The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Keys with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1975 (17) 1976-1978 (26) 1979-1980 (17) 1981-1982 (15) 1983-1984 (27) 1985 (23) 1986-1987 (32) 1988 (19) 1989 (41) 1990 (27) 1991 (18) 1992 (24) 1993 (32) 1994 (40) 1995 (29) 1996 (35) 1997 (53) 1998 (75) 1999 (94) 2000 (97) 2001 (128) 2002 (178) 2003 (221) 2004 (282) 2005 (363) 2006 (408) 2007 (433) 2008 (417) 2009 (339) 2010 (125) 2011 (75) 2012 (87) 2013 (75) 2014 (83) 2015 (94) 2016 (93) 2017 (94) 2018 (116) 2019 (92) 2020 (110) 2021 (104) 2022 (104) 2023 (136) 2024 (21)
Publication types (Num. hits)
article(1345) book(1) data(1) incollection(18) inproceedings(3540) phdthesis(11) proceedings(3)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(199) CoRR(146) CRYPTO(122) EUROCRYPT(103) ACISP(53) CCS(46) ASIACRYPT(40) Public Key Cryptography(39) CT-RSA(38) FSE(37) SIGMOD Conference(35) INDOCRYPT(33) KEYS(32) CHES(31) ACNS(30) RFC(30) More (+10 of total 1458)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3849 occurrences of 1722 keywords

Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Sung Jin Choi, Hee Yong Youn An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, mutual authentication, key pre-distribution, LU decomposition, distributed sensor network
15Alessandro Cilardo, Antonino Mazzeo, Luigi Romano An FPGA-based Key-Store for Improving the Dependability of Security Services. Search on Bibsonomy WORDS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Ruby B. Lee, Peter C. S. Kwan, John Patrick McGregor, Jeffrey S. Dwoskin, Zhenghong Wang Architecture for Protecting Critical Secrets in Microprocessors. Search on Bibsonomy ISCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Hung-Yu Chien Efficient Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Dipti Prasad Mukherjee, Subhamoy Maitra, Scott T. Acton Spatial domain digital watermarking of multimedia objects for buyer authentication. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Subramanian Lakshmanan, Deepak J. Manohar, Mustaque Ahamad, H. Venkateswaran Collective Endorsement and the Dissemination Problem in Malicious Environments. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-Based encryption, broadcast encryption, forward security
15Ernest F. Brickell, Jan Camenisch, Liqun Chen 0002 Direct anonymous attestation. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF integrity based computing, privacy, cryptographic protocols, trusted computing, anonymous credential systems
15Kevin C. Zatloukal, Nicholas J. A. Harvey Family trees: an ordered dictionary with optimal congestion, locality, degree, and search time. Search on Bibsonomy SODA The full citation details ... 2004 DBLP  BibTeX  RDF
15Robert Harper 0001 Self-Adjusting Computation. Search on Bibsonomy LICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Robert Harper 0001 Self-Adjusting Computation. Search on Bibsonomy ICALP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Rafail Ostrovsky, Charles Rackoff, Adam D. Smith Efficient Consistency Proofs for Generalized Queries on a Committed Database. Search on Bibsonomy ICALP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Yongwei Zhu, Mohan S. Kankanhalli Key-Based Melody Segmentation for Popular Songs. Search on Bibsonomy ICPR (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. Search on Bibsonomy COMPSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cryptographic Key Assignment and User Hierarchy, Access Control, One-Way Hash Function
15François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations
15Supakorn Kungpisdan, Phu Dung Le, Bala Srinivasan 0002 A Limited-Used Key Generation Scheme for Internet Transactions. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF credit-card payment, key generation, electronic payment systems
15Jorge Nakahara Jr., Daniel Santana de Freitas Cryptanalysis of Ake98. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6
15Hyun Gon Kim, Doo-Ho Choi Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Hando. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Deok-Gyu Lee, Im-Yeong Lee A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Lars R. Knudsen, John Erik Mathiassen On the Role of Key Schedules in Attacks on Iterated Ciphers. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Krister Lindén Finding Cross-Lingual Spelling Variants. Search on Bibsonomy SPIRE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Kerttu Pollari-Malmi, Eljas Soisalon-Soininen Concurrency Control and I/O-Optimality in Bulk Insertion.. Search on Bibsonomy SPIRE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Andris Ambainis, Adam D. Smith Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Javier Herranz, Germán Sáez New Identity-Based Ring Signature Schemes. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Robert T. Schweller, Ashish Gupta 0003, Elliot Parsons, Yan Chen 0004 Reversible sketches for efficient and accurate change detection over network data streams. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IP mangling, data stream computation, modular hashing, reverse hashing, sketch, change detection, network anomaly detection
15Sencun Zhu, Sanjeev Setia, Sushil Jajodia LEAP - efficient security mechanisms for large-scale distributed sensor networks. Search on Bibsonomy SenSys The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sensor networks, key management, in-network processing, security mechanism
15Catherine H. Gebotys, Robert J. Gebotys A Framework for Security on NoC Technologies. Search on Bibsonomy ISVLSI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Marco Casassa Mont, Keith Harrison, Martin Sadler The HP time vault service: exploiting IBE for timed release of confidential information. Search on Bibsonomy WWW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF disclosure policies, identifier-based encryption, timed-release, security, web service, privacy
