|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Laila El Aimani |
On Generic Constructions of Designated Confirmer Signatures. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Designated Confirmer signatures, Reduction/meta-reduction, Zero Knowledge, Generic construction |
24 | Rakesh Nayak, C. V. Sastry, Jayaram Pradhan |
A matrix formulation for NTRU cryptosystem. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Whitfield Diffie |
Cryptography: Past, Present and Future. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Afshin Akhshani, Hadi Mahmodi, Amir Akhavan |
A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly |
Secrecy, flagging, and paranoia: adoption criteria in encrypted email. |
CHI |
2006 |
DBLP DOI BibTeX RDF |
encrypted e-mail, extended case method, security, activism |
24 | Yong Geun Won, Tae Meon Bae, Yong Man Ro |
Scalable Protection and Access Control in Full Scalable Video Coding. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Dan Boneh, Eu-Jin Goh, Kobbi Nissim |
Evaluating 2-DNF Formulas on Ciphertexts. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Creighton T. R. Hager, Scott F. Midkiff, Jung-Min Park 0001, Thomas L. Martin |
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. |
PerCom |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Alexandra Boldyreva, Marc Fischlin |
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
24 | P. Moore, Máire McLoone, Sakir Sezer |
Reconfigurable Instruction Interface Architecture for Private-Key Cryptography on the Altera Nios-II Processor. |
AICT/SAPIR/ELETE |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Ryotaro Hayashi 0001, Tatsuaki Okamoto, Keisuke Tanaka |
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Rui Zhang 0002, Hideki Imai |
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Praveen Dongara, T. N. Vijaykumar |
Accelerating private-key cryptography via multithreading on symmetric multiprocessors. |
ISPASS |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Ramesh Karri, Kaijie Wu 0001, Piyush Mishra, Yongkook Kim |
Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Mieczyslaw Jessa |
Data transmission with adjustable security exploiting chaos-based pseudorandom number generators. |
ISCAS (3) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
Universal Padding Schemes for RSA. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Probabilistic Signature Scheme, Provable Security |
24 | Stuart Haber, Benny Pinkas |
Securely combining public-key cryptosystems. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Pascal Paillier |
Trapdooring Discrete Logarithms on Elliptic Curves over Rings. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Tilo Müller, Andreas Dewald, Felix C. Freiling |
AESSE: a cold-boot resistant implementation of AES. |
EUROSEC |
2010 |
DBLP DOI BibTeX RDF |
cold boot attacks, streaming SIMD extensions, advanced encryption standard, Linux kernel |
23 | Ahmed Y. Mahmoud, Alexander G. Chefranov |
Hill cipher modification based on eigenvalues HCM-EE. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number |
23 | Pardeep Kumar 0001, Hoon-Jae Lee 0001, Wan-Young Chung |
A secure ubiquitous sensor network with Dragon. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
Dragon stream cipher, Telos B sensor mote, eSTREAM's project, authenticated encryption, sensor network security |
23 | Daniele Micciancio, Saurabh Panjwani |
Optimal communication complexity of generic multicast key distribution. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
nested encryption, security, multicast, lower bounds, secret sharing, key distribution |
23 | Cory Altheide, Claudio Merloni, Stefano Zanero |
A methodology for the repeatable forensic analysis of encrypted drives. |
EUROSEC |
2008 |
DBLP DOI BibTeX RDF |
whole disk encryption, computer forensics, cybercrime, data recovery |
23 | Arshad Noor |
Securing the core with an Enterprise Key Management Infrastructure (EKMI). |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
XML encryption (XENC), XML signature (DSIG), enterprise key management infrastructure (EKMI), symmetric key client library (SKCL), symmetric key management system (SKMS), symmetric key services (SKS), symmetric key services markup language (SKSML), key-management (KM), public key infrastructure (PKI) |
23 | Shammi Didla, Aaron Ault, Saurabh Bagchi |
Optimizing AES for embedded devices and wireless sensor networks. |
TRIDENTCOM |
2008 |
DBLP DOI BibTeX RDF |
CC2420, Zigbee security, embedded optimizations, secure sensor networks, encryption, AES, MSP430 |
23 | Mark W. Storer, Kevin M. Greenan, Darrell D. E. Long, Ethan L. Miller |
