The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Luís T. A. N. Brandão Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme). Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Christophe Petit 0001, Michiel Kosters, Ange Messeng Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi On Public Key Encryption from Noisy Codewords. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Ran Cohen Asynchronous Secure Multiparty Computation in Constant Time. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Jan Camenisch, Manu Drijvers, Anja Lehmann Universally Composable Direct Anonymous Attestation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang Indistinguishability Obfuscation with Non-trivial Efficiency. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Ran Canetti, Daniel Shahaf, Margarita Vald Universally Composable Authentication and Key-Exchange with Global PKI. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Samuel Neves, Mehdi Tibouchi Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Allison Bishop, Valerio Pastro Robust Secret Sharing Schemes Against Local Adversaries. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Yu Chen 0003, Baodong Qin, Jiang Zhang 0001, Yi Deng 0002, Sherman S. M. Chow Non-Malleable Functions and Their Applications. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Jonathan Katz (eds.) Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Patrik Lantz, Björn Johansson 0006, Martin Hell, Ben J. M. Smeets Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Mihir Bellare, Sriram Keelveedhi Interactive Message-Locked Encryption and Secure Deduplication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi How Secure is Deterministic Encryption? Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Vadim Lyubashevsky, Daniel Wichs Simple Lattice Trapdoor Sampling from a Broad Class of Distributions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Benoît Libert, Marc Joye, Moti Yung, Thomas Peters Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Fabrice Benhamouda, David Pointcheval Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Romain Gay, Pierrick Méaux, Hoeteck Wee Predicate Encryption for Multi-dimensional Range Queries from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré Divisible E-Cash Made Practical. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Gilles Barthe, Edvard Fagerholm, Dario Fiore 0001, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Dennis Hofheinz, Jessica Koch, Christoph Striecks Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Allison B. Lewko, Sarah Meiklejohn A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval Simple Functional Encryption Schemes for Inner Products. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan Tightly-Secure Signatures from Chameleon Hash Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28David Cash, Rafael Dowsley, Eike Kiltz Digital Signatures from Strong RSA without Prime Generation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Florian Bergsma, Tibor Jager, Jörg Schwenk One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Ryo Hiromasa, Masayuki Abe, Tatsuaki Okamoto Packing Messages and Optimizing Bootstrapping in GSW-FHE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Emmanuela Orsini, Joop van de Pol, Nigel P. Smart Bootstrapping BGV Ciphertexts with a Wider Choice of p and q. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Shengli Liu 0001, Kenneth G. Paterson Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Jan Camenisch, Robert R. Enderlein, Gregory Neven Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge On the Selective Opening Security of Practical Public-Key Encryption Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Marta Conde Pena, Jean-Charles Faugère, Ludovic Perret Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Phong Q. Nguyen, Jiang Zhang 0001, Zhenfeng Zhang Simpler Efficient Group Signatures from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umaña A Polynomial-Time Attack on the BBCRS Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Shuji Kijima, Ravi Montenegro Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Ignacio Cascudo, Ivan Damgård, Bernardo Machado David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti Additively Homomorphic UC Commitments with Optimal Amortized Overhead. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Nico Döttling Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Pyrros Chaidos, Jens Groth Making Sigma-Protocols Non-interactive Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran 0001, Amit Sahai On the Practical Security of Inner Product Functional Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi 0001 A Tamper and Leakage Resilient von Neumann Architecture. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28David Bernhard, Marc Fischlin, Bogdan Warinschi Adaptive Proofs of Knowledge in the Random Oracle Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss Anonymous Transferable E-Cash. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Jacob Alperin-Sheriff Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Robert Granger, Michael Scott Faster ECC over \mathbb F_2^521-1. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28San Ling, Khoa Nguyen 0002, Huaxiong Wang Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Hugo Krawczyk (eds.) Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow Elliptic Curve Cryptography in Practice. Search on Bibsonomy Financial Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Sebastian Pape 0001 Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. Search on Bibsonomy Financial Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Benoît Libert, Moti Yung, Marc Joye, Thomas Peters Traceable Group Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi Scale-Invariant Fully Homomorphic Encryption over the Integers. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Eike Kiltz, Daniel Masny, Krzysztof Pietrzak Simple Chosen-Ciphertext Security from Low-Noise LPN. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Dana Dachman-Soled A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Elette Boyle, Shafi Goldwasser, Ioana Ivan Functional Signatures and Pseudorandom Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn Related Randomness Attacks for Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Stefano Tessaro, David A. Wilson Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser 0001, Andreas Peter General Impossibility of Group Homomorphic Encryption in the Quantum World. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Susan Hohenberger, Brent Waters Online/Offline Attribute-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Yannick Seurin On the Lossiness of the Rabin Trapdoor Function. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Jesper Buus Nielsen, Daniele Venturi 0001, Angela Zottarel Leakage-Resilient Signatures with Graceful Degradation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Baodong Qin, Shengli Liu 0001 Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Florian Böhl, Gareth T. Davies, Dennis Hofheinz Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Yong Li 0021, Sven Schäge, Zheng Yang 0005, Florian Kohlar, Jörg Schwenk On the Security of the Pre-shared Key Ciphersuites of TLS. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Stanislaw Jarecki Practical Covert Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Mihir Bellare, Georg Fuchsbauer Policy-Based Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Elena Kirshanova Proxy Re-encryption from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann Discrete Logarithm in GF(2809) with FFS. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Gengran Hu, Yanbin Pan, Feng Zhang Solving Random Subset Sum Problem by l p -norm SVP Oracle. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret Lazy Modulus Switching for the BKW Algorithm on LWE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Dario Catalano, Dario Fiore 0001, Rosario Gennaro, Luca Nizzardo Generalizing Homomorphic MACs for Arithmetic Circuits. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Alex Escala, Jens Groth Fine-Tuning Groth-Sahai Proofs. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill Enhanced Chosen-Ciphertext Security and Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Sébastien Canard, David Pointcheval, Olivier Sanders Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Joppe W. Bos, Craig Costello, Andrea Miele Elliptic and Hyperelliptic Curves: A Practical Security Analysis. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Dana Dachman-Soled On Minimal Assumptions for Sender-Deniable Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Shota Yamada 0001, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Chongwon Cho, Sanjam Garg, Rafail Ostrovsky Cross-Domain Secure Computation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Ran Canetti, Omer Paneth, Dimitrios Papadopoulos 0001, Nikos Triandopoulos Verifiable Set Operations over Outsourced Databases. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam Verifiable Oblivious Storage. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Adeline Langlois, San Ling, Khoa Nguyen 0002, Huaxiong Wang Lattice-Based Group Signature Scheme with Verifier-Local Revocation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Takahiro Matsuda 0002, Goichiro Hanaoka Chosen Ciphertext Security via UCE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Kaoru Kurosawa, Goichiro Hanaoka (eds.) Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn Verifiable Elections That Scale for Free. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Zvika Brakerski, Craig Gentry, Shai Halevi Packed Ciphertexts in LWE-Based Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Nuttapong Attrapadung, Benoît Libert, Thomas Peters Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo Tagged One-Time Signatures: Tight Security and Optimal Tag Size. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Eduarda S. V. Freire 0001, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson Non-Interactive Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Yannick Seurin New Constructions and Applications of Trapdoor DDH Groups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Zhengan Huang, Shengli Liu 0001, Baodong Qin Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Manuel Barbosa, Pooya Farshim On the Semantic Security of Functional Encryption Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud 0001, Guénaël Renault, Soline Renner, Rina Zeitoun Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 18658 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license