The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Laila El Aimani On Generic Constructions of Designated Confirmer Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Designated Confirmer signatures, Reduction/meta-reduction, Zero Knowledge, Generic construction
24Rakesh Nayak, C. V. Sastry, Jayaram Pradhan A matrix formulation for NTRU cryptosystem. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Whitfield Diffie Cryptography: Past, Present and Future. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Afshin Akhshani, Hadi Mahmodi, Amir Akhavan A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly Secrecy, flagging, and paranoia: adoption criteria in encrypted email. Search on Bibsonomy CHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted e-mail, extended case method, security, activism
24Yong Geun Won, Tae Meon Bae, Yong Man Ro Scalable Protection and Access Control in Full Scalable Video Coding. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Dan Boneh, Eu-Jin Goh, Kobbi Nissim Evaluating 2-DNF Formulas on Ciphertexts. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Creighton T. R. Hager, Scott F. Midkiff, Jung-Min Park 0001, Thomas L. Martin Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Alexandra Boldyreva, Marc Fischlin Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24P. Moore, Máire McLoone, Sakir Sezer Reconfigurable Instruction Interface Architecture for Private-Key Cryptography on the Altera Nios-II Processor. Search on Bibsonomy AICT/SAPIR/ELETE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Ryotaro Hayashi 0001, Tatsuaki Okamoto, Keisuke Tanaka An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Rui Zhang 0002, Hideki Imai Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Praveen Dongara, T. N. Vijaykumar Accelerating private-key cryptography via multithreading on symmetric multiprocessors. Search on Bibsonomy ISPASS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Ramesh Karri, Kaijie Wu 0001, Piyush Mishra, Yongkook Kim Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Mieczyslaw Jessa Data transmission with adjustable security exploiting chaos-based pseudorandom number generators. Search on Bibsonomy ISCAS (3) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier Universal Padding Schemes for RSA. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Probabilistic Signature Scheme, Provable Security
24Stuart Haber, Benny Pinkas Securely combining public-key cryptosystems. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Pascal Paillier Trapdooring Discrete Logarithms on Elliptic Curves over Rings. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Tilo Müller, Andreas Dewald, Felix C. Freiling AESSE: a cold-boot resistant implementation of AES. Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cold boot attacks, streaming SIMD extensions, advanced encryption standard, Linux kernel
23Ahmed Y. Mahmoud, Alexander G. Chefranov Hill cipher modification based on eigenvalues HCM-EE. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number
23Pardeep Kumar 0001, Hoon-Jae Lee 0001, Wan-Young Chung A secure ubiquitous sensor network with Dragon. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dragon stream cipher, Telos B sensor mote, eSTREAM's project, authenticated encryption, sensor network security
23Daniele Micciancio, Saurabh Panjwani Optimal communication complexity of generic multicast key distribution. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF nested encryption, security, multicast, lower bounds, secret sharing, key distribution
23Cory Altheide, Claudio Merloni, Stefano Zanero A methodology for the repeatable forensic analysis of encrypted drives. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF whole disk encryption, computer forensics, cybercrime, data recovery
23Arshad Noor Securing the core with an Enterprise Key Management Infrastructure (EKMI). Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XML encryption (XENC), XML signature (DSIG), enterprise key management infrastructure (EKMI), symmetric key client library (SKCL), symmetric key management system (SKMS), symmetric key services (SKS), symmetric key services markup language (SKSML), key-management (KM), public key infrastructure (PKI)
23Shammi Didla, Aaron Ault, Saurabh Bagchi Optimizing AES for embedded devices and wireless sensor networks. Search on Bibsonomy TRIDENTCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CC2420, Zigbee security, embedded optimizations, secure sensor networks, encryption, AES, MSP430
23Mark W. Storer, Kevin M. Greenan, Darrell D. E. Long, Ethan L. Miller Secure data deduplication. Search on Bibsonomy StorageSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF single-instance storage, optimization, cryptography, encryption, capacity, deduplication, secure storage
23ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng Constructing parallel long-message signcryption scheme from trapdoor permutation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel, signcryption, authenticated encryption, trapdoor permutations
23Feng-Cheng Chang, Hsiang-Cheh Huang, Hsueh-Ming Hang Layered Access Control Schemes on Watermarked Scalable Media. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, watermarking, encryption, scalable coding
23Nick A. Moldovyan New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF public encryption, Digital signature, public key cryptosystem, key agreement protocol
23Ryotaro Hayashi 0001, Keisuke Tanaka Anonymity on Paillier's Trap-Door Permutation. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paillier’s function, Paillier’s trap-door permutation, anonymity, encryption, key-privacy
23Alireza Hodjat, Ingrid Verbauwhede Area-Throughput Trade-Offs for Fully Pipelined 30 to 70 Gbits/s AES Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF crypto-processor, security, VLSI, cryptography, Advanced Encryption Standard (AES), ASIC, hardware architectures
23Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Opportunistic, Security, Optimization, Wireless, Encryption, Tradeoff
23Marion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security Games, Computational Soundness of Formal Methods, Provable Security, Probabilistic Encryption
23Xavier Boyen, Qixiang Mei, Brent Waters Direct chosen ciphertext security from identity-based techniques. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identity-based encryption, chosen ciphertext security
23Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky Sufficient Conditions for Collision-Resistant Hashing. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF private information-retrieval, homomorphic encryption, Collision-resistant hash functions
23Stefan Tillich, Johann Großschädl, Alexander Szekely An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF 32-bit implementation, cache-based side-channel analysis, Advanced Encryption Standard, S-box, instruction set extensions
23Ryotaro Hayashi 0001, Keisuke Tanaka The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF undeniable and confirmer signature, anonymity, encryption, RSA, ring signature
23Stefan Tillich, Johann Großschädl Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF 32-bit implementation, software acceleration, Advanced Encryption Standard, Rijndael, instruction set extensions
23Tim Good, Mohammed Benaissa AES on FPGA from the Fastest to the Smallest. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low area, Application Specific Instruction Processor (ASIP), Field Programmable Gate Array (FPGA), pipelined, Advanced Encryption Standard (AES), finite field, high throughput, design exploration
23Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon Security Analysis of Two Signcryption Schemes. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF digital signature, encryption, Signcryption
23Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä A fully pipelined memoryless 17.8 Gbps AES-128 encryptor. Search on Bibsonomy FPGA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, pipelining, advanced encryption standard (AES)
23Xuhua Ding, Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mediated RSA, revocation, Identity-based encryption
23Jakob Jonsson On the Security of CTR + CBC-MAC. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF AES, modes of operation, authenticated encryption
23Johannes Wolkerstorfer, Elisabeth Oswald, Mario Lamberger An ASIC Implementation of the AES SBoxes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF standard-cell design, scalability, Very Large Scale Integration (VLSI), pipelining, Advanced Encryption Standard (AES), Application Specific Integrated Circuit (ASIC), inversion, finite field arithmetic
23Sean Murphy, Matthew J. B. Robshaw Essential Algebraic Structure within the AES. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF (Finite) Galois Field, (Field) Conjugate, Multivariate Quadratic (MQ) Equations, Advanced Encryption Standard, AES, Rijndael, Algebraic Structure, BES
23Patrick Schaumont, Henry Kuo, Ingrid Verbauwhede Unlocking the design secrets of a 2.29 Gb/s Rijndael processor. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF low-power, encryption, Rijndael, domain-specific
23Olivier Baudron, Jacques Stern Non-interactive Private Auctions. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF secure circuit evaluation, Auctions, homomorphic encryption, bidding
23Yuliang Zheng 0001 Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF High Order Residues, RSA, Signature, Public Key Encryption, Signcryption
23Wen-Guey Tzeng, Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF revocation, broadcast encryption, traitor tracing
23Michel Abdalla, Mihir Bellare, Phillip Rogaway The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptographic standards, Diffie-Hellman key exchange, provable security, elliptic curve cryptosystems, generic model, ElGamal encryption
23Máire McLoone, John V. McCanny High Performance Single-Chip FPGA Rijndael Algorithm Implementations. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Encryption, AES, Rijndael, FPGA Implementation
23Rüdiger Weis, Bastiaan Bakker, Stefan Lucks Security on Your Hand: Secure Filesystems with a "Non-Cryptographic" JAVA-Ring. Search on Bibsonomy Java Card Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF i-Button, Remotely Keyed Encryption, tamper proof
23Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer A 155 Mbps Triple-DES Network Encryptor. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DES algorithm, cipher block chaining, true single-phase logic, full-custom design, Network security, pipelining, encryption, Triple-DES
23Victor Boyko On the Security Properties of OAEP as an All-or-Nothing Transform. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF all-or-nothing transforms, encryption modes, polynomial indistinguishability, random oracles, semantic security, exact security, OAEP
23Robert R. Jueneman A High Speed Manipulation Detection Code. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF Manipulation Detection Code (MDC), birthday problem attacks, numeric data processor chip, math coprocessor chip, 8087, 80287, authentication, cryptography, digital signature, encryption, Message Authentication Code (MAC), IBM PC, checksums
23Jun Wu, Yong-Bin Kim, Minsu Choi Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic
23Rogelio Hasimoto-Beltrán, Edmar Mota-Garcia Real-Time Secure Multimedia Communication System Based on Chaos Theory. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Discrete chaotic encryption, Block ciphers, symmetric encryption
23Zhaoyu Liu, Dichao Peng, Yuliang Zheng 0001, Jeffrey Liu Communication Protection in IP-based Video Surveillance Systems. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF real-time video stream, randomly adjustable encryption, security, stream cipher, encryption, video surveillance, pseudo random number generator
