Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu |
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 420, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand 0001 |
Zero-Knowledge Proof of Decryption for FHE Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 26, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Louis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado |
Excalibur Key-Generation Protocols For DAG Hierarchic Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1177, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui |
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1034, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Xingbing Fu, Xuyun Nie, Ting Wu 0001, Fagen Li |
Large universe attribute based access control with efficient decryption in cloud storage system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 135, pp. 157-164, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou |
Analysis of an ABE Scheme with Verifiable Outsourced Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 18(1), pp. 176, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Stephen B. Wicker |
Forced Decryption and the Fifth Amendment: A Technical Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. IEEE ![In: Proc. IEEE 106(1), pp. 3-6, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang |
Efficient identity-based threshold decryption scheme from bilinear pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. ![In: Frontiers Comput. Sci. 12(1), pp. 177-189, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Muder Almiani, Abdul Razaque, Toufik Aidja, Ayman Al-Dmour |
Context-aware latency reduction protocol for secure encryption and decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. High Perform. Comput. Netw. ![In: Int. J. High Perform. Comput. Netw. 12(3), pp. 251-260, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Anatoliy Kovalchuk, Nataliia Lotoshynska |
Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSMP ![In: Second International Conference on Data Stream Mining & Processing, DSMP 2018, Lviv, Ukraine, August 21-25, 2018, pp. 542-544, 2018, IEEE, 978-1-5386-2874-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Ivan Tsmots, Yurii Tsymbal, Viktor Khavalko, Oleksa Skorokhoda, Taras Teslyuk |
Neural-Like Means for Data Streams Encryption and Decryption in Real Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSMP ![In: Second International Conference on Data Stream Mining & Processing, DSMP 2018, Lviv, Ukraine, August 21-25, 2018, pp. 438-443, 2018, IEEE, 978-1-5386-2874-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Gaurav Pareek, B. R. Purushothama |
Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 11th International Conference on Security of Information and Networks, SIN 2018, Cardiff, United Kingdom, September 10-12, 2018, pp. 10:1-10:7, 2018, ACM, 978-1-4503-6608-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Cong Li, Xiaoyuan Yang 0002, Yazhou Liu, Xu An Wang 0001 |
The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS (3) ![In: Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III, pp. 707-719, 2018, Springer, 978-3-030-00011-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Yusuke Izawa, Shoko Imaizumi, Hitoshi Kiya |
A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSIPA ![In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2018, Honolulu, HI, USA, November 12-15, 2018, pp. 1106-1112, 2018, IEEE, 978-9-8814-7685-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain |
A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMS ![In: Mathematical Software - ICMS 2018 - 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedings, pp. 45-54, 2018, Springer, 978-3-319-96417-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Changhee Hahn, Hyunsoo Kwon, Junbeom Hur |
Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, July 2-7, 2018, pp. 920-923, 2018, IEEE Computer Society, 978-1-5386-7235-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Harshad R. Pawar, Dinesh G. Harkut |
Classical and Quantum Cryptography for Image Encryption & Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RICE ![In: Proceedings of the 2018 IEEE International Conference on Research in Intelligent and Computing in Engineering, RICE 2018, San Salvador, El Salvador, August 22-24, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-2599-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Locke Callan, Alenka G. Zajic, Milos Prvulovic |
One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018., pp. 585-602, 2018, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Anissa Farhati, Anis Ben Aicha, Ridha Bouallegue |
Decryption of BSS based encrypted speech without a priori knowledge of the key signal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATSIP ![In: 4th International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2018, Sousse, Tunisia, March 21-24, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-5239-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Fucai Luo, Kunpeng Wang |
Verifiable Decryption for Fully Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings, pp. 347-365, 2018, Springer, 978-3-319-99135-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi |
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 487-501, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Louis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado |
Excalibur Key-Generation Protocols for DAG Hierarchic Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers, pp. 103-120, 2018, Springer, 978-3-030-12145-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Ilyas, Talha Naqash, Sajjad Hussain Shah |
Encryption and Decryption of Mobile Security Using AES and GOST Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2018, New York City, NY, USA, November 8-10, 2018, pp. 769-772, 2018, IEEE, 978-1-5386-7693-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Nasso Chrysochou |
