The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
15Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand 0001 Zero-Knowledge Proof of Decryption for FHE Ciphertexts. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
15Louis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado Excalibur Key-Generation Protocols For DAG Hierarchic Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
15Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
15Xingbing Fu, Xuyun Nie, Ting Wu 0001, Fagen Li Large universe attribute based access control with efficient decryption in cloud storage system. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Search on Bibsonomy Sensors The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Stephen B. Wicker Forced Decryption and the Fifth Amendment: A Technical Perspective. Search on Bibsonomy Proc. IEEE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang Efficient identity-based threshold decryption scheme from bilinear pairings. Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Muder Almiani, Abdul Razaque, Toufik Aidja, Ayman Al-Dmour Context-aware latency reduction protocol for secure encryption and decryption. Search on Bibsonomy Int. J. High Perform. Comput. Netw. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Anatoliy Kovalchuk, Nataliia Lotoshynska Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images. Search on Bibsonomy DSMP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Ivan Tsmots, Yurii Tsymbal, Viktor Khavalko, Oleksa Skorokhoda, Taras Teslyuk Neural-Like Means for Data Streams Encryption and Decryption in Real Time. Search on Bibsonomy DSMP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Gaurav Pareek, B. R. Purushothama Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost. Search on Bibsonomy SIN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Cong Li, Xiaoyuan Yang 0002, Yazhou Liu, Xu An Wang 0001 The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability. Search on Bibsonomy ICCCS (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Yusuke Izawa, Shoko Imaizumi, Hitoshi Kiya A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption. Search on Bibsonomy APSIPA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors). Search on Bibsonomy ICMS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Changhee Hahn, Hyunsoo Kwon, Junbeom Hur Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. Search on Bibsonomy IEEE CLOUD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Harshad R. Pawar, Dinesh G. Harkut Classical and Quantum Cryptography for Image Encryption & Decryption. Search on Bibsonomy RICE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Locke Callan, Alenka G. Zajic, Milos Prvulovic One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2018 DBLP  BibTeX  RDF
15Anissa Farhati, Anis Ben Aicha, Ridha Bouallegue Decryption of BSS based encrypted speech without a priori knowledge of the key signal. Search on Bibsonomy ATSIP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Fucai Luo, Kunpeng Wang Verifiable Decryption for Fully Homomorphic Encryption. Search on Bibsonomy ISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Louis Goubin, Geraldine Monsalve, Juan L. Reutter, Francisco José Vial Prado Excalibur Key-Generation Protocols for DAG Hierarchic Decryption. Search on Bibsonomy ICISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Muhammad Ilyas, Talha Naqash, Sajjad Hussain Shah Encryption and Decryption of Mobile Security Using AES and GOST Algorithms. Search on Bibsonomy UEMCON The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Nasso Chrysochou Decryption, Through the Collaboration of Historical Accounts and Technology, of the Hidden Phases of Construction of the Church of the Holy Monastery of Kykko in Cyprus. A Preliminary Report. Search on Bibsonomy TMM_CH (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
15Yuu Ishida, Junji Shikata, Yohei Watanabe 0001 CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Zechao Liu, Zoe Lin Jiang, Xuan Wang 0002, Xinyi Huang 0001, Siu-Ming Yiu, Kunihiko Sadakane Offline/online attribute-based encryption with verifiable outsourced decryption. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Ching-Nung Yang, Xiaotian Wu, Yung-Chien Chou, Zhangjie Fu Constructions of general (k, n) reversible AMBTC-based visual cryptography with two decryption options. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Xingbing Fu, Xunyun Nie, Fagen Li Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2017 DBLP  BibTeX  RDF
15Yinghui Zhang 0002, Xiaofeng Chen 0001, Jin Li 0002, Duncan S. Wong, Hui Li 0006, Ilsun You Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Search on Bibsonomy Inf. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Mohammed Alsaedi Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Xiaofeng Wang, Xiao Han, Jianghuan Xi, Shangping Wang Reversible data hiding in encrypted image with separable data extraction from image decryption. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Juha Partala Symmetric Blind Decryption with Perfect Secrecy. Search on Bibsonomy J. Comput. Networks Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Magdy Ibrahim ElSharkawy Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2017 DBLP  BibTeX  RDF