Secure data deduplication. |
StorageSS |
2008 |
DBLP DOI BibTeX RDF |
single-instance storage, optimization, cryptography, encryption, capacity, deduplication, secure storage |
23 | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng |
Constructing parallel long-message signcryption scheme from trapdoor permutation. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
parallel, signcryption, authenticated encryption, trapdoor permutations |
23 | Feng-Cheng Chang, Hsiang-Cheh Huang, Hsueh-Ming Hang |
Layered Access Control Schemes on Watermarked Scalable Media. |
J. VLSI Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
access control, watermarking, encryption, scalable coding |
23 | Nick A. Moldovyan |
New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. |
IF&GIS |
2007 |
DBLP DOI BibTeX RDF |
public encryption, Digital signature, public key cryptosystem, key agreement protocol |
23 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Anonymity on Paillier's Trap-Door Permutation. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Paillier’s function, Paillier’s trap-door permutation, anonymity, encryption, key-privacy |
23 | Alireza Hodjat, Ingrid Verbauwhede |
Area-Throughput Trade-Offs for Fully Pipelined 30 to 70 Gbits/s AES Processors. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
crypto-processor, security, VLSI, cryptography, Advanced Encryption Standard (AES), ASIC, hardware architectures |
23 | Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi |
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Opportunistic, Security, Optimization, Wireless, Encryption, Tradeoff |
23 | Marion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré |
Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
Security Games, Computational Soundness of Formal Methods, Provable Security, Probabilistic Encryption |
23 | Xavier Boyen, Qixiang Mei, Brent Waters |
Direct chosen ciphertext security from identity-based techniques. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
identity-based encryption, chosen ciphertext security |
23 | Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky |
Sufficient Conditions for Collision-Resistant Hashing. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
private information-retrieval, homomorphic encryption, Collision-resistant hash functions |
23 | Stefan Tillich, Johann Großschädl, Alexander Szekely |
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
32-bit implementation, cache-based side-channel analysis, Advanced Encryption Standard, S-box, instruction set extensions |
23 | Ryotaro Hayashi 0001, Keisuke Tanaka |
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
undeniable and confirmer signature, anonymity, encryption, RSA, ring signature |
23 | Stefan Tillich, Johann Großschädl |
Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
32-bit implementation, software acceleration, Advanced Encryption Standard, Rijndael, instruction set extensions |
23 | Tim Good, Mohammed Benaissa |
AES on FPGA from the Fastest to the Smallest. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
low area, Application Specific Instruction Processor (ASIP), Field Programmable Gate Array (FPGA), pipelined, Advanced Encryption Standard (AES), finite field, high throughput, design exploration |
23 | Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon |
Security Analysis of Two Signcryption Schemes. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
digital signature, encryption, Signcryption |
23 | Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä |
A fully pipelined memoryless 17.8 Gbps AES-128 encryptor. |
FPGA |
2003 |
DBLP DOI BibTeX RDF |
FPGA, pipelining, advanced encryption standard (AES) |
23 | Xuhua Ding, Gene Tsudik |
Simple Identity-Based Cryptography with Mediated RSA. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
mediated RSA, revocation, Identity-based encryption |
23 | Jakob Jonsson |
On the Security of CTR + CBC-MAC. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
AES, modes of operation, authenticated encryption |
23 | Johannes Wolkerstorfer, Elisabeth Oswald, Mario Lamberger |
An ASIC Implementation of the AES SBoxes. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
standard-cell design, scalability, Very Large Scale Integration (VLSI), pipelining, Advanced Encryption Standard (AES), Application Specific Integrated Circuit (ASIC), inversion, finite field arithmetic |
23 | Sean Murphy, Matthew J. B. Robshaw |
Essential Algebraic Structure within the AES. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