Decryption, Through the Collaboration of Historical Accounts and Technology, of the Hidden Phases of Construction of the Church of the Holy Monastery of Kykko in Cyprus. A Preliminary Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TMM_CH (2) ![In: Transdisciplinary Multispectral Modeling and Cooperation for the Preservation of Cultural Heritage - First International Conference, TMM_CH 2018, Athens, Greece, October 10-13, 2018, Revised Selected Papers, Part II, pp. 88-103, 2018, Springer, 978-3-030-12959-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Yuu Ishida, Junji Shikata, Yohei Watanabe 0001 |
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Cryptogr. ![In: Int. J. Appl. Cryptogr. 3(3), pp. 288-311, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Zechao Liu, Zoe Lin Jiang, Xuan Wang 0002, Xinyi Huang 0001, Siu-Ming Yiu, Kunihiko Sadakane |
Offline/online attribute-based encryption with verifiable outsourced decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 29(7), 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Ching-Nung Yang, Xiaotian Wu, Yung-Chien Chou, Zhangjie Fu |
Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 48, pp. 182-194, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Xingbing Fu, Xunyun Nie, Fagen Li |
Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 19(2), pp. 313-322, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Yinghui Zhang 0002, Xiaofeng Chen 0001, Jin Li 0002, Duncan S. Wong, Hui Li 0006, Ilsun You |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 379, pp. 42-61, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Mohammed Alsaedi |
Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 76(22), pp. 24527-24547, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Xiaofeng Wang, Xiao Han, Jianghuan Xi, Shangping Wang |
Reversible data hiding in encrypted image with separable data extraction from image decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 76(5), pp. 6127-6142, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Juha Partala |
Symmetric Blind Decryption with Perfect Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Networks Commun. ![In: J. Comput. Networks Commun. 2017, pp. 6575907:1-6575907:15, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Magdy Ibrahim ElSharkawy |
Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 9(2), 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Mohammed Alsaedi |
Colored Image Encryption and Decryption Using Chaotic Lorenz System and DCT2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1701.02896, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Emanuele Bellini 0002, Nadir Murru |
A multifactor RSA-like scheme with fast decryption based on Rédei rational functions over the Pell hyperbola. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1709.00696, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Jiguo Li 0001, Fengjie Sha, Yichen Zhang 0003, Xinyi Huang 0001, Jian Shen 0001 |
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2017, pp. 3596205:1-3596205:11, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith-Tone |
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 471, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Atsushi Takayasu, Yohei Watanabe 0001 |
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 323, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
15 | Jun Zhu, Xiaofeng Yuan, Zhinan Gou, Yi Yang 0022 |
面向推荐系统数据安全的无证书门限解密方案 (Certificateless Threshold Decryption Scheme for Data Security of Recommendation System). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 44(11), pp. 253-263, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Francesco Berti, Olivier Pereira, Thomas Peters, François-Xavier Standaert |
On Leakage-Resilient Authenticated Encryption with Decryption Leakages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2017(3), pp. 271-293, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh |
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017, pp. 230-240, 2017, ACM, 978-1-4503-4944-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Yaqian Kang, Zhenhua Liu |
A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017, pp. 223-231, 2017, IEEE Computer Society, 978-1-5386-1600-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Geng Wang, Xiao Zhang, Yanmei Li |
Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers, pp. 223-241, 2017, Springer, 978-3-319-75159-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Jing Li 0006, Zhitao Guan, Xiaojiang Du, Zijian Zhang 0001, Jun Wu 0001 |
An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2017, Paris, France, May 21-25, 2017, pp. 1-6, 2017, IEEE, 978-1-4673-8999-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Mark Dermot Ryan |
Making Decryption Accountable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers, pp. 93-98, 2017, Springer, 978-3-319-71074-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Mark Dermot Ryan |
Making Decryption Accountable (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers, pp. 99-108, 2017, Springer, 978-3-319-71074-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Lijuan Li 0002, Shuguo Li |
High throughput AES encryption/decryption with efficient reordering and merging techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: 27th International Conference on Field Programmable Logic and Applications, FPL 2017, Ghent, Belgium, September 4-8, 2017, pp. 1-4, 2017, IEEE, 978-9-0903-0428-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Zhongmin Dai, Tong-Wei Chua, Dinesh Kumar Balakrishnan, Vrizlynn L. L. Thing |
Chat-App Decryption Key Extraction Through Information Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SG-CRC ![In: A Systems Approach to Cyber Security - Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), Singapore, February 21-22, 2017, pp. 3-18, 2017, IOS Press, 978-1-61499-743-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Hongwei Liu, Ping Zhu, Zehong Chen, Peng Zhang 0029, Zoe Lin Jiang |
Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE/EUC (1) ![In: 2017 IEEE International Conference on Computational Science and Engineering, CSE 2017, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2017, Guangzhou, China, July 21-24, 2017, Volume 1, pp. 556-561, 2017, IEEE Computer Society, 978-1-5386-3220-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Qi Li 0011, Hongbo Zhu 0002 |