23Michael J. Wiener The Full Cost of Cryptanalytic Attacks. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Parallel collision search, Double encryption, Triple encryption, Cryptanalysis, Factoring, Discrete logarithm, Number field sieve, Meet-in-the-middle attack, Hash collision
23Wenjun Zeng, Shawmin Lei Efficient frequency domain video scrambling for content access control. Search on Bibsonomy ACM Multimedia (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF content access control, multimedia commerce, multimedia encryption, video scrambling, compression, multimedia security, selective encryption
23Tetsu Iwata, Kan Yasuda HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SIV, Universal hash function, security proof, counter mode
23Rui Zhang 0002, Hideki Imai Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23 Data Encryption Standard (DES) and Advanced Encryption Standard (AES). Search on Bibsonomy Encyclopedia of Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Nadia Nedjah, Luiza de Macedo Mourelle A Versatile Pipelined Hardware Implementation for Encryption and Decryption Using Advanced Encryption Standard. Search on Bibsonomy VECPAR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF padding oracle, CBC-mode, side channel, ISO standards
23François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations
23Stefan Lucks Attacking Triple Encryption. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23 Advanced Encryption Standard. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21Dominik Engel, Thomas Stütz, Andreas Uhl A survey on JPEG2000 encryption. Search on Bibsonomy Multim. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ralf Küsters, Max Tuengerthal Computational soundness for key exchange protocols with symmetric encryption. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF simulation-based security, cryptographic protocols, computational soundness
21Raphael C.-W. Phan, Serge Vaudenay On the Impossibility of Strong Encryption Over . Search on Bibsonomy IWCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Juan Li, Yong Feng 0001, Xuqiang Yang An Improved Image Encryption Scheme Based on Line Maps. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Yichun Zhang, Jinliang Wan Transmission Performance Simulation of Broadcast Encryption Schemes with Pay-TV System Implementation Consideration. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Joseph K. Liu, Jianying Zhou 0001 An Efficient Identity-Based Online/Offline Encryption Scheme. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Thomas H. Morris, V. S. S. Nair Encryption Key Protection for Private Computing on Public Platforms. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Jesús Lázaro 0001, Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Compact CCA-Secure Encryption for Messages of Arbitrary Length. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Jun Shao, Zhenfu Cao CCA-Secure Proxy Re-encryption without Pairings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance
21Craig Gentry, Brent Waters Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HAS-160, differential cryptanalysis, related-key rectangle attack
21Muxin Zhou, Zhenfu Cao Spatial Encryption under Simpler Assumption. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Liming Fang 0001, Willy Susilo, Jiandong Wang Anonymous Conditional Proxy Re-encryption without Random Oracle. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran 0001 Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo, Mohan S. Kankanhalli On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. Search on Bibsonomy PSIVT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Tae H. Oh, Sumita Mishra, Yin Pan Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool. Search on Bibsonomy SIGITE Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF haipe, modeling and simulation., security, opnet
21Yunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai A New Image Encryption Algorithm Based on Multiple Chaos System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Qiang Tang 0001, Pieter H. Hartel, Willem Jonker Inter-domain Identity-Based Proxy Re-encryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 Further Observations on Certificateless Public Key Encryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Xi Chen 0068, Robert P. Dick, Alok N. Choudhary Operating System Controlled Processor-Memory Bus Encryption. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Elaine Shi, Brent Waters Delegating Capabilities in Predicate Encryption Systems. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Joonsang Baek, Jianying Zhou 0001, Feng Bao 0001 Generic Constructions of Stateful Public Key Encryption and Their Applications. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Marek Klonowski, Miroslaw Kutylowski, Anna Lauks Repelling Detour Attack Against Onions with Re-encryption. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Zhongren Liu, Li Xu 0002, Zhide Chen, Yi Mu 0001, Fuchun Guo Hierarchical Identity-Based Online/Offline Encryption. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Shanqing Guo, Chunhua Zhang Identity-based Broadcast Encryption Scheme with Untrusted PKG. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Chong Fu, Zhiliang Zhu 0001 A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Lijie Yin, Jinhui Zhao, Yan Duan Encryption Scheme for Remote Sensing Images Based on EZW and Chaos. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21A. Anil Kumar, Anamitra Makur Distributed source coding based encryption and lossless compression of gray scale and color images. Search on Bibsonomy MMSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Dan Boneh, Michael Hamburg Generalized Identity Based and Broadcast Encryption Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 21739 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license