15Chong-zhi Gao, Zheng-an Yao, Lei Li 0022 A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Kyung-Tae Lee, Inbum Jung, Changyeol Choi, Wan Choi, Sang-Wook Kim Design and Implementation of a Cache-Conscious Index Manager for the Tachyon, a Main Memory DBMS. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Pär-Anders Albinsson, Shumin Zhai High precision touch screen interaction. Search on Bibsonomy CHI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF touch screens
15Gianni Franceschini, Roberto Grossi Optimal Worst-Case Operations for Implicit Cache-Oblivious Search Trees. Search on Bibsonomy WADS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Lars R. Knudsen, Tadayoshi Kohno Analysis of RMAC. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 Key Recovery Attacks on the RMAC, TMAC, and IACBC. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC
15Joseph K. Liu, Victor K. Wei, Duncan S. Wong A Separable Threshold Ring Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Hyun Gon Kim, Doo-Ho Choi, Dae Young Kim 0001 Secure Session Key Exchange for Mobile IP Low Latency Handoffs. Search on Bibsonomy ICCSA (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Haowen Chan, Adrian Perrig, Dawn Xiaodong Song Random Key Predistribution Schemes for Sensor Networks. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Ramesh Karri, Grigori Kuznetsov, Michael Gössel Parity-Based Concurrent Error Detection in Symmetric Block Ciphers. Search on Bibsonomy ITC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Vishal Kher, Yongdae Kim Decentralized Authentication Mechanisms for Object-based Storage Devices. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Adi Shamir, Eran Tromer Factoring Large Number with the TWIRL Device. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Ohad Rodeh, Kenneth P. Birman, Danny Dolev Using AVL trees for fault-tolerant group key management. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Logical key hierarchy, Security, Group communication
15Elisa Bertino, Elena Ferrari Secure and selective dissemination of XML documents. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure distribution, XML, Access control
15Elisa Bertino, Barbara Carminati, Elena Ferrari A temporal key management scheme for secure broadcasting of XML documents. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure broadcasting, temporal key management, XML
15Oskar Scheikl, Jonathan Lane, Robert Boyer, Mohamed Eltoweissy Multi-level Secure Multicast: The Rethinking of Secure Locks. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Adrian Baldwin, Simon Shiu Encryption and Key management in a SAN. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Håvard Raddum, Lars R. Knudsen A Differential Attack on Reduced-Round SC2000. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen Differential Cryptanalysis of Q. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15David P. Jablon Password Authentication Using Multiple Servers. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Mike Bond Attacks on Cryptoprocessor Transaction Sets. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Bernard Chazelle The soft heap: an approximate priority queue with optimal error rate. Search on Bibsonomy J. ACM The full citation details ... 2000 DBLP  DOI  BibTeX  RDF amoritization, soft heap, priority queue, heap
15Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong Root Finding Interpolation Attack. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Marcin Kik Periodic Correction Networks. Search on Bibsonomy Euro-Par The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Wenfei Fan, Jérôme Siméon Integrity Constraints for XML. Search on Bibsonomy PODS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Sabine Hanke, Eljas Soisalon-Soininen Group Updates for Red-Black Trees. Search on Bibsonomy CIAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Michael Walker 0001 On the Security of 3GPP Networks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15John Kelsey, Bruce Schneier Key-Schedule Cryptanalysis of DEAL. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko Strenght of MISTY1 without FL Function for Higher Order Differential Attack. Search on Bibsonomy AAECC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Stephen M. Matyas, Allen Roginsky An Effective Defense Against First Party Attacks in Public-Key Algorithms. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Encryption, Hash function, Public key
15Kazumaro Aoki On Maximum Non-averaged Differential Probability. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF maximum average of differential probability, linear hull, maximum average of linear probability, maximum non-averaged differential probability, maximum non-averaged linear probability, DES-like cipher, Differential cryptanalysis, differential, linear cryptanalysis
15Bernard Chazelle Car-Pooling as a Data Structuring Device: The Soft Heap. Search on Bibsonomy ESA The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
15Michael Shneier, Mohamed Abdel-Mottaleb Exploiting the JPEG Compression Scheme for Image Retrieval. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Image retrieval, DCT, image databases, JPEG, compressed domain processing
15Danny Z. Chen, Xiaobo Hu 0001 Fast and Efficient Operations on Parallel Priority Queues. Search on Bibsonomy ISAAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
15Warwick Ford, Michael J. Wiener A Key Distribution Method for Object-Based Protection. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
15Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen Robust and Secure Password and Key Change Method. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
15Mark Shand, Jean Vuillemin Fast implementations of RSA cryptography. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
15Ishai Ben-Aroya, Eli Biham Differential Cryptanalysis of Lucifer. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
15Ricardo A. Baeza-Yates An Adaptive Overflow Technique for B-trees. Search on Bibsonomy EDBT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
15Dik Lun Lee, Chun-Wu Roger Leng Partitioned Signature Files: Design Issues and Performance Evaluation. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
15Yair Frankel A Practical Protocol for Large Group Oriented Networks. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
15Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
15Albrecht Beutelspacher Perfect and Essentially Perfect Authentication Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
15Eiji Okamoto Key Distribution Systems Based on Identification Information. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
15Jürg Nievergelt, Hans Hinterberger, Kenneth C. Sevcik The Grid File: An Adaptable, Symmetric Multikey File Structure. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
15Arnold L. Rosenberg, Lawrence Snyder Time- and Space-Optimality in B-Trees. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF 2, 3-tree, bushy B-tree, compact B-tree, node-visit cost, B-tree, space utilization
15C. Leung Some Open Problems In Cryptography. Search on Bibsonomy ACM Annual Conference (1) The full citation details ... 1978 DBLP  DOI  BibTeX  RDF Security, Complexity, Cryptography, Key distribution
15Jürgen Seehusen Virtuelle Z-Baum-Technik. Search on Bibsonomy Computing The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
12Wolfgang Killmann On security aspects of the ciphers T-310 and SKS with approved long-term keys. Search on Bibsonomy Cryptologia The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Beáta Megyesi, Crina Tudor, Benedek Láng, Anna Lehofer, Nils Kopal, Karl de Leeuw, Michelle Waldispühl Keys with nomenclatures in the early modern Europe. Search on Bibsonomy Cryptologia The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Baocang Wang, Yange Chen, Furong Li, Jian Song, Rongxing Lu, Pu Duan, Zhihong Tian Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Sara Ricci, Patrik Dobias, Lukas Malina, Jan Hajny, Petr Jedlicka Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Abeer Y. Al-Hyari, Charlie Obimbo, Mua'ad Abu-Faraj, Ismail Al-Taharwa Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Xiaoying Shen, Xue Luo, Feng Yuan, Baocang Wang, Yange Chen, Dianhua Tang, Le Gao Verifiable Privacy-Preserving Federated Learning Under Multiple Encrypted Keys. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yunzhen Zhang, Baocang Wang, Zhen Zhao 0005 Secure k-NN Query With Multiple Keys Based on Random Projection Forests. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Fabian Tomaschek, Michael Ramscar, Jessie S. Nixon The Keys to the Future? An Examination of Statistical Versus Discriminative Accounts of Serial Pattern Learning. Search on Bibsonomy Cogn. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Augustin Bouquillard, Florent Jacquemard Engraving Oriented Joint Estimation of Pitch Spelling and Local and Global Keys. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12David Soler, Carlos Dafonte, Manuel Fernández-Veiga, Ana Fernández Vilas, Francisco Javier Nóvoa A Privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Otmar Ertl JumpBackHash: Say Goodbye to the Modulo Operation to Distribute Keys Uniformly to Buckets. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yue Niu, Saurav Prakash, Salman Avestimehr ATP: Enabling Fast LLM Serving via Attention on Top Principal Keys. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Zhuangkun Wei, Wenxiu Hu, Weisi Guo Explainable Adversarial Learning Framework on Physical Layer Secret Keys Combating Malicious Reconfigurable Intelligent Surface. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Munqath Alatar, Attila Sali Approximate Keys and Functional Dependencies in Incomplete Databases With Limited Domains-Algorithmic Perspective. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Zhuoxing Zhang, Sebastian Link Mixed Covers of Keys and Functional Dependencies for Maintaining the Integrity of Data under Updates. Search on Bibsonomy Proc. VLDB Endow. The full citation details ... 2024 DBLP  BibTeX  RDF
12Xiaohui Zhang 0009, Meimei Zhao, Bing Yao Various matching keys for asymmetric topology encryption. Search on Bibsonomy Discret. Appl. Math. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, Maximiliane Weishäupl Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Shuai An, Yang Cao 0012 Relative Keys: Putting Feature Explanation into Context. Search on Bibsonomy Proc. ACM Manag. Data The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Liqun Chen 0002, Nada El Kassem, Christopher J. P. Newton How To Bind A TPM's Attestation Keys With Its Endorsement Key. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Qing Ling, Tingting Cui, Hongtao Hu, Sijia Gong, Zijun He, Jiali Huang, Jia Xiao Finding Impossible Differentials in ARX Ciphers under Weak Keys. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Alar Leibak On the number of factorizations of $ t $ mod $ N $ and the probability distribution of Diffie-Hellman secret keys for many users. Search on Bibsonomy Adv. Math. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Shuai Shi, Ning Xiao Security demonstration for the quantum noise-based physical layer using variable keys. Search on Bibsonomy Int. J. Sens. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 4919 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license