Multi-authority attribute-based access control scheme in mHealth cloud with unbounded attribute universe and decryption outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCSP ![In: 9th International Conference on Wireless Communications and Signal Processing, WCSP 2017, Nanjing, China, October 11-13, 2017, pp. 1-7, 2017, IEEE, 978-1-5386-2062-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Atsushi Takayasu, Yohei Watanabe 0001 |
Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP (1) ![In: Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I, pp. 184-204, 2017, Springer, 978-3-319-60054-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Yunling Wang, Jianfeng Wang, Shifeng Sun 0001, Joseph K. Liu, Willy Susilo, Xiaofeng Chen 0001 |
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings, pp. 24-38, 2017, Springer, 978-3-319-68636-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Yohei Watanabe 0001, Keita Emura, Jae Hong Seo |
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings, pp. 432-449, 2017, Springer, 978-3-319-52152-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Baodong Qin, Qinglan Zhao, Dong Zheng 0001, Hui Cui 0001 |
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers, pp. 504-514, 2017, Springer, 978-3-030-02640-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Ping Bai, Wei Zhang, Zhenlin Li, Xu An Wang 0001 |
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: Advances in Internetworking, Data & Web Technologies, The 5th International Conference on Emerging Internetworking, Data & Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017., pp. 199-211, 2017, Springer, 978-3-319-59462-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Zhenlin Li, Wei Zhang, Yitao Ding, Ping Bai |
A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: Advances in Internetworking, Data & Web Technologies, The 5th International Conference on Emerging Internetworking, Data & Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017., pp. 54-63, 2017, Springer, 978-3-319-59462-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Zhan-Jun Wang, Hai-Ying Ma, Jin-Hua Wang |
Attribute-Based Online/Offline Encryption with Outsourcing Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 32(6), pp. 1595-1611, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Bartosz Czaplewski |
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 40, pp. 1-13, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Chih-Yang Lin, Kahlil Muchtar, Chia-Hung Yeh, Chun-Shien Lu |
Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 38, pp. 858-871, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Shaowu Mao, Huanguo Zhang, Wanqing Wu, Houzhen Wang |
Multi-bit LWE-based encryption scheme without decryption errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Embed. Syst. ![In: Int. J. Embed. Syst. 8(1), pp. 24-33, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Fatma Elgendy, Amany M. Sarhan, Tarek E. Eltobely, Said Fathy El-Zoghdy, Hala S. El-sayed, Osama S. Faragallah |
Chaos-based model for encryption and decryption of digital images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 75(18), pp. 11529-11553, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yao-Tang Chang, Yih-Chuan Lin |
Dynamic reconfigurable encryption and decryption with chaos/M-sequence mapping algorithm for secure H.264/AVC video streaming over OCDMA passive optical network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 75(16), pp. 9837-9859, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yusuke Sakai 0001, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta |
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 630, pp. 95-116, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Dur-e-Shahwar Kundi, Arshad Aziz, Nassar Ikram |
A high performance ST-Box based unified AES encryption/decryption architecture on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 41, pp. 37-46, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Kai Zhang, Jianfeng Ma 0001, Jiajia Liu 0001, Hui Li 0005 |
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 59(9), pp. 99105, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Shahram Mossayebi, Rüdiger Schack |
Concrete Security Against Adversaries with Quantum Superposition Access to Encryption and Decryption Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1609.03780, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Blake Anderson, Subharthi Paul, David A. McGrew |
Deciphering Malware's use of TLS (without Decryption). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1607.01639, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Ahmad Steef, Mohammad Nur Shamma, A. Alkhatib |
RSA algorithm with a new approach encryption and decryption message text by ascii. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1610.08832, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Felix Wu |
No easy answers in the fight over iPhone decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 59(9), pp. 20-22, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Zhiwei Wang, Wenyang Liu |
CP-ABE with outsourced decryption and directionally hidden policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(14), pp. 2387-2396, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Qihua Wang, Chang Wu Yu 0001, Fagen Li, Huaqun Wang, Lijie Cao |
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(17), pp. 4138-4150, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Xieyang Shen |
An access control scheme with dynamic user management and cloud-aided decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(18), pp. 5659-5672, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki |
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 595, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 |
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 927, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Anders Smedstuen Lund, Martin Strand 0001 |
Decryption phase in Norwegian electronic voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 1002, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang |
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 10, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak |
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 389, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Yohei Watanabe 0001, Keita Emura, Jae Hong Seo |