15Mohammed Alsaedi Colored Image Encryption and Decryption Using Chaotic Lorenz System and DCT2. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
15Emanuele Bellini 0002, Nadir Murru A multifactor RSA-like scheme with fast decryption based on Rédei rational functions over the Pell hyperbola. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
15Jiguo Li 0001, Fengjie Sha, Yichen Zhang 0003, Xinyi Huang 0001, Jian Shen 0001 Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Jacob Alperin-Sheriff, Jintai Ding, Albrecht Petzoldt, Daniel Smith-Tone Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
15Atsushi Takayasu, Yohei Watanabe 0001 Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
15Jun Zhu, Xiaofeng Yuan, Zhinan Gou, Yi Yang 0022 面向推荐系统数据安全的无证书门限解密方案 (Certificateless Threshold Decryption Scheme for Data Security of Recommendation System). Search on Bibsonomy 计算机科学 The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Francesco Berti, Olivier Pereira, Thomas Peters, François-Xavier Standaert On Leakage-Resilient Authenticated Encryption with Decryption Leakages. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. Search on Bibsonomy AsiaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Yaqian Kang, Zhenhua Liu A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Geng Wang, Xiao Zhang, Yanmei Li Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes). Search on Bibsonomy Inscrypt The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Jing Li 0006, Zhitao Guan, Xiaojiang Du, Zijian Zhang 0001, Jun Wu 0001 An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Mark Dermot Ryan Making Decryption Accountable. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Mark Dermot Ryan Making Decryption Accountable (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Lijuan Li 0002, Shuguo Li High throughput AES encryption/decryption with efficient reordering and merging techniques. Search on Bibsonomy FPL The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Zhongmin Dai, Tong-Wei Chua, Dinesh Kumar Balakrishnan, Vrizlynn L. L. Thing Chat-App Decryption Key Extraction Through Information Flow Analysis. Search on Bibsonomy SG-CRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Hongwei Liu, Ping Zhu, Zehong Chen, Peng Zhang 0029, Zoe Lin Jiang Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage. Search on Bibsonomy CSE/EUC (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Qi Li 0011, Hongbo Zhu 0002 Multi-authority attribute-based access control scheme in mHealth cloud with unbounded attribute universe and decryption outsourcing. Search on Bibsonomy WCSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Atsushi Takayasu, Yohei Watanabe 0001 Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance. Search on Bibsonomy ACISP (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Yunling Wang, Jianfeng Wang, Shifeng Sun 0001, Joseph K. Liu, Willy Susilo, Xiaofeng Chen 0001 Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. Search on Bibsonomy ProvSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Yohei Watanabe 0001, Keita Emura, Jae Hong Seo New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Baodong Qin, Qinglan Zhao, Dong Zheng 0001, Hui Cui 0001 Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure. Search on Bibsonomy CANS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Ping Bai, Wei Zhang, Zhenlin Li, Xu An Wang 0001 Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm. Search on Bibsonomy EIDWT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Zhenlin Li, Wei Zhang, Yitao Ding, Ping Bai A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts. Search on Bibsonomy EIDWT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
15Zhan-Jun Wang, Hai-Ying Ma, Jin-Hua Wang Attribute-Based Online/Offline Encryption with Outsourcing Decryption. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2016 DBLP  BibTeX  RDF
15Bartosz Czaplewski Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Chih-Yang Lin, Kahlil Muchtar, Chia-Hung Yeh, Chun-Shien Lu Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Shaowu Mao, Huanguo Zhang, Wanqing Wu, Houzhen Wang Multi-bit LWE-based encryption scheme without decryption errors. Search on Bibsonomy Int. J. Embed. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Fatma Elgendy, Amany M. Sarhan, Tarek E. Eltobely, Said Fathy El-Zoghdy, Hala S. El-sayed, Osama S. Faragallah Chaos-based model for encryption and decryption of digital images. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yao-Tang Chang, Yih-Chuan Lin Dynamic reconfigurable encryption and decryption with chaos/M-sequence mapping algorithm for secure H.264/AVC video streaming over OCDMA passive optical network. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yusuke Sakai 0001, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Dur-e-Shahwar Kundi, Arshad Aziz, Nassar Ikram A high performance ST-Box based unified AES encryption/decryption architecture on FPGA. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Kai Zhang, Jianfeng Ma 0001, Jiajia Liu 0001, Hui Li 0005 Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Shahram Mossayebi, Rüdiger Schack Concrete Security Against Adversaries with Quantum Superposition Access to Encryption and Decryption Oracles. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Blake Anderson, Subharthi Paul, David A. McGrew Deciphering Malware's use of TLS (without Decryption). Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Ahmad Steef, Mohammad Nur Shamma, A. Alkhatib RSA algorithm with a new approach encryption and decryption message text by ascii. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
