|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Luís T. A. N. Brandão |
Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme). |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Christophe Petit 0001, Michiel Kosters, Ange Messeng |
Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi |
On Public Key Encryption from Noisy Codewords. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Ran Cohen |
Asynchronous Secure Multiparty Computation in Constant Time. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jan Camenisch, Manu Drijvers, Anja Lehmann |
Universally Composable Direct Anonymous Attestation. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang |
Indistinguishability Obfuscation with Non-trivial Efficiency. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy |
Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Ran Canetti, Daniel Shahaf, Margarita Vald |
Universally Composable Authentication and Key-Exchange with Global PKI. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Samuel Neves, Mehdi Tibouchi |
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Allison Bishop, Valerio Pastro |
Robust Secret Sharing Schemes Against Local Adversaries. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Yu Chen 0003, Baodong Qin, Jiang Zhang 0001, Yi Deng 0002, Sherman S. M. Chow |
Non-Malleable Functions and Their Applications. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jonathan Katz (eds.) |
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Patrik Lantz, Björn Johansson 0006, Martin Hell, Ben J. M. Smeets |
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. |
Financial Cryptography Workshops |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Sriram Keelveedhi |
Interactive Message-Locked Encryption and Secure Deduplication. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi |
How Secure is Deterministic Encryption? |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Vadim Lyubashevsky, Daniel Wichs |
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Marc Joye, Moti Yung, Thomas Peters |
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Fabrice Benhamouda, David Pointcheval |
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Romain Gay, Pierrick Méaux, Hoeteck Wee |
Predicate Encryption for Multi-dimensional Range Queries from Lattices. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré |
Divisible E-Cash Made Practical. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Gilles Barthe, Edvard Fagerholm, Dario Fiore 0001, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi |
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Dennis Hofheinz, Jessica Koch, Christoph Striecks |
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Allison B. Lewko, Sarah Meiklejohn |
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval |
Simple Functional Encryption Schemes for Inner Products. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan |
Tightly-Secure Signatures from Chameleon Hash Functions. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | David Cash, Rafael Dowsley, Eike Kiltz |
Digital Signatures from Strong RSA without Prime Generation. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Florian Bergsma, Tibor Jager, Jörg Schwenk |
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Ryo Hiromasa, Masayuki Abe, Tatsuaki Okamoto |
Packing Messages and Optimizing Bootstrapping in GSW-FHE. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Emmanuela Orsini, Joop van de Pol, Nigel P. Smart |
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Shengli Liu 0001, Kenneth G. Paterson |
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jan Camenisch, Robert R. Enderlein, Gregory Neven |
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge |
On the Selective Opening Security of Practical Public-Key Encryption Schemes. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae |
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen |
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Marta Conde Pena, Jean-Charles Faugère, Ludovic Perret |
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Phong Q. Nguyen, Jiang Zhang 0001, Zhenfeng Zhang |
Simpler Efficient Group Signatures from Lattices. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umaña |
A Polynomial-Time Attack on the BBCRS Scheme. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Shuji Kijima, Ravi Montenegro |
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Ignacio Cascudo, Ivan Damgård, Bernardo Machado David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti |
Additively Homomorphic UC Commitments with Optimal Amortized Overhead. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Nico Döttling |
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Pyrros Chaidos, Jens Groth |
Making Sigma-Protocols Non-interactive Without Random Oracles. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran 0001, Amit Sahai |
On the Practical Security of Inner Product Functional Encryption. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi 0001 |
A Tamper and Leakage Resilient von Neumann Architecture. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | David Bernhard, Marc Fischlin, Bogdan Warinschi |
Adaptive Proofs of Knowledge in the Random Oracle Model. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss |
Anonymous Transferable E-Cash. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jacob Alperin-Sheriff |
Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Robert Granger, Michael Scott |
Faster ECC over \mathbb F_2^521-1. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | San Ling, Khoa Nguyen 0002, Huaxiong Wang |
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Hugo Krawczyk (eds.) |
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow |
Elliptic Curve Cryptography in Practice. |