(Finite) Galois Field, (Field) Conjugate, Multivariate Quadratic (MQ) Equations, Advanced Encryption Standard, AES, Rijndael, Algebraic Structure, BES |
23 | Patrick Schaumont, Henry Kuo, Ingrid Verbauwhede |
Unlocking the design secrets of a 2.29 Gb/s Rijndael processor. |
DAC |
2002 |
DBLP DOI BibTeX RDF |
low-power, encryption, Rijndael, domain-specific |
23 | Olivier Baudron, Jacques Stern |
Non-interactive Private Auctions. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
secure circuit evaluation, Auctions, homomorphic encryption, bidding |
23 | Yuliang Zheng 0001 |
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
High Order Residues, RSA, Signature, Public Key Encryption, Signcryption |
23 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
23 | Michel Abdalla, Mihir Bellare, Phillip Rogaway |
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
Cryptographic standards, Diffie-Hellman key exchange, provable security, elliptic curve cryptosystems, generic model, ElGamal encryption |
23 | Máire McLoone, John V. McCanny |
High Performance Single-Chip FPGA Rijndael Algorithm Implementations. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Encryption, AES, Rijndael, FPGA Implementation |
23 | Rüdiger Weis, Bastiaan Bakker, Stefan Lucks |
Security on Your Hand: Secure Filesystems with a "Non-Cryptographic" JAVA-Ring. |
Java Card Workshop |
2000 |
DBLP DOI BibTeX RDF |
i-Button, Remotely Keyed Encryption, tamper proof |
23 | Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer |
A 155 Mbps Triple-DES Network Encryptor. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
DES algorithm, cipher block chaining, true single-phase logic, full-custom design, Network security, pipelining, encryption, Triple-DES |
23 | Victor Boyko |
On the Security Properties of OAEP as an All-or-Nothing Transform. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
all-or-nothing transforms, encryption modes, polynomial indistinguishability, random oracles, semantic security, exact security, OAEP |
23 | Robert R. Jueneman |
A High Speed Manipulation Detection Code. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
Manipulation Detection Code (MDC), birthday problem attacks, numeric data processor chip, math coprocessor chip, 8087, 80287, authentication, cryptography, digital signature, encryption, Message Authentication Code (MAC), IBM PC, checksums |
23 | Jun Wu, Yong-Bin Kim, Minsu Choi |
Low-power side-channel attack-resistant asynchronous S-box design for AES cryptosystems. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
substitution box, substitution box (S-box), differential power/noise analysis, power/noise measurement, security, advanced encryption standard, advanced encryption standard, side-channel attacks (SCA), null convention logic |
23 | Rogelio Hasimoto-Beltrán, Edmar Mota-Garcia |
Real-Time Secure Multimedia Communication System Based on Chaos Theory. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
Discrete chaotic encryption, Block ciphers, symmetric encryption |
23 | Zhaoyu Liu, Dichao Peng, Yuliang Zheng 0001, Jeffrey Liu |
Communication Protection in IP-based Video Surveillance Systems. |
ISM |
2005 |
DBLP DOI BibTeX RDF |
real-time video stream, randomly adjustable encryption, security, stream cipher, encryption, video surveillance, pseudo random number generator |
23 | Michael J. Wiener |
The Full Cost of Cryptanalytic Attacks. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Parallel collision search, Double encryption, Triple encryption, Cryptanalysis, Factoring, Discrete logarithm, Number field sieve, Meet-in-the-middle attack, Hash collision |
23 | Wenjun Zeng, Shawmin Lei |
Efficient frequency domain video scrambling for content access control. |
ACM Multimedia (1) |
1999 |
DBLP DOI BibTeX RDF |
content access control, multimedia commerce, multimedia encryption, video scrambling, compression, multimedia security, selective encryption |
23 | Tetsu Iwata, Kan Yasuda |
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SIV, Universal hash function, security proof, counter mode |
23 | Rui Zhang 0002, Hideki Imai |
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | |
Data Encryption Standard (DES) and Advanced Encryption Standard (AES). |
Encyclopedia of Multimedia |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Nadia Nedjah, Luiza de Macedo Mourelle |
A Versatile Pipelined Hardware Implementation for Encryption and Decryption Using Advanced Encryption Standard. |
VECPAR |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell |
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
padding oracle, CBC-mode, side channel, ISO standards |
