|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 917 occurrences of 351 keywords
|
|
|
Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Mike Just |
Diffie-Hellman Key Agreement. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jean Goubault-Larrecq, Muriel Roger, Kumar Neeraj Verma |
Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically. |
J. Log. Algebraic Methods Program. |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Kenji Imamoto, Kouichi Sakurai |
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic. |
ARSPA@ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm. |
Appl. Math. Comput. |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Kooshiar Azimian, Mahmoud Salmasizadeh, Javad Mohajeri |
Weak Composite Diffie-Hellman is not Weaker than Factoring |
Electron. Colloquium Comput. Complex. |
2005 |
DBLP BibTeX RDF |
|
33 | Kooshiar Azimian |
Breaking Diffie-Hellman is no Easier than Root Finding |
Electron. Colloquium Comput. Complex. |
2005 |
DBLP BibTeX RDF |
|
33 | Boaz Tsaban |
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards |
CoRR |
2005 |
DBLP BibTeX RDF |
|
33 | Yassine Lakhnech, Laurent Mazaré |
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Qiang Tang 0001, Liqun Chen |
Weaknesses in two group Diffie-Hellman key exchange protocols. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | A. A. Kalele, Virendra R. Sule |
Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Ayan Mahalanobis |
Diffie-Hellman key exchange protocol and non-abelian nilpotent groups. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Ayan Mahalanobis |
Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Jin Wook Byun, Dong Hoon Lee 0001 |
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Hugo Krawczyk |
HMQV: A High-Performance Secure Diffie-Hellman Protocol. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Boaz Tsaban |
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh |
Weak Composite Diffie-Hellman is not Weaker than Factoring. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
33 | Jonathan K. Millen, Vitaly Shmatikov |
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. |
J. Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Jonathan K. Millen, Vitaly Shmatikov |
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. |
J. Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Raphael C.-W. Phan |
Fixing the integrated Diffie-Hellman-DSA key exchange protocol. |
IEEE Commun. Lett. |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Mustapha El Hamzaoui, Abderrahim Sekkaki, Bahloul Bensassi |
Policy-based Resolution of the Diffie-Hellman Protocol Vulnerability. |
LANOMS |
2005 |
DBLP BibTeX RDF |
|
33 | Igor E. Shparlinski |
Security of polynomial transformations of the Diffie-Hellman key. |
Finite Fields Their Appl. |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Steven D. Galbraith, Victor Rotger |
Easy Decision Diffie-Hellman Groups. |
LMS J. Comput. Math. |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Ian F. Blake, Theodoulos Garefalakis |
On the complexity of the discrete logarithm and Diffie-Hellman problems. |
J. Complex. |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Neal Koblitz, Alfred Menezes |
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem. |
Math. Comput. |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
Secure Hashed Diffie-Hellman over Non-DDH Groups. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
33 | Daniel R. L. Brown, Robert P. Gallant |
The Static Diffie-Hellman Problem. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
33 | Steven D. Galbraith, Victor Rotger |
Easy decision-Diffie-Hellman groups. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
33 | Lein Harn, Manish Mehta 0003, Wen-Jung Hsin |
Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA). |
IEEE Commun. Lett. |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Kieran S. Hagzan, Hans-Peter Bischof |
The Performance of Group Diffie-Hellman Paradigms. |
International Conference on Wireless Networks |
2004 |
DBLP BibTeX RDF |
|
33 | Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski |
Secure Bilinear Diffie-Hellman Bits. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Tero Kivinen, Mika Kojo |
More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE). |
RFC |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Zhenfeng Zhang, Jing Xu 0002, Dengguo Feng |
Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
33 | Jung Hee Cheon, Byungheup Jun |
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
33 | Chih-Yin Lin, Tzong-Chen Wu, Fangguo Zhang |
A Structured Multisignature Scheme from the Gap Diffie-Hellman Group. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
33 | Joonsang Baek, Yuliang Zheng 0001 |
Simple and efficient threshold cryptosystem from the Gap Diffie-Hellman group. |
GLOBECOM |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Jean-Sébastien Coron, David Naccache |
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. |
FSTTCS |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Wilfried Meidl, Arne Winterhof |
A Polynomial Representation of the Diffie-Hellman Mapping. |
Appl. Algebra Eng. Commun. Comput. |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Yacov Yacobi |
A Note on the Bilinear Diffie-Hellman Assumption. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
33 | Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski |
Secure Bilinear Diffie-Hellman Bits. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