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 1094, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Xiaohong Ding, Jingyuan Qin, Xin Wang |
一种属性基加密方案的外包解密方法 (Attribute-based Encryption Scheme with Outsourcing Decryption Method). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 43(Z6), pp. 357-360, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng 0001 |
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 13(5), pp. 533-546, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Xu An Wang 0001, Fatos Xhafa, Guangming Wu, Wei Wang |
Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings of the 11th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2016, Soonchunhyang University, Asan, South Korea, November 5-7, 2016., pp. 281-291, 2016, Springer, 978-3-319-49108-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Colleen Heinemann, Sai Shankar Chaduvu, Adam Byerly, Alexander Uskov |
OpenCL and CUDA software implementations of encryption/decryption algorithms for IPsec VPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2016 IEEE International Conference on Electro Information Technology, EIT 2016, Grand Forks, ND, USA, May 19-21, 2016, pp. 765-770, 2016, IEEE, 978-1-4673-9985-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Peng Xu 0003, Jingnan Li, Wei Wang 0088, Hai Jin 0001 |
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, pp. 223-233, 2016, ACM, 978-1-4503-4233-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Narander Kumar, Priyanka Chaudhary |
Implementation of Modified RSA Cryptosystem for Data Encryption and Decryption based on n Prime number and Bit Stuffing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTCS ![In: ICTCS, pp. 120:1-120:6, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Joseph C. Pry, Richard K. Lomotey |
Energy Consumption Cost Analysis of Mobile Data Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE MS ![In: 2016 IEEE International Conference on Mobile Services, MS 2016, San Francisco, CA, USA, June 27 - July 2, 2016, pp. 178-181, 2016, IEEE Computer Society, 978-1-5090-2625-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Youssef Gahi, Farid Bourennani, Mouhcine Guennoun, Hussein T. Mouftah |
Blind decryption for cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016, pp. 1053-1057, 2016, IEEE Computer Society, 978-1-5090-0679-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz |
On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 27th International Workshop on Database and Expert Systems Applications, DEXA 2016 Workshops, Porto, Portugal, September 5-8, 2016, pp. 19-23, 2016, IEEE Computer Society, 978-1-5090-3635-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Cong Zuo, Jun Shao 0001, Guiyi Wei, Mande Xie, Min Ji 0001 |
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP (1) ![In: Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I, pp. 495-508, 2016, Springer, 978-3-319-40252-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Sanshan Gao, Shunqing Zhang, Michael Fu, Shugong Xu, Weiping Li |
Cost-Efficient Parallel RSA Decryption with Integrated GPGPU and OpenCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld ![In: 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, July 18-21, 2016, pp. 597-602, 2016, IEEE Computer Society, 978-1-5090-2771-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz |
Trusted cloud SQL DBS with on-the-fly AES decryption/encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2016 IEEE International Conference on Big Data (IEEE BigData 2016), Washington DC, USA, December 5-8, 2016, pp. 3666-3675, 2016, IEEE Computer Society, 978-1-4673-9005-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Limin Zhu, Yi Wang 0016, Renfa Li |
Efficient differential fault analysis attacks to AES decryption for low cost sensors in IoTs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2016, Montréal, QC, Canada, May 22-25, 2016, pp. 554-557, 2016, IEEE, 978-1-4799-5341-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yi Wang 0016, Yajun Ha |
High throughput and resource efficient AES encryption/decryption for SANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2016, Montréal, QC, Canada, May 22-25, 2016, pp. 1166-1169, 2016, IEEE, 978-1-4799-5341-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 |
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, pp. 173-190, 2016, 978-3-319-49889-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Hwei-Ming Ying, Noboru Kunihiro |
Decryption of Frequent Password Hashes in Rainbow Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANDAR ![In: Fourth International Symposium on Computing and Networking, CANDAR 2016, Hiroshima, Japan, November 22-25, 2016, pp. 655-661, 2016, IEEE Computer Society, 978-1-5090-2655-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong 0001, Jie Chen 0021 |
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II, pp. 551-569, 2016, Springer, 978-3-319-45740-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Marina Danshina, Andrey Philippovich, Irina Golubeva |
The Methodology of Automated Decryption of Znamenny Chants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIST (Supplement) ![In: Supplementary Proceedings of the Fifth International Conference on Analysis of Images, Social Networks and Texts (AIST 2016), Yekaterinburg, Russia, April 6-8, 2016, pp. 27-41, 2016, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
15 | Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki |
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, pp. 538-558, 2016, Springer, 978-3-662-53139-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
15 | Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng |
Efficient revocable certificateless encryption against decryption key exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 9(3), pp. 158-166, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Bartosz Czaplewski, Roman Rykaczewski |
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Process. ![In: Signal Process. 111, pp. 150-164, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Brian King |
A Dynamic Threshold Decryption Scheme Using Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 17(6), pp. 771-778, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|