23 | François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations |
23 | Stefan Lucks |
Attacking Triple Encryption. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
23 | |
Advanced Encryption Standard. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Dominik Engel, Thomas Stütz, Andreas Uhl |
A survey on JPEG2000 encryption. |
Multim. Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ralf Küsters, Max Tuengerthal |
Computational soundness for key exchange protocols with symmetric encryption. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
simulation-based security, cryptographic protocols, computational soundness |
21 | Raphael C.-W. Phan, Serge Vaudenay |
On the Impossibility of Strong Encryption Over . |
IWCC |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Juan Li, Yong Feng 0001, Xuqiang Yang |
An Improved Image Encryption Scheme Based on Line Maps. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Yichun Zhang, Jinliang Wan |
Transmission Performance Simulation of Broadcast Encryption Schemes with Pay-TV System Implementation Consideration. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Joseph K. Liu, Jianying Zhou 0001 |
An Efficient Identity-Based Online/Offline Encryption Scheme. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Thomas H. Morris, V. S. S. Nair |
Encryption Key Protection for Private Computing on Public Platforms. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jesús Lázaro 0001, Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga |
AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications. |
ARC |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Compact CCA-Secure Encryption for Messages of Arbitrary Length. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
21 | Craig Gentry, Brent Waters |
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
HAS-160, differential cryptanalysis, related-key rectangle attack |
21 | Muxin Zhou, Zhenfu Cao |
Spatial Encryption under Simpler Assumption. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Liming Fang 0001, Willy Susilo, Jiandong Wang |
Anonymous Conditional Proxy Re-encryption without Random Oracle. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran 0001 |
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou |
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo, Mohan S. Kankanhalli |
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. |
PSIVT |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Tae H. Oh, Sumita Mishra, Yin Pan |
Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool. |
SIGITE Conference |
2009 |
DBLP DOI BibTeX RDF |
haipe, modeling and simulation., security, opnet |
21 | Yunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai |
A New Image Encryption Algorithm Based on Multiple Chaos System. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
Inter-domain Identity-Based Proxy Re-encryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 |
Further Observations on Certificateless Public Key Encryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Xi Chen 0068, Robert P. Dick, Alok N. Choudhary |
Operating System Controlled Processor-Memory Bus Encryption. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Elaine Shi, Brent Waters |
Delegating Capabilities in Predicate Encryption Systems. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Joonsang Baek, Jianying Zhou 0001, Feng Bao 0001 |
Generic Constructions of Stateful Public Key Encryption and Their Applications. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Marek Klonowski, Miroslaw Kutylowski, Anna Lauks |
Repelling Detour Attack Against Onions with Re-encryption. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Zhongren Liu, Li Xu 0002, Zhide Chen, Yi Mu 0001, Fuchun Guo |
Hierarchical Identity-Based Online/Offline Encryption. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Shanqing Guo, Chunhua Zhang |
Identity-based Broadcast Encryption Scheme with Untrusted PKG. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Chong Fu, Zhiliang Zhu 0001 |
A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Lijie Yin, Jinhui Zhao, Yan Duan |
Encryption Scheme for Remote Sensing Images Based on EZW and Chaos. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | A. Anil Kumar, Anamitra Makur |
Distributed source coding based encryption and lossless compression of gray scale and color images. |
MMSP |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Dan Boneh, Michael Hamburg |
Generalized Identity Based and Broadcast Encryption Schemes. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 21739 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|