33 | Jae Choon Cha, Jung Hee Cheon |
An Identity-Based Signature from Gap Diffie-Hellman Groups. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
33 | Alexandra Boldyreva |
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
33 | Jung Hee Cheon, Dong Hoon Lee 0002 |
Diffie-Hellman Problems and Bilinear Maps. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
33 | Qi Cheng 0001, Shigenori Uchiyama |
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
33 | John B. Friedlander, Igor E. Shparlinski |
On the Distribution of Diffie-Hellman Triples with Sparse Exponents. |
SIAM J. Discret. Math. |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Don Coppersmith, Igor E. Shparlinski |
On Polynomial Approximation of the Discrete Logarithm and the Diffie - Hellman Mapping. |
J. Cryptol. |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Ueli M. Maurer, Stefan Wolf 0001 |
The Diffie-Hellman Protocol. |
Des. Codes Cryptogr. |
2000 |
DBLP DOI BibTeX RDF |
|
33 | María Isabel González Vasco, Igor E. Shparlinski |
On the Security of Diffie-Hellman Bits |
Electron. Colloquium Comput. Complex. |
2000 |
DBLP BibTeX RDF |
|
33 | Hemma Prafullchandra, Jim Schaad |
Diffie-Hellman Proof-of-Possession Algorithms. |
RFC |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Robert J. Zuccherato |
Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME. |
RFC |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Igor E. Shparlinski |
Security of Polynomial Transformations of the Diffie-Hellman Key. |
IACR Cryptol. ePrint Arch. |
2000 |
DBLP BibTeX RDF |
|
33 | María Isabel González Vasco, Igor E. Shparlinski |
On the Security of Diffie-Hellman Bits. |
IACR Cryptol. ePrint Arch. |
2000 |
DBLP BibTeX RDF |
|
33 | Victor Boyko, Philip D. MacKenzie, Sarvar Patel |
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. |
IACR Cryptol. ePrint Arch. |
2000 |
DBLP BibTeX RDF |
|
33 | Antoine Joux |
A One Round Protocol for Tripartite Diffie-Hellman. |
ANTS |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Joonsang Baek, Byoungcheon Lee, Kwangjo Kim |
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Igor E. Shparlinski |
Communication Complexity and Fourier Coefficients of the Diffie-Hellman Key. |
LATIN |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Jiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang |
New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. |
Comput. Commun. |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Nigel P. Smart, Samir Siksek |
A Fast Diffie-Hellman Protocol in Genus 2. |
J. Cryptol. |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Donald E. Eastlake III |
Storage of Diffie-Hellman Keys in the Domain Name System (DNS). |
RFC |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Eric Rescorla |
Diffie-Hellman Key Agreement Method. |
RFC |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Michel Abdalla, Mihir Bellare, Phillip Rogaway |
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem. |
IACR Cryptol. ePrint Arch. |
1999 |
DBLP BibTeX RDF |
|
33 | Ueli M. Maurer, Stefan Wolf 0001 |
The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. |
SIAM J. Comput. |
1999 |
DBLP DOI BibTeX RDF |
|
33 | Sachar Paulus, Tsuyoshi Takagi |
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
33 | Yacov Yacobi, Michael J. Beller |
Batch Diffie-Hellman Key Agreement Systems. |
J. Cryptol. |
1997 |
DBLP DOI BibTeX RDF |
|
33 | Eli Biham, Dan Boneh, Omer Reingold |
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring |
Electron. Colloquium Comput. Complex. |
1997 |
DBLP BibTeX RDF |
|
33 | Eli Biham, Dan Boneh, Omer Reingold |
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring. |
IACR Cryptol. ePrint Arch. |
1997 |
DBLP BibTeX RDF |
|
33 | Michael Steiner 0001, Gene Tsudik, Michael Waidner |
Diffie-Hellman Key Distribution Extended to Group Communication. |
CCS |
1996 |
DBLP DOI BibTeX RDF |
|
33 | Burton S. Kaliski Jr. |
IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract). |
Security Protocols Workshop |
1996 |
DBLP DOI BibTeX RDF |
|
33 | Paul C. van Oorschot |
Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement. |
IMACC |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Christian Waldvogel, James L. Massey |
The Probability Distribution of the Diffie-Hellman Key. |
AUSCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
32 | Jin Li 0002, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren 0001 |
Attribute-based signature and its applications. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
attribute-based, computational Diffie-Hellman assumption, anonymity, signature, predicate |
32 | Dexin Yang, Bo Yang |
A Novel Two-Server Password Authentication Scheme with Provable Security. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Two-server, Key exchange, Password authentication, Computational Diffie-hellman problem |
32 | Fahad Ahmed, Asif Masood, Firdous Kausar |
An Efficient Multi Recipient Signcryption Scheme Offering Non Repudiation. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Non-repudiation, Signcryption, Discrete Logarithm Problem, Public verifiability, Diffie-Hellman Problem |
32 | Pritam Gajkumar Shah, Xu Huang 0001, Dharmendra Sharma 0001 |
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Symmetric Key Cryptography, Elliptic Curve Diffie Hellman Scheme, Wireless Sensor Networks, Elliptical Curve Cryptography, Scalar multiplication |
32 | Xing-Lan Zhang |
Authenticated Key Exchange Protocol in One-Round. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity |
32 | David J. Malan, Matt Welsh, Michael D. Smith 0001 |
Implementing public-key infrastructure for sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
ECDLP, MICA2, TinySec, sensor networks, ECC, elliptic curve cryptography, TinyOS, motes, Diffie-Hellman, DLP |
32 | Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma |
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL |
32 | Chik How Tan |
Signcryption Scheme in Multi-user Setting without Random Oracles. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
decisional bilinear Diffie-Hellman assumption, Signcryption |
32 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
digital signature, forward security, bilinear maps, computation Diffie-Hellman problem |
32 | Jia Yu 0003, Fanyu Kong, Rong Hao, Xuliang Li 0001 |
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
digital signature, forward security, bilinear maps, Computation Diffie-Hellman problem |
32 | Andreas Sjöholm, Ludwig Seitz, Babak Sadighi |
Secure communication for ad-hoc, federated groups. |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
tree-based group, access control, authorization, XACML, secure group communication, Diffie-Hellman |
32 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure. |
SIGACT News |
2007 |
DBLP DOI BibTeX RDF |
decisional, doppelganger, static diffie-hellman, user interfaces, phishing, oblivious transfer, password authenticated key exchange |
32 | Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow |
An Efficient Signcryption Scheme with Key Privacy. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Ciphertext Anonymity, Gap Diffie-Hellman, Signcryption, Key Privacy |
32 | Mohamad Badra, Samer El-Sawda, Ibrahim Hajjeh |
Phishing attacks and solutions. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
RSA, phishing, public key infrastructures, TLS, Diffie-Hellman, SRP |
32 | Guilhem Castagnos, Damien Vergnaud |
Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Polynomial Diffie-Hellman Problems, Standard Model, Public Key Encryption, Random Oracle Model, Semantic Security, Chosen-Ciphertext Attacks |
32 | Markus Jakobsson, Steven A. Myers |
Delayed password disclosure. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
decisional & static diffie-hellman assumption, user interfaces, authentication, phishing, oblivious transfer, password authenticated key exchange |
32 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
32 | Volker Gebhardt |
Conjugacy Search in Braid Groups. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Conjugacy search, Ultra summit set, Braid-Diffie-Hellman, Cryptography, Cryptanalysis, Encryption, Key exchange, Braid groups, Conjugacy problem |
32 | Suan Khai Chong, Graham Farr, Laura Frost, Simon Hawley |
On pedagogically sound examples in public-key cryptography. |
ACSC |
2006 |
DBLP BibTeX RDF |
Massey-Omura, diagnostic example, example generator, sound example, RSA, public-key cryptography, Diffie-Hellman, knapsack, ElGamal |
32 | Ronald J. Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus |
TinyPK: securing sensor networks with public key technology. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
public key (PK), rivest shamir adelman (RSA), sensor networks, authentication, cryptography, encryption, key management, TinyOS, diffie-hellman |
32 | Song Han 0004, Winson K. Y. Yeung, Jie Wang 0038 |
Identity-based confirmer signatures from pairings over elliptic curves. |
EC |
2003 |
DBLP DOI BibTeX RDF |
elliptic curve discrete logarithms, identity-based signatures, Weil pairing, computational Diffie-Hellman problem |
32 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Analyzing the energy consumption of security protocols. |
ISLPED |
2003 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
32 | Yevgeniy Dodis, Moti Yung |
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. |
IEEE Security in Storage Workshop |
2002 |
DBLP DOI BibTeX RDF |
cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman |
32 | Refik Molva, Alain Pannetrat |
Scalable multicast security with dynamic recipient groups. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
scalability, RSA, group communications, confidentiality, key distribution, Diffie-Hellman |
32 | Moni Naor, Omer Reingold |
Synthesizers and Their Application to the Parallel Construction of Psuedo-Random Functions. |
FOCS |
1995 |
DBLP DOI BibTeX RDF |
parallel construction, pseudo-random synthesizer, cryptography, RSA, computational linguistics, computational learning theory, cryptographic primitive, pseudo-random functions, Diffie-Hellman assumptions |
25 | Bo Yang 0003, Yong Yu 0002, Fagen Li, Ying Sun |
Provably Secure Identity-Based Threshold Unsigncryption Scheme. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Yong Yu 0002, Bo Yang 0003, Xinyi Huang 0001, Mingwu Zhang |
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Thomas Beth |
Multifeature Security through Homomorphic Encryption. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Yu Chen 0003, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen 0001 |
Identity-based encryption based on DHIES. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
DHIES, combination, identity-based encryption, bilinear map |
17 | Andre Kalamandeen, Adin Scannell, Eyal de Lara, Anmol Sheth, Anthony LaMarca |
Ensemble: cooperative proximity-based authentication. |
MobiSys |
2010 |
DBLP DOI BibTeX RDF |
authentication, ensemble, proximity |
Displaying result #601 - #700 of 1148 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|