15Felix Wu No easy answers in the fight over iPhone decryption. Search on Bibsonomy Commun. ACM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Zhiwei Wang, Wenyang Liu CP-ABE with outsourced decryption and directionally hidden policy. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Qihua Wang, Chang Wu Yu 0001, Fagen Li, Huaqun Wang, Lijie Cao A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Xieyang Shen An access control scheme with dynamic user management and cloud-aided decryption. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
15Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
15Anders Smedstuen Lund, Martin Strand 0001 Decryption phase in Norwegian electronic voting. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
15Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang Eliminating Decryption Failures from the Simple Matrix Encryption Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
15Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
15Yohei Watanabe 0001, Keita Emura, Jae Hong Seo New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
15Xiaohong Ding, Jingyuan Qin, Xin Wang 一种属性基加密方案的外包解密方法 (Attribute-based Encryption Scheme with Outsourcing Decryption Method). Search on Bibsonomy 计算机科学 The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng 0001 Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Xu An Wang 0001, Fatos Xhafa, Guangming Wu, Wei Wang Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage. Search on Bibsonomy 3PGCIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Colleen Heinemann, Sai Shankar Chaduvu, Adam Byerly, Alexander Uskov OpenCL and CUDA software implementations of encryption/decryption algorithms for IPsec VPNs. Search on Bibsonomy EIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Peng Xu 0003, Jingnan Li, Wei Wang 0088, Hai Jin 0001 Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security. Search on Bibsonomy AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Narander Kumar, Priyanka Chaudhary Implementation of Modified RSA Cryptosystem for Data Encryption and Decryption based on n Prime number and Bit Stuffing. Search on Bibsonomy ICTCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Joseph C. Pry, Richard K. Lomotey Energy Consumption Cost Analysis of Mobile Data Encryption and Decryption. Search on Bibsonomy IEEE MS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Youssef Gahi, Farid Bourennani, Mouhcine Guennoun, Hussein T. Mouftah Blind decryption for cloud computing. Search on Bibsonomy ISCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement. Search on Bibsonomy DEXA Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Cong Zuo, Jun Shao 0001, Guiyi Wei, Mande Xie, Min Ji 0001 Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sanshan Gao, Shunqing Zhang, Michael Fu, Shugong Xu, Weiping Li Cost-Efficient Parallel RSA Decryption with Integrated GPGPU and OpenCL. Search on Bibsonomy UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz Trusted cloud SQL DBS with on-the-fly AES decryption/encryption. Search on Bibsonomy IEEE BigData The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Limin Zhu, Yi Wang 0016, Renfa Li Efficient differential fault analysis attacks to AES decryption for low cost sensors in IoTs. Search on Bibsonomy ISCAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yi Wang 0016, Yajun Ha High throughput and resource efficient AES encryption/decryption for SANs. Search on Bibsonomy ISCAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. Search on Bibsonomy INDOCRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Hwei-Ming Ying, Noboru Kunihiro Decryption of Frequent Password Hashes in Rainbow Tables. Search on Bibsonomy CANDAR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong 0001, Jie Chen 0021 Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. Search on Bibsonomy ESORICS (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Marina Danshina, Andrey Philippovich, Irina Golubeva The Methodology of Automated Decryption of Znamenny Chants. Search on Bibsonomy AIST (Supplement) The full citation details ... 2016 DBLP  BibTeX  RDF
15Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
15Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng Efficient revocable certificateless encryption against decryption key exposure. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Bartosz Czaplewski, Roman Rykaczewski Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia. Search on Bibsonomy Signal Process. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Brian King A Dynamic Threshold Decryption Scheme Using Bilinear Pairings. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2015 DBLP  BibTeX  RDF
Displaying result #601 - #700 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license