|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Luís T. A. N. Brandão |
Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 297-326, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Christophe Petit 0001, Michiel Kosters, Ange Messeng |
Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 3-18, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi |
On Public Key Encryption from Noisy Codewords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 417-446, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Ran Cohen |
Asynchronous Secure Multiparty Computation in Constant Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 183-207, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jan Camenisch, Manu Drijvers, Anja Lehmann |
Universally Composable Direct Anonymous Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 234-264, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang |
Indistinguishability Obfuscation with Non-trivial Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 447-462, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy |
Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 359-385, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Ran Canetti, Daniel Shahaf, Margarita Vald |
Universally Composable Authentication and Key-Exchange with Global PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 265-296, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Samuel Neves, Mehdi Tibouchi |
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 19-35, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Allison Bishop, Valerio Pastro |
Robust Secret Sharing Schemes Against Local Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 327-356, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Yu Chen 0003, Baodong Qin, Jiang Zhang 0001, Yi Deng 0002, Sherman S. M. Chow |
Non-Malleable Functions and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (2) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II, pp. 386-416, 2016, Springer, 978-3-662-49386-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jonathan Katz (eds.) |
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![Springer, 978-3-662-46446-5 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Patrik Lantz, Björn Johansson 0006, Martin Hell, Ben J. M. Smeets |
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography Workshops ![In: Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers, pp. 261-273, 2015, Springer, 978-3-662-48050-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Sriram Keelveedhi |
Interactive Message-Locked Encryption and Secure Deduplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 516-538, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi |
How Secure is Deterministic Encryption? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 52-73, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Vadim Lyubashevsky, Daniel Wichs |
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 716-730, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Marc Joye, Moti Yung, Thomas Peters |
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 450-473, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Fabrice Benhamouda, David Pointcheval |
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 332-352, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Romain Gay, Pierrick Méaux, Hoeteck Wee |
Predicate Encryption for Multi-dimensional Range Queries from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 752-776, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré |
Divisible E-Cash Made Practical. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 77-100, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Gilles Barthe, Edvard Fagerholm, Dario Fiore 0001, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi |
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 355-376, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Dennis Hofheinz, Jessica Koch, Christoph Striecks |
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 799-822, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Allison B. Lewko, Sarah Meiklejohn |
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 377-398, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval |
Simple Functional Encryption Schemes for Inner Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 733-751, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan |
Tightly-Secure Signatures from Chameleon Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 256-279, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | David Cash, Rafael Dowsley, Eike Kiltz |
Digital Signatures from Strong RSA without Prime Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 217-235, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Florian Bergsma, Tibor Jager, Jörg Schwenk |
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 477-494, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Ryo Hiromasa, Masayuki Abe, Tatsuaki Okamoto |
Packing Messages and Optimizing Bootstrapping in GSW-FHE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 699-715, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Emmanuela Orsini, Joop van de Pol, Nigel P. Smart |
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 673-698, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Shengli Liu 0001, Kenneth G. Paterson |
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 3-26, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jan Camenisch, Robert R. Enderlein, Gregory Neven |
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 283-307, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge |
On the Selective Opening Security of Practical Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 27-51, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae |
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 150-174, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen |
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 557-578, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Marta Conde Pena, Jean-Charles Faugère, Ludovic Perret |
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 194-213, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Phong Q. Nguyen, Jiang Zhang 0001, Zhenfeng Zhang |
Simpler Efficient Group Signatures from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 401-426, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umaña |
A Polynomial-Time Attack on the BBCRS Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 175-193, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Shuji Kijima, Ravi Montenegro |
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 127-149, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Ignacio Cascudo, Ivan Damgård, Bernardo Machado David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti |
Additively Homomorphic UC Commitments with Optimal Amortized Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 495-515, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Nico Döttling |
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 604-626, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Pyrros Chaidos, Jens Groth |
Making Sigma-Protocols Non-interactive Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 650-670, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran 0001, Amit Sahai |
On the Practical Security of Inner Product Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 777-798, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi 0001 |
A Tamper and Leakage Resilient von Neumann Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 579-603, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | David Bernhard, Marc Fischlin, Bogdan Warinschi |
Adaptive Proofs of Knowledge in the Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 629-649, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss |
Anonymous Transferable E-Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 101-124, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jacob Alperin-Sheriff |
Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 236-255, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Robert Granger, Michael Scott |
Faster ECC over \mathbb F_2^521-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 539-553, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | San Ling, Khoa Nguyen 0002, Huaxiong Wang |
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, pp. 427-449, 2015, Springer, 978-3-662-46446-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Hugo Krawczyk (eds.) |
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![Springer, 978-3-642-54630-3 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow |
Elliptic Curve Cryptography in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pp. 157-175, 2014, Springer, 978-3-662-45471-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Sebastian Pape 0001 |
Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pp. 291-303, 2014, Springer, 978-3-662-45471-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Moti Yung, Marc Joye, Thomas Peters |
Traceable Group Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 592-610, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi |
Scale-Invariant Fully Homomorphic Encryption over the Integers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 311-328, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Eike Kiltz, Daniel Masny, Krzysztof Pietrzak |
Simple Chosen-Ciphertext Security from Low-Noise LPN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 1-18, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled |
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 37-55, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Elette Boyle, Shafi Goldwasser, Ioana Ivan |
Functional Signatures and Pseudorandom Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 501-519, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn |
Related Randomness Attacks for Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 465-482, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Stefano Tessaro, David A. Wilson |
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 257-274, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser 0001, Andreas Peter |
General Impossibility of Group Homomorphic Encryption in the Quantum World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 556-573, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Susan Hohenberger, Brent Waters |
Online/Offline Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 293-310, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Yannick Seurin |
On the Lossiness of the Rabin Trapdoor Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 380-398, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa |
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 95-112, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jesper Buus Nielsen, Daniele Venturi 0001, Angela Zottarel |
Leakage-Resilient Signatures with Graceful Degradation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 362-379, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Baodong Qin, Shengli Liu 0001 |
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 19-36, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Florian Böhl, Gareth T. Davies, Dennis Hofheinz |
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 483-500, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Yong Li 0021, Sven Schäge, Zheng Yang 0005, Florian Kohlar, Jörg Schwenk |
On the Security of the Pre-shared Key Ciphersuites of TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 669-684, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Stanislaw Jarecki |
Practical Covert Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 611-629, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Georg Fuchsbauer |
Policy-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 520-537, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols |
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 239-256, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Elena Kirshanova |
Proxy Re-encryption from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 77-94, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky |
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 149-166, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann |
Discrete Logarithm in GF(2809) with FFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 221-238, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Gengran Hu, Yanbin Pan, Feng Zhang |
Solving Random Subset Sum Problem by l p -norm SVP Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 399-410, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret |
Lazy Modulus Switching for the BKW Algorithm on LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 429-445, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Dario Catalano, Dario Fiore 0001, Rosario Gennaro, Luca Nizzardo |
Generalizing Homomorphic MACs for Arithmetic Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 538-555, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Alex Escala, Jens Groth |
Fine-Tuning Groth-Sahai Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 630-649, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill |
Enhanced Chosen-Ciphertext Security and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 329-344, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi |
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 411-428, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Sébastien Canard, David Pointcheval, Olivier Sanders |
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 167-184, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Joppe W. Bos, Craig Costello, Andrea Miele |
Elliptic and Hyperelliptic Curves: A Practical Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 203-220, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled |
On Minimal Assumptions for Sender-Deniable Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 574-591, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Shota Yamada 0001, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro |
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 275-292, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Chongwon Cho, Sanjam Garg, Rafail Ostrovsky |
Cross-Domain Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 650-668, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa |
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 446-464, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun |
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 185-202, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Ran Canetti, Omer Paneth, Dimitrios Papadopoulos 0001, Nikos Triandopoulos |
Verifiable Set Operations over Outsourced Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 113-130, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam |
Verifiable Oblivious Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 131-148, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Adeline Langlois, San Ling, Khoa Nguyen 0002, Huaxiong Wang |
Lattice-Based Group Signature Scheme with Verifier-Local Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 345-361, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Chosen Ciphertext Security via UCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 56-76, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Kaoru Kurosawa, Goichiro Hanaoka (eds.) |
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![Springer, 978-3-642-36361-0 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn |
Verifiable Elections That Scale for Free. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 479-496, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Zvika Brakerski, Craig Gentry, Shai Halevi |
Packed Ciphertexts in LWE-Based Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 1-13, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Nuttapong Attrapadung, Benoît Libert, Thomas Peters |
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 386-404, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo |
Tagged One-Time Signatures: Tight Security and Optimal Tag Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 312-331, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Eduarda S. V. Freire 0001, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson |
Non-Interactive Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 254-271, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Yannick Seurin |
New Constructions and Applications of Trapdoor DDH Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 443-460, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Zhengan Huang, Shengli Liu 0001, Baodong Qin |
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 369-385, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud |
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 272-291, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Manuel Barbosa, Pooya Farshim |
On the Semantic Security of Functional Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 143-161, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud 0001, Guénaël Renault, Soline Renner, Rina Zeitoun |
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings, pp. 198-215, 2013, Springer, 978-3-642-36361-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 18658 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|