symmetric Encryption. |
IPDPS |
2004 |
DBLP DOI BibTeX RDF |
|
25 | David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar |
A Provably Secure Elliptic Curve Scheme with Fast Encryption. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Shiguo Lian, Jinsheng Sun, Zhongxin Li, Zhiquan Wang |
A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network. |
ICONIP |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Peeter Laud, Ricardo Corin |
Sound Computational Interpretation of Formal Encryption with Composed Keys. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni |
Broadcast Encryption's Bright Future. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Chanathip Namprempre |
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Christian Geuer-Pollmann |
XML pool encryption. |
XML Security |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Jee Hea An, Yevgeniy Dodis, Tal Rabin |
On the Security of Joint Signature and Encryption. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard. |
DFT |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Masayuki Abe |
Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Adrian Baldwin, Simon Shiu |
Encryption and Key management in a SAN. |
IEEE Security in Storage Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Scott R. Fluhrer, Stefan Lucks |
Analysis of the E0 Encryption System. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval |
Key-Privacy in Public-Key Encryption. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Jee Hea An, Mihir Bellare |
Does Encryption with Redundancy Provide Authenticity? |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Ivan Damgård, Jesper Buus Nielsen |
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Helena Handschuh, Serge Vaudenay |
A Universal Encryption Standard. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Xiaolin Wu 0001, Peter W. Moo |
Joint Image/Video Compression and Encryption via High-Order Conditional Entropy Coding of Wavelet Coefficients. |
ICMCS, Vol. 2 |
1999 |
DBLP DOI BibTeX RDF |
Image and video compression, multimedia security |
25 | Stefan Lucks |
Accelerated Remotely Keyed Encruption. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky |
Deniable Encryption. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
25 | George Anastasios Spanos, Tracy Bradley Maples |
Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
Multimedia, Network Security, ATM Networks, MPEG, Video Compression, Real-Time Video |
25 | Ludek Kucera |
A Generalized Encryption Scheme Based on Random Graphs. |
WG |
1991 |
DBLP DOI BibTeX RDF |
|
25 | Ruth Nelson, John H. Heimann |
SDNS Architecture and End-to-End Encryption. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
25 | Eiji Okamoto |
Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
25 | Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing |
Provably secure and efficient bounded ciphertext policy attribute based encryption. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute based encryption |
25 | Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
Conditional proxy re-encryption secure against chosen-ciphertext attack. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security |
25 | Fariborz Mahmoudi, Rasul Enayatifar, Mohsen Mirzashaeri |
Image Encryption Using Chaotic Signal and Max-Heap Tree. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Max-Heap Tree, Chaotic Signal, Image Encryption |
25 | Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung |
A New Randomness Extraction Paradigm for Hybrid Encryption. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction |
25 | Wei Lu, Zheng-an Yao |
Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction. |
ADMA |
2009 |
DBLP DOI BibTeX RDF |
Random Isomap reduction, encryption, nearest neighbor, geodesic distance, sensitive information |
25 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar |
Identity-based encryption with efficient revocation. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
provable security, revocation, identity-based encryption |
25 | Mahabir Prasad Jhanwar, Rana Barua |
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption |
25 | Piyi Yang, Zhenfu Cao, Xiaolei Dong |
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack |
25 | Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
guardian proxy, insubvertible encryption, RFID |
25 | Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang |
Traceable and Retrievable Identity-Based Encryption. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
PKG, Trust, Retrievability, Traceability, Identity-based Encryption |
25 | R. Aparna, B. B. Amberker |
Authenticated Secure Group Communication using Broadcast Encryption Key Computation. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key |
25 | Lantian Zheng, Andrew C. Myers |
Securing nonintrusive web encryption through information flow. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
encryption, type system, information flow control |
25 | Alexander W. Dent, Benoît Libert, Kenneth G. Paterson |
Certificateless Encryption Schemes Strongly Secure in the Standard Model. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
strong security, standard model, certificateless encryption |
25 | Benoît Libert, Damien Vergnaud |
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption |
25 | Christos Strydis, Di Zhu, Georgi Gaydadjiev |
Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture. |
Conf. Computing Frontiers |
2008 |
DBLP DOI BibTeX RDF |
implantable devices, microarchitectural profiling, symmetric encryption, ultra-low power |
25 | Jong Hwan Park, Dong Hoon Lee 0001 |
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
Public Key Broadcast Encryption, Full Collusion-Security |
25 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
