The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28San Ling, Khoa Nguyen 0002, Damien Stehlé, Huaxiong Wang Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Susan Hohenberger, Brent Waters Attribute-Based Encryption with Fast Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Özgür Dagdelen, Payman Mohassel, Daniele Venturi 0001 Rate-Limited Secure Function Evaluation: Definitions and Constructions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Jae Hong Seo, Keita Emura Revocable Identity-Based Encryption Revisited: Security Model and Construction. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval Tighter Reductions for Forward-Secure Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Takahiro Matsuda 0002, Goichiro Hanaoka Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Kwangsu Lee, Dong Hoon Lee 0001, Moti Yung Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia Robust Encryption, Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Brent Waters Functional Encryption: Origins and Recent Developments. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Yehuda Lindell Techniques for Efficient Secure Computation Based on Yao's Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Ryo Nishimaki, Keita Xagawa Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Dario Catalano, Dario Fiore 0001 Vector Commitments and Their Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda 0002, Shota Yamada 0001 Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Tatsuaki Okamoto, Katsuyuki Takashima Decentralized Attribute-Based Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Jesper Buus Nielsen, Daniele Venturi 0001, Angela Zottarel On the Connection between Leakage Tolerance and Adaptive Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Keita Xagawa Improved (Hierarchical) Inner-Product Encryption from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Marc Fischlin, Johannes Buchmann 0001, Mark Manulis (eds.) Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Arash Hariri, Arash Reyhani-Masoleh On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection. Search on Bibsonomy Fault Analysis in Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Nadia El Mrabet, Dan Page, Frederik Vercauteren Fault Attacks on Pairing-Based Cryptography. Search on Bibsonomy Fault Analysis in Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Nisha Jacob, Sirote Saetang, Chien-Ning Chen, Sebastian Kutzner, San Ling, Axel Poschmann Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, Neil Gershenfeld Cryptography with Asynchronous Logic Automata. Search on Bibsonomy Cryptography and Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Florian Böhl, Dennis Hofheinz, Daniel Kraschewski On Definitions of Selective Opening Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Shota Yamada 0001, Goichiro Hanaoka, Noboru Kunihiro Space Efficient Signature Schemes from the RSA Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Dario Fiore 0001, Vadim Lyubashevsky From Selective to Full Security: Semi-generic Transformations in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Léo Ducas, Alain Durmus Ring-LWE in Polynomial Rings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Sven Schäge Strong Security from Probabilistic Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28David Pointcheval Password-Based Authenticated Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Brett Hemenway, Rafail Ostrovsky On Homomorphic Encryption and Chosen-Ciphertext Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Christophe Clavier, Benoit Feix, Loïc Thierry, Pascal Paillier Generating Provable Primes Efficiently on Embedded Devices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Yusuke Sakai 0001, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Dennis Hofheinz, Tibor Jager, Edward Knapp Waters Signatures with Optimal Security Reduction. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Brett Hemenway, Steve Lu 0001, Rafail Ostrovsky Correlated Product Security from Any One-Way Function. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Hoeteck Wee Public Key Encryption against Related Key Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Udaya Parampalli, Kim Ramchen, Vanessa Teague Efficiently Shuffling in Public. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Jae Hong Seo, Jung Hee Cheon, Jonathan Katz Constant-Round Multi-party Private Set Union Using Reversed Laurent Series. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Koichi Sakumoto Public-Key Identification Schemes Based on Multivariate Cubic Polynomials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Emil Stefanov, Elaine Shi, Dawn Song Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Nelly Fazio, Irippuge Milinda Perera Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Shota Yamada 0001, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Qiong Huang 0001, Duncan S. Wong, Willy Susilo The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Aurélie Bauer, Damien Vergnaud, Jean-Christophe Zapalowicz Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Gottfried Herold Polly Cracker, Revisited, Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Craig Gentry, Shai Halevi, Nigel P. Smart Better Bootstrapping in Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28David Mandell Freeman Improved Security for Linearly Homomorphic Signatures: A Generic Framework. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Brett Hemenway, Rafail Ostrovsky Extended-DDH and Lossy Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Dario Catalano, Dario Fiore 0001, Bogdan Warinschi Efficient Network Coding Signatures in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Enrico Thomae, Christopher Wolf Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Charanjit S. Jutla