The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RSA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1984 (25) 1985-1986 (23) 1987-1988 (24) 1989 (15) 1990 (18) 1991-1992 (24) 1993-1994 (19) 1995-1996 (37) 1997 (37) 1998 (53) 1999 (63) 2000 (68) 2001 (104) 2002 (115) 2003 (141) 2004 (154) 2005 (192) 2006 (193) 2007 (152) 2008 (171) 2009 (160) 2010 (104) 2011 (83) 2012 (101) 2013 (95) 2014 (99) 2015 (96) 2016 (105) 2017 (99) 2018 (101) 2019 (107) 2020 (105) 2021 (98) 2022 (96) 2023 (94) 2024 (40)
Publication types (Num. hits)
article(917) book(4) data(4) incollection(23) inproceedings(2234) phdthesis(5) proceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2125 occurrences of 681 keywords

Results
Found 3211 publication records. Showing 3211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
41Mehmet S. Kiraz, Berry Schoenmakers An Efficient Protocol for Fair Secure Two-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Andrew Y. Lindell Legally-Enforceable Fairness in Secure Two-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Ivan Damgård, Michael Østergaard Pedersen RFID Security: Tradeoffs between Security and Efficiency. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu Identity-Based Threshold Key-Insulated Encryption without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold key-insulation, standard model, identity-based encryption, key-exposure
41Marc Fischlin Security of NMACand HMACBased on Non-malleability. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Stefan Tillich, Christoph Herbst Boosting AES Performance on a Tiny Processor Core. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 8-bit microcontroller, AVR architecture, Advanced Encryption Standard, instruction set extensions, hardware-software codesign
41Andrew Y. Lindell Efficient Fully-Simulatable Oblivious Transfer. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF APOP, Challenge and Response, Password Recovery, Message Difference, Hash Function, Collision Attack, MD5
41Shafi Goldwasser Program Obfuscation and One-Time Programs. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Eike Kiltz, Yevgeniy Vahlis CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos Super-Efficient Verification of Dynamic Outsourced Databases. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Qiong Huang 0001, Guomin Yang, Duncan S. Wong, Willy Susilo Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Pierre-Alain Fouque, Gaëtan Leurent Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, provable security, syndrome decoding, quasi-cyclic code
41Kristian Gjøsteen A Latency-Free Election Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Thomas Plos Susceptibility of UHF RFID Tags to Electromagnetic Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA)
41Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia
41Christophe Clavier, Benedikt Gierlichs, Ingrid Verbauwhede Fault Analysis Study of IDEA. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collision Fault Analysis, Ineffective Fault Analysis, Random Fault Model, IDEA, Differential Fault Analysis
41Koji Chida, Go Yamamoto Batch Processing of Interactive Proofs. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sigma-Protocols, Batch Processing, Proofs of Knowledge
41Eli Biham, Orr Dunkelman, Nathan Keller A Simple Related-Key Attack on the Full SHACAL-1. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Florian Mendel, Joseph Lano, Bart Preneel Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Matthew K. Franklin, Mark A. Gondree, Payman Mohassel Improved Efficiency for Private Stable Matching. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gale-Shapley, secure multiparty computation, stable matching, passive adversaries, stable marriage, privacy-preserving protocols
41Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Yvo Desmedt, Goce Jakimoski Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Second Preimages for SMASH. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, second preimages
41Máire McLoone, Matthew J. B. Robshaw Public Key Cryptography and RFID Tags. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Stanislaw Jarecki, Jihye Kim, Gene Tsudik Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Hassan Jameel, Riaz Ahmed Shaikh 0001, Heejo Lee, Sungyoung Lee Human Identification Through Image Evaluation Using Secret Predicates. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Elisabeth Oswald, Stefan Mangard Template Attacks on Masking - Resistance Is Futile. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç Cache Based Remote Timing Attack on the AES. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Remote Attack, AES, Timing Analysis, Side Channel Analysis, Cache Attack
41Karl Scheibelhofer A Bit-Slice Implementation of the Whirlpool Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu 0001 Compact E-Cash from Bounded Accumulator. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF compact e-cash, bounded accumulator, bilinear pairings
41Joseph H. Silverman, William Whyte Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
41Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, random walks, expander graph
41Eric R. Verheul Selecting Secure Passwords. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Masayuki Abe (eds.) Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41David Pointcheval (eds.) Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater Fair Identification. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Xinxin Fan, Thomas J. Wollinger, Yumin Wang Efficient Doubling on Genus 3 Curves over Binary Fields. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Marc Fischlin Universally Composable Oblivious Transfer in the Multi-party Setting. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Yitao Duan, John F. Canny How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Sylvain Pasini, Serge Vaudenay An Optimal Non-interactive Message Authentication Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Kristian Gjøsteen A New Security Proof for Damgård's ElGamal. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura Toward the Fair Anonymous Signatures: Deniable Ring Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Dan Boneh, Xavier Boyen, Shai Halevi Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Dag Arne Osvik, Adi Shamir, Eran Tromer Cache Attacks and Countermeasures: The Case of AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, memory access
41Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Pim Tuyls, Lejla Batina RFID-Tags for Anti-counterfeiting. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Physical Unclonable Function (PUF), authentication, RFID, ECC, counterfeiting
41Xiaojian Tian, Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MT-authenticator, BCK-model, CK-model, Verifiable Encryption
41Eli Biham, Orr Dunkelman, Nathan Keller Related-Key Impossible Differential Attacks on 8-Round AES-192. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF related-key differentials, AES, impossible differentials