threshold key-insulation, standard model, identity-based encryption, key-exposure |
25 | Zong Wang, Tughrul Arslan, Ahmet T. Erdogan |
Implementation of Hardware Encryption Engine for Wireless Communication on a Reconfigurable Instruction Cell Architecture. |
DELTA |
2008 |
DBLP DOI BibTeX RDF |
Hardware Encryption, RICA, AES, RC4 |
25 | Seny Kamara, Jonathan Katz |
How to Encrypt with a Malicious Random Number Generator. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Private-key encryption, random number generation |
25 | Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
New constructions of fuzzy identity-based encryption. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
efficient constructions, fuzzy identity-based encryption |
25 | Chunxiang Gu, Yuefei Zhu, Heng Pan |
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
provable secure, keyword search, public key encryption, pairings |
25 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
ID-based Encryption, Pairing |
25 | Yang Ou, Chul Sur, Kyung Hyune Rhee |
Region-Based Selective Encryption for Medical Imaging. |
FAW |
2007 |
DBLP DOI BibTeX RDF |
Bit Flipping, Quality Layer Organization, Medical Imaging, Region of Interest, Selective Encryption |
25 | Hakjae Kim, Sungju Lee, Daesung Moon, Yongwha Chung |
Energy-Efficient Transmissions of Fingerprint Images Using Both Encryption and Fingerprinting Techniques. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Biometrics/Fingerprint, Data Hiding/Fingerprinting, Encryption |
25 | Guilhem Castagnos, Benoît Chevallier-Mames |
Towards a DL-Based Additively Homomorphic Encryption Scheme. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model |
25 | Zhen Liu, Lifeng Xi |
Image Information Hiding Encryption Using Chaotic Sequence. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
wavelet transform, Information hiding, encryption algorithm, chaotic sequence |
25 | Gannan Yuan, Fuyou Wang, Yanling Hao |
Research on Data Encryption Technology Based on Chaos Theory. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
Data encryption, Power spectrum, Logistic model, Lyapunov exponent |
25 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Fragmentation and Encryption to Enforce Privacy in Data Storage. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Privacy, encryption, fragmentation |
25 | Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III |
Public Key Encryption That Allows PIR Queries. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data |
25 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A practical revocation scheme for broadcast encryption using smartcards. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
smart cards, Broadcast encryption |
25 | Dirk Westhoff, Joao Girão, Mithun Acharya |
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
robustness and reliability, Wireless sensor networks, data aggregation, key predistribution, data encryption, privacy homomorphism |
25 | Kai-Chi Leung, Suk-Ling Li, Lee-Ming Cheng, Chi-Kwong Chan |
A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion. |
Neural Process. Lett. |
2006 |
DBLP DOI BibTeX RDF |
virtual attractors, neural network, cryptography, encryption, Hopfield network |
25 | Stéphanie Delaune, Florent Jacquemard |
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. |
J. Autom. Reason. |
2006 |
DBLP DOI BibTeX RDF |
verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption |
25 | Chuanfu Chen, Zhiqiang Wu 0002, Laichu Tang, Congjing Ran |
Encryption and Program Realization of Information Resources in DRM. |
WISE Workshops |
2006 |
DBLP DOI BibTeX RDF |
Encryption, RSA, Copyright Protection, DRM, DES, Information Resources |
25 | Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi |
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code |
25 | Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna |
A Partial Image Encryption Method with Pseudo Random Sequences. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Partial encryption, Residual intelligence, Pseudo random sequence |
25 | Benoît Libert, Jean-Jacques Quisquater |
On Constructing Certificateless Cryptosystems from Identity Based Encryption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
provable security, bilinear maps, Certificateless encryption |
25 | Haiqing Hu, Peijun Xue, Haiyan Fu |
S-Rough Recognition of Knowledge and General Threshold Encryption Authentication Scheme of Recognition Conclusion. |
ISDA (1) |
2006 |
DBLP DOI BibTeX RDF |
S-rough sets, S-rough recognition, composition structure, threshold encryption authentication, algorithm |
25 | Kiyoshi Yanagimoto, Takaaki Hasegawa, Makoto Takano |
A New Encoding Approach Realizing High Security and High Performance Based on Double Common Encryption Using Static Keys and Dynamic Keys. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
Common key encryption, Security, Network security, Database security |
25 | Xiping He, Qingsheng Zhu, Ping Gu |
A New Chaos-Based Encryption Method for Color Image. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
ergodic matrix, encryption, attack, diffusion, S-box, confusion, Chaotic map |
25 | Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto |
Universally Composable Identity-Based Encryption. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
IND-ID-CCA2, universal composition, identity-based encryption |
25 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
25 | Fuwen Liu, Hartmut König |
A novel encryption algorithm for high resolution video. |
NOSSDAV |
2005 |
DBLP DOI BibTeX RDF |
multimedia com-munication, real-time video encryption, video compression, data security |
25 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators |
25 | Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang |
Secure Multicast Using Proxy Encryption. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
multicast key management, cipher sequences, proxy encryption, ElGamal cryptosystem, Secure multicast |
25 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, Authenticated encryption, security proofs |
25 | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik |
Brief announcement: secret handshakes from CA-oblivious encryption. |
PODC |
2004 |
DBLP DOI BibTeX RDF |
privacy, authentication, anonymity, encryption |
25 | Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim |
Efficient Broadcast Encryption Using Multiple Interpolation Methods. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
interpolation, partition, Broadcast encryption |
25 | Swee-Huay Heng, Kaoru Kurosawa |
k-Resilient Identity-Based Encryption in the Standard Model. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption |
25 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
system overheads trade-off, one-way mapping, key management, broadcast encryption, pseudorandom number generators, erasure channels |
25 | Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, Johannes Wolkerstorfer |
Efficient AES Implementations on ASICs and FPGAs. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
FPGA, Advanced Encryption Standard (AES), ASIC |
25 | Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 |
The EAX Mode of Operation. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC |
25 | Dimitrios Simitopoulos, Nikolaos Zissis, Panagiotis Georgiadis 0002, Vasileios Emmanouilidis, Michael G. Strintzis |
Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. |
Multim. Syst. |
2003 |
DBLP DOI BibTeX RDF |
DVD copy protection, Watermarking, Encryption, Copyright protection |
25 | Apostolos Dollas, Christopher Kachris, Nikolaos G. Bourbakis |
Performance Analysis of Fixed, Reconfigurable, and Custom Architectures for the SCAN Image and Video Encryption Algorithm. |
FCCM |
2003 |
DBLP DOI BibTeX RDF |
FPGA, Architecture, Reconfigurable, Encryption |
25 | Eonkyung Lee, Je Hong Park |
Cryptanalysis of the Public-Key Encryption Based on Braid Groups. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Burau representation, Cryptanalysis, Public-key encryption, Braid group |
25 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure |
25 | Tomoyuki Asano |
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
stateless receiver, master key, subset difference, key management, digital rights management, revocation, broadcast encryption |
25 | Xiaofeng Chen 0001, Byoungcheon Lee, Kwangjo Kim |
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Bid-rigging, Receipt-free, Auction, Homomorphic encryption |
25 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, authenticated encryption, security proofs, SSH |
25 | Takeshi Imamura, Andy Clark, Hiroshi Maruyama |
A stream-based implementation of XML encryption. |
XML Security |
2002 |
DBLP DOI BibTeX RDF |
stream-based processing, XML, encryption |
25 | Thomas Pornin |
Transparent Harddisk Encryption. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
bitslice, harddisk, mobile computing, encryption |
25 | Lars R. Knudsen, Willi Meier |
Correlations in RC6 with a Reduced Number of Rounds. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6 |
25 | Giuseppe Ateniese |
Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. |
CCS |
1999 |
DBLP DOI BibTeX RDF |
contract signing problem, digital signatures, public-key cryptography, fair exchange, proof of knowledge, verifiable encryption |
25 | Douglas R. Stinson, Ruizhong Wei |
Key Preassigned Traceability Schemes for Broadcast Encryption. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
key preassigned scheme, traceability, broadcast encryption, secret sharing schemes, combinatorial designs |
25 | Matt Blaze, Joan Feigenbaum, Moni Naor |
A Formal Treatment of Remotely Keyed Encryption. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
Remotely Keyed Encryption, Smart-cards, Block Ciphers, Pseudorandomness, Session Keys |
25 | Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway |
Relations Among Notions of Security for Public-Key Encryption Schemes. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness |
25 | Manuel Blum 0001, Shafi Goldwasser |
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
chosen cyphertext attack, integer factorization, partial information, probabilistic encryption, passive adversaries |
25 | George I. Davida, David L. Wells, John B. Kam |
A Database Encryption System with Subkeys. |
ACM Trans. Database Syst. |
1981 |
DBLP DOI BibTeX RDF |
subkeys, databases, encryption, data security, decryption |
25 | Hua Guo, Xiyong Zhang, Yi Mu 0001, Zhoujun Li 0001 |
An Efficient Certificateless Encryption Scheme in the Standard Model. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Encryption, Standard Model, Certificateless Encryption |
25 | Yael Gertner, Sampath Kannan, Tal Malkin, Omer Reingold, Mahesh Viswanathan 0001 |
The Relationship between Public Key Encryption and Oblivious Transfer. |
FOCS |
2000 |
DBLP DOI BibTeX RDF |
trapdoor predicates, cryptography, protocols, protocols, public key cryptography, key agreement, public key encryption, public-key encryption, oblivious transfer, secure multi-party computation, primitives, black-box reductions, trapdoor permutations |
25 | John B. Kam, George I. Davida |
Structured Design of Substitution-Permutation Encryption Networks. |
IEEE Trans. Computers |
1979 |
DBLP DOI BibTeX RDF |
substitution-permutation (SP) networks, Complete SP networks, encryption, data security, data encryption standard |
24 | Bruce Schneier, Doug Whiting |
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 21739 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|