The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Deepesh Data, Manoj Prabhakaran 0001 Towards Characterizing Securely Computable Two-Party Randomized Functions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Yehuda Lindell, Avishay Yanai Fast Garbling of Circuits over 3-Valued Logic. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges Reusing Tamper-Proof Hardware in UC-Secure Protocols. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Benedikt Auerbach, Mihir Bellare, Eike Kiltz Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Baiyu Li, Daniele Micciancio Equational Security Proofs of Oblivious Transfer Protocols. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Stanislaw Jarecki Efficient Covert Two-Party Computation. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Takahiro Matsuda 0002, Jacob C. N. Schuldt Related Randomness Security for Public Key Encryption, Revisited. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Lin Lyu 0001, Shengli Liu 0001, Shuai Han 0001, Dawu Gu Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Georg Fuchsbauer Subversion-Zero-Knowledge SNARKs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Jonathan Bootle, Jens Groth Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Zvika Brakerski, Elena Kirshanova, Damien Stehlé, Weiqiang Wen Learning with Errors and Extrapolated Dihedral Cosets. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Andreas Hülsing, Tanja Lange 0001, Kit Smeets Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Thomas Agrikola, Dennis Hofheinz Interactively Secure Groups from Obfuscation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Ivan Damgård, Ji Luo 0002, Sabine Oechsner, Peter Scholl, Mark Simkin 0001 Compact Zero-Knowledge Proofs of Small Hamming Weight. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz New (and Old) Proof Systems for Lattice Problems. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Ali El Kaafarani, Shuichi Katsumata Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka Simple and Generic Constructions of Succinct Functional Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach Hash Proof Systems over Lattices Revisited. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena Two-Factor Authentication with End-to-End Password Security. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia Graded Encoding Schemes from Obfuscation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28San Ling, Khoa Nguyen 0002, Huaxiong Wang, Yanhong Xu Constant-Size Group Signatures from Lattices. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Georg Fuchsbauer, Romain Gay Weakly Secure Equivalence-Class Signatures from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Pratish Datta, Tatsuaki Okamoto, Junichi Tomida Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi Local Non-malleable Codes in the Bounded Retrieval Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Chris Peikert, Sina Shiehian Privately Constraining and Programming PRFs, the LWE Way. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Xiong Fan, Qiang Tang 0005 Making Public Key Functional Encryption Function Private, Distributively. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe SOFIA: MQ MQ -Based Signatures in the QROM. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Yi Deng 0002, Xuyang Song, Jingyue Yu, Yu Chen 0003 On the Security of Classic Protocols for Unique Witness Relations. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy 0001 Improved (Almost) Tightly-Secure Structure-Preserving Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Benedikt Auerbach, Bertram Poettering Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp Non-malleability vs. CCA-Security: The Case of Commitments. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Craig Gentry, Adam O'Neill, Leonid Reyzin A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Serge Fehr (eds.) Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Serge Fehr (eds.) Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Boaz Barak The Complexity of Public-Key Cryptography. Search on Bibsonomy Tutorials on the Foundations of Cryptography The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren 0001 Asymptotically Tight Bounds for Composing ORAM with PIR. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28David Pointcheval, Olivier Sanders, Jacques Traoré Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Rishab Goyal, Venkata Koppula, Brent Waters Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Gottfried Herold, Alexander May 0001 LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Yang Yu 0008, Guangwu Xu, Xiaoyun Wang 0001 Provably Secure NTRU Instances over Prime Cyclotomic Rings. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Barak Shani On the Bit Security of Elliptic Curve Diffie-Hellman. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi 0001 Predictable Arguments of Knowledge. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Gottfried Herold, Elena Kirshanova Improved Algorithms for the Approximate k-List Problem in Euclidean Norm. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jorge L. Villar Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Antonio Faonio, Jesper Buus Nielsen Fully Leakage-Resilient Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Taechan Kim 0001, Jinhyuck Jeong Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Antonio Faonio, Jesper Buus Nielsen Non-malleable Codes with Split-State Refresh. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Fabrice Benhamouda, David Pointcheval Removing Erasures with Explainable Hash Proof Systems. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jie Chen 0021, Junqing Gong 0001, Jian Weng 0001 Tightly Secure IBE Under Constant-Size Master Public Key. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Carmit Hazay, Muthuramakrishnan Venkitasubramaniam Scalable Multi-party Private Set-Intersection. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Benoît Libert, Thomas Peters, Chen Qian 0002 Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Charanjit S. Jutla, Arnab Roy 0001 Improved Structure Preserving Signatures Under Standard Bilinear Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Chris Brzuska, Håkon Jacobsen A Modular Security Analysis of EAP and IEEE 802.11. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Venkata Koppula, Andrew Poelstra, Brent Waters Universal Samplers with Fast Verification. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Mihir Bellare, Bertram Poettering, Douglas Stebila Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Ran Canetti, Srinivasan Raghuraman, Silas Richelson, Vinod Vaikuntanathan Chosen-Ciphertext Secure Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Fabrice Benhamouda, Florian Bourse, Helger Lipmaa CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Nuttapong Attrapadung Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Wutichai Chongchitmate, Rafail Ostrovsky Circuit-Private Multi-key FHE. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam Better Two-Round Adaptive Multi-party Computation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Aggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang Ceremonies for End-to-End Verifiable Elections. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Dan Boneh, Kevin Lewi, David J. Wu 0001 Constraining Pseudorandom Functions Privately. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi Access Control Encryption for Equality, Comparison, and More. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Jesper Buus Nielsen, Samuel Ranellucci On the Computational Overhead of MPC with Dishonest Majority. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang (eds.) Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang (eds.) Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Angelo De Caro, Vincenzo Iovino, Adam O'Neill Deniable Functional Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Gunnar Hartung, Björn Kaidel, Alexander Koch 0001, Jessica Koch, Andy Rupp Fault-Tolerant Aggregate Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Johannes Krupp, Dominique Schröder, Mark Simkin 0001, Dario Fiore 0001, Giuseppe Ateniese, Stefan Nürnberger Nearly Optimal Verifiable Data Streaming. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider 0001, Dominique Schröder, Mark Simkin 0001 Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng 0001 CCA-Secure Keyed-Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Andreas Hülsing, Joost Rijneveld, Fang Song 0001 Mitigating Multi-target Attacks in Hash-Based Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Functional Encryption for Inner Product with Full Function Privacy. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Yohei Watanabe 0001, Junji Shikata Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Sebastian Faust, Daniel Masny, Daniele Venturi 0001 Chosen-Ciphertext Security from Subset Sum. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Marc Joye Identity-Based Cryptosystems and Quadratic Residuosity. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28David Bernhard, Marc Fischlin, Bogdan Warinschi On the Hardness of Proving CCA-Security of Signed ElGamal. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Michael Backes 0001, Sebastian Meiser 0001, Dominique Schröder Delegatable Functional Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Yusuke Sakai 0001, Nuttapong Attrapadung, Goichiro Hanaoka Attribute-Based Signatures for Circuits from Bilinear Map. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Takahiro Matsuda 0002, Goichiro Hanaoka Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Junqing Gong 0001, Jie Chen 0021, Xiaolei Dong, Zhenfu Cao, Shaohua Tang Extended Nested Dual System Groups, Revisited. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Andreas Hülsing, Joost Rijneveld, Peter Schwabe ARMed SPHINCS - Computing a 41 KB Signature in 16 KB of RAM. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Atsushi Takayasu, Noboru Kunihiro How to Generalize RSA Cryptanalyses. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE). Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan 0001 On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou Leakage-Resilient Public-Key Encryption from Obfuscation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Hoeteck Wee KDM-Security via Homomorphic Smooth Projective Hashing. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 18658 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license