Financial Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Sebastian Pape 0001 |
Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. |
Financial Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Moti Yung, Marc Joye, Thomas Peters |
Traceable Group Encryption. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi |
Scale-Invariant Fully Homomorphic Encryption over the Integers. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Eike Kiltz, Daniel Masny, Krzysztof Pietrzak |
Simple Chosen-Ciphertext Security from Low-Noise LPN. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled |
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Elette Boyle, Shafi Goldwasser, Ioana Ivan |
Functional Signatures and Pseudorandom Functions. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn |
Related Randomness Attacks for Public Key Encryption. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Stefano Tessaro, David A. Wilson |
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser 0001, Andreas Peter |
General Impossibility of Group Homomorphic Encryption in the Quantum World. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Susan Hohenberger, Brent Waters |
Online/Offline Attribute-Based Encryption. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Yannick Seurin |
On the Lossiness of the Rabin Trapdoor Function. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa |
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jesper Buus Nielsen, Daniele Venturi 0001, Angela Zottarel |
Leakage-Resilient Signatures with Graceful Degradation. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Baodong Qin, Shengli Liu 0001 |
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Florian Böhl, Gareth T. Davies, Dennis Hofheinz |
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Yong Li 0021, Sven Schäge, Zheng Yang 0005, Florian Kohlar, Jörg Schwenk |
On the Security of the Pre-shared Key Ciphersuites of TLS. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Stanislaw Jarecki |
Practical Covert Authentication. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Georg Fuchsbauer |
Policy-Based Signatures. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols |
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Elena Kirshanova |
Proxy Re-encryption from Lattices. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky |
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann |
Discrete Logarithm in GF(2809) with FFS. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Gengran Hu, Yanbin Pan, Feng Zhang |
Solving Random Subset Sum Problem by l p -norm SVP Oracle. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret |
Lazy Modulus Switching for the BKW Algorithm on LWE. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Dario Catalano, Dario Fiore 0001, Rosario Gennaro, Luca Nizzardo |
Generalizing Homomorphic MACs for Arithmetic Circuits. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Alex Escala, Jens Groth |
Fine-Tuning Groth-Sahai Proofs. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill |
Enhanced Chosen-Ciphertext Security and Applications. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi |
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Sébastien Canard, David Pointcheval, Olivier Sanders |
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Joppe W. Bos, Craig Costello, Andrea Miele |
Elliptic and Hyperelliptic Curves: A Practical Security Analysis. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled |
On Minimal Assumptions for Sender-Deniable Public Key Encryption. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Shota Yamada 0001, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro |
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Chongwon Cho, Sanjam Garg, Rafail Ostrovsky |
Cross-Domain Secure Computation. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa |
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun |
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Ran Canetti, Omer Paneth, Dimitrios Papadopoulos 0001, Nikos Triandopoulos |
Verifiable Set Operations over Outsourced Databases. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam |
Verifiable Oblivious Storage. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Adeline Langlois, San Ling, Khoa Nguyen 0002, Huaxiong Wang |
Lattice-Based Group Signature Scheme with Verifier-Local Revocation. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Chosen Ciphertext Security via UCE. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Kaoru Kurosawa, Goichiro Hanaoka (eds.) |
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn |
Verifiable Elections That Scale for Free. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Zvika Brakerski, Craig Gentry, Shai Halevi |
Packed Ciphertexts in LWE-Based Homomorphic Encryption. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Nuttapong Attrapadung, Benoît Libert, Thomas Peters |
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo |
Tagged One-Time Signatures: Tight Security and Optimal Tag Size. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Eduarda S. V. Freire 0001, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson |
Non-Interactive Key Exchange. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Yannick Seurin |
New Constructions and Applications of Trapdoor DDH Groups. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Zhengan Huang, Shengli Liu 0001, Baodong Qin |
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud |
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Manuel Barbosa, Pooya Farshim |
On the Semantic Security of Functional Encryption Schemes. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud 0001, Guénaël Renault, Soline Renner, Rina Zeitoun |
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 18658 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|