Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Nick Huggett, Tom Imbo |
Indistinguishability. |
Compendium of Quantum Physics |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Peter Gazi, Ueli Maurer |
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification. |
ICITS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Zongyang Zhang, Zhenfu Cao, Rong Ma |
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge. |
TAMC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Koen de Groot, Emile Kelkboom, Anton H. M. Akkermans |
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem. |
DPM/SETOP |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasizadeh |
Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability. |
Int. J. Netw. Secur. |
2008 |
DBLP BibTeX RDF |
|
17 | Jordi Recasens |
The structure of decomposable indistinguishability operators. |
Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jordi Recasens, Dionís Boixader |
A Map Characterizing the Fuzzy Points and Columns of a T-Indistinguishability Operator. |
Int. J. Uncertain. Fuzziness Knowl. Based Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yu Zhang |
The computational SLR: a logic for reasoning about computational indistinguishability. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
17 | Adem Orsdemir, Oktay Altun, Gaurav Sharma 0001, Mark F. Bocko |
Steganalysis aware steganography: statistical indistinguishability despite high distortion. |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Luis Garmendia, Jordi Recasens |
Finding Close T-indistinguishability Operators to a Given Proximity. |
EUSFLAT Conf. (2) |
2007 |
DBLP BibTeX RDF |
|
17 | Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner |
Indistinguishability Amplification. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Enric Hernández |
Uncertainty and indistinguishability. Application to modelling with words. |
|
2007 |
RDF |
|
17 | Joan Jacas, Jordi Recasens |
Aggregation operators based on indistinguishability operators. |
Int. J. Intell. Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
Concurrent Non-Malleable Witness Indistinguishability and its Applications. |
Electron. Colloquium Comput. Complex. |
2006 |
DBLP BibTeX RDF |
|
17 | Mihir Bellare, Amit Sahai |
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami |
Computational Indistinguishability between Quantum States and Its Cryptographic Application. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Gergei Bana, Payman Mohassel, Till Stegers |
Computational Soundness of Formal Indistinguishability and Static Equivalence. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Ueli Maurer, Krzysztof Pietrzak, Renato Renner |
Indistinguishability Amplification. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
17 | Krzysztof Pietrzak |
Indistinguishability and composition of random systems. |
|
2006 |
RDF |
|
17 | Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh |
Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework |
CoRR |
2005 |
DBLP BibTeX RDF |
|
17 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
17 | Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu |
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
17 | Ariel Cohen 0004, Michael Kaminski, Johann A. Makowsky |
Indistinguishability by Default. |
We Will Show Them! (1) |
2005 |
DBLP BibTeX RDF |
|
17 | Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami |
Computational Indistinguishability Between Quantum States and Its Cryptographic Application. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Adolfo R. de Soto |
Multiresolution Analysis and Fuzzy Indistinguishability Operators: a first approach. |
EUSFLAT Conf. |
2005 |
DBLP BibTeX RDF |
|
17 | Claudi Alsina, Enric Trillas |
Stability, Indistinguishability and Small Numbers. |
EUSFLAT Conf. |
2005 |
DBLP BibTeX RDF |
|
17 | Joan Jacas, Jordi Recasens |
Aggregating with Indistinguishability Operators. |
EUSFLAT Conf. |
2005 |
DBLP BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Indistinguishability in cooperative games. |
EUSFLAT Conf. |
2005 |
DBLP BibTeX RDF |
|
17 | Thomas Santen |
Probabilistic Confidentiality Properties based on Indistinguishability. |
Sicherheit |
2005 |
DBLP BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Indistinguishability relations in Dempster-Shafer theory of evidence. |
Int. J. Approx. Reason. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Neil D. Evans, Michael J. Chappell, Michael J. Chapman, Keith R. Godfrey |
Structural indistinguishability between uncontrolled (autonomous) nonlinear analytic systems. |
Autom. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mustafa Demirci |
Topological properties of the class of generators of an indistinguishability operator. |
Fuzzy Sets Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joan Jacas, Jordi Recasens |
The group of isometries of an indistinguishability operator. |
Fuzzy Sets Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joan Jacas, Jordi Recasens |
Indistinguishability operators generated by fuzzy numbers. |
FUZZ-IEEE |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Konstantinos Georgatos |
On Indistinguishability and Prototypes. |
Log. J. IGPL |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Generating indistinguishability operators from prototypes. |
Int. J. Intell. Syst. |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Frank Höppner, Frank Klawonn, Patrik Eklund |
Learning indistinguishability from data. |
Soft Comput. |
2002 |
DBLP DOI BibTeX RDF |
Equality relations, Alternating optimisation, Fuzzy systems, Function approximation |
17 | Enric Hernández, Jordi Recasens |
A reformulation of entropy in the presence of indistinguishability operators. |
Fuzzy Sets Syst. |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Yodai Watanabe, Junji Shikata, Hideki Imai |
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
17 | Jaap Kamps, Maarten Marx |
Notions of Indistinguishability for Semantic Web Languages. |
ISWC |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Adolfo R. de Soto, Jordi Recasens |
Modelling a linguistic variable as a hierarchical family of partitions induced by an indistinguishability operator. |
Fuzzy Sets Syst. |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Growing decision trees in the presence of indistinguishability: observational decision trees. |
EUSFLAT Conf. |
2001 |
DBLP BibTeX RDF |
|
17 | Joan Jacas, Jordi Recasens |
One-dimensional indistinguishability operators. |
Fuzzy Sets Syst. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Dionís Boixader, Joan Jacas, Jordi Recasens |
The Length and Betweenness Relations of Indistinguishability Operators. |
Int. J. Uncertain. Fuzziness Knowl. Based Syst. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Madhu Sudan 0001 |
Computational Indistinguishability: A Sample Hierarchy. |
J. Comput. Syst. Sci. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Mihir Bellare, Amit Sahai |
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. |
IACR Cryptol. ePrint Arch. |
1999 |
DBLP BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Observational entropy: entropy in the context of indistinguishability operators. |
EUSFLAT-ESTYLF Joint Conf. |
1999 |
DBLP BibTeX RDF |
|
17 | Oded Goldreich 0001, Bernd Meyer 0005 |
Computational Indistinguishability: Algorithms vs. Circuits. |
Theor. Comput. Sci. |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Madhu Sudan 0001 |
Computational Indistinguishability: A Sample Hierarchy |
Electron. Colloquium Comput. Complex. |
1998 |
DBLP BibTeX RDF |
|
17 | Michael J. Horowitz, David L. Neuhoff |
Image coding by perceptual pruning with a cortical snapshot indistinguishability criterion. |
Human Vision and Electronic Imaging |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Moni Naor, Omer Reingold |
From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Madhu Sudan 0001 |
Computational Indistinguishability: A Sample Hierarchy. |
CCC |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Bernard De Baets, Milan Mares, Radko Mesiar |
Fuzzy Zeroes and Indistinguishability of Real Numbers. |
Fuzzy Days |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Michael J. Chapman, Keith R. Godfrey |
Nonlinear compartmental model indistinguishability. |
Autom. |
1996 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Bernd Meyer 0005 |
Computational Indistinguishability - Algorithms vs. Circuits. |
Electron. Colloquium Comput. Complex. |
1996 |
DBLP BibTeX RDF |
|
17 | Gilles Bernot, Michel Bidoit, Teodor Knapik |
Observational Specifications and the Indistinguishability Assumption. |
Theor. Comput. Sci. |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001 |
A Note on Computational Indistinguishability. |
Inf. Process. Lett. |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Kenneth Mark Colby, Franklin Dennis Hilf, Sylvia Weber 0001, Helena C. Kraemer |
Turing-like Indistinguishability Tests for the Calidation of a Computer Simulation of Paranoid Processes. |
Artif. Intell. |
1972 |
DBLP DOI BibTeX RDF |
|
12 | Nicholas J. Hopper, Luis von Ahn, John Langford 0001 |
Provably Secure Steganography. |
IEEE Trans. Computers |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
12 | Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li |
RFID privacy: relation between two notions, minimal condition, and efficient construction. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy, rfid, pseudorandom function |
12 | Jens-Matthias Bohli, Andreas Pashalidis |
Relations Among Privacy Notions. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula |
Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu |
Relationship privacy: output perturbation for queries with joins. |
PODS |
2009 |
DBLP DOI BibTeX RDF |
output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis |
12 | Stefan Ciobaca, Stéphanie Delaune, Steve Kremer |
Computing Knowledge in Security Protocols under Convergent Equational Theories. |
CADE |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Sherman S. M. Chow |
Removing Escrow from Identity-Based Encryption. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Vipul Goyal, Amit Sahai |
Resettably Secure Computation. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill |
Order-Preserving Symmetric Encryption. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Alexander W. Dent |
A Brief History of Security Models for Confidentiality. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen |
Enhancement of the RFID security method with ownership transfer. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
integrity, efficiency, RFID system, ownership transfer |
12 | Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan |
Computational Differential Privacy. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo |
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Tsau Young Lin, Lotfi A. Zadeh |
Foreword to the Special Section on Granular Computing. |
IEEE Trans. Fuzzy Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 |
Further Observations on Certificateless Public Key Encryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Carmit Hazay, Yehuda Lindell |
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Omer Reingold, Luca Trevisan, Madhur Tulsiani, Salil P. Vadhan |
Dense Subsets of Pseudorandom Sets. |
FOCS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin |
How to Encrypt with the LPN Problem. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
LPN, error-correcting code, symmetric encryption |
12 | David Galindo, Flavio D. Garcia, Peter van Rossum |
Computational Soundness of Non-Malleable Commitments. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira |
Modeling Computational Security in Long-Lived Systems. |
CONCUR |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval |
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
12 | JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha |
A New Formal Proof Model for RFID Location Privacy. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
formal proof model, location privacy, RFID security |
12 | Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart |
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Alexandra Boldyreva, Serge Fehr, Adam O'Neill |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Simon Kramer 0001 |
Logical concepts in cryptography. |
SIGACT News |
2007 |
DBLP DOI BibTeX RDF |
applied formal logic, information security |
12 | Phillip Rogaway, Mihir Bellare |
Robust computational secret sharing and a unified account of classical secret-sharing goals. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage |
12 | Joan Jacas, Jordi Recasens |
Aggregation Operators and the Lipschitzian Condition. |
FUZZ-IEEE |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Angelo Montanari, Gabriele Puppis |
A Contraction Method to Decide MSO Theories of Deterministic Trees. |
LICS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Bounded CCA2-Secure Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Relations Among Notions of Non-malleability for Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption, Non-malleability |
12 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
New constructions for provably-secure time-bound hierarchical key assignment schemes. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
access control, provable security, key assignment |
12 | Sherman S. M. Chow, Kim-Kwang Raymond Choo |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
reveal query, anonymity, provable security, Key agreement, identity-based cryptography |
12 | Chun-Yuan Hsiao, Chi-Jen Lu, Leonid Reyzin |
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Rajeev Alur, Pavol Cerný, Swarat Chaudhuri |
Model Checking on Trees with Path Equivalences. |
TACAS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Emmanuel Bresson, Mark Manulis, Jörg Schwenk |
On Security Models and Compilers for Group Key Exchange Protocols. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Qianhong Wu, Willy Susilo, Yi Mu 0001, Fangguo Zhang |
Efficient Partially Blind Signatures with Provable Security. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Lotfi A. Zadeh |
Granular Computing and Rough Set Theory. |
RSEISP |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Wei Li 0013, Dawu Gu |
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Aldar C.-F. Chan, Claude Castelluccia |
On the Privacy of Concealed Data Aggregation. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
A Graph Game Model for Software Tamper Protection. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jonathan Katz, Moti Yung |
Characterization of Security Notions for Probabilistic Private-Key Encryption. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Private-key encryptions, Definitions |