41Michael Szydlo, Yiqun Lisa Yin Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature, MD5, SHA-1, padding, hash collision
41Kai Schramm, Christof Paar Higher Order Masking of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Countermeasure, AES
41Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann Block Ciphers Sensitive to Gröbner Basis Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Shaoquan Jiang, Guang Gong A Round and Communication Efficient Secure Ranking Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Orr Dunkelman, Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Alfred Menezes (eds.) Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Lan Nguyen Accumulators from Bilinear Pairings and Applications. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators
41Philip D. MacKenzie, Sarvar Patel Hard Bits of the Discrete Log with Applications to Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Dan Boneh, Jonathan Katz Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public-key encryption, Identity-based encryption, Chosen-ciphertext security
41Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 A Fast Correlation Attack on the Shrinking Generator. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Linear feedback shift register, Fast correlation attack, Shrinking generator
41Stefan Mangard, Thomas Popp, Berndt M. Gammel Side-Channel Leakage of Masked CMOS Gates. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Fabien Laguillaumie, Damien Vergnaud Time-Selective Convertible Undeniable Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Convertible undeniable signatures, time-selective conversion, anonymity, bilinear maps, exact security
41Zvi Gutterman, Dahlia Malkhi Hold Your Sessions: An Attack on Java Session-Id Generation. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF space-time tradeoff, HTTP, web security, pseudo random number generators
41Mihir Bellare, Haixia Shi, Chong Zhang Foundations of Group Signatures: The Case of Dynamic Groups. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41James A. Muir, Douglas R. Stinson New Minimal Weight Representations for Left-to-Right Window Methods. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Cynthia Dwork Sub-linear Queries Statistical Databases: Privacy with Power. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Michel Abdalla, David Pointcheval Simple Password-Based Encrypted Key Exchange Protocols. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encrypted key exchange, Password, Diffie-Hellman assumptions
41Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck CryptoGraphics: Secret Key Cryptography Using Graphics Cards. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES
41Tsz Hon Yuen, Victor K. Wei Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Frances F. Yao, Yiqun Lisa Yin Design and Analysis of Password-Based Key Derivation Functions. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Noel McCullagh, Paulo S. L. M. Barreto A New Two-Party Identity-Based Authenticated Key Agreement. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear maps, Tate pairing, identity-based cryptography, authenticated key agreement
41Yang Cui 0001, Kazukuni Kobara, Hideki Imai A Generic Conversion with Optimal Redundancy. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41An Braeken, Christopher Wolf, Bart Preneel A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Nick Howgrave-Graham, Joseph H. Silverman, William Whyte Choosing Parameter Sets forwithand. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inversion in GF(2n), smart card implementation, AES, S-box, composite fields
41Michael Szydlo, Burton S. Kaliski Jr. Proofs for Two-Server Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concrete security reduction, secret sharing, password authentication
41Olivier Billet, Henri Gilbert Resistance of SNOW 2.0 Against Algebraic Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SNOW 2.0, stream ciphers, algebraic attacks
41Amir Herzberg On Tolerant Cryptographic Constructions. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Vincent Rijmen, Elisabeth Oswald Update on SHA-1. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions
41Tatsuaki Okamoto (eds.) Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai Bit String Commitment Reductions with a Non-zero Rate. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Kenneth G. Paterson, Arnold K. L. Yau Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF padding oracle attack, CBC-mode encryption, ISO standard
41Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn A Certificate-Based Signature Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Maneli Noorkami, Faramarz Fekri A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, LDPC codes
41Jean-Sébastien Coron, David Naccache Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fiat-Shamir Identification Protocol, Zero-knowledge
41Stefan Mangard Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Qinglin Jiang, Douglas S. Reeves, Peng Ning Improving Robustness of PGP Keyrings by Conflict Detection. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen Periodic Properties of Counter Assisted Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Stream cipher, diversity, period, counter, degeneracy, Rabbit
41Quang Viet Duong, Kaoru Kurosawa Almost Ideal Contrast Visual Cryptography with Reversing. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ideal contrast, perfect black, Visual cryptography
41Raphael Chung-Wei Phan Related-Key Attacks on Triple-DES and DESX Variants. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Willi Geiselmann, Rainer Steinwandt Yet Another Sieving Device. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Roar Lien, Tim Grembowski, Kris Gaj A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Alexandra Boldyreva, Nut Taesombut Online Encryption Schemes: New Security Notions and Constructions. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Daniel Bleichenbacher Compressing Rabin Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Marc Fischlin Fast Verification of Hash Chains. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hash tree, Hash function, Certificate, hash chain
41Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih Design of AES Based on Dual Cipher and Composite Field. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Swee-Huay Heng, Kaoru Kurosawa k-Resilient Identity-Based Encryption in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption
41Alfred Menezes, Edlyn Teske, Annegret Weng Weak Fields for ECC. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Kemal Bicakci, Nazife Baykal Server Assisted Signatures Revisited. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF server-assisted signature, pervasive computing, digital signature, one-time signature
Displaying result #601 - #700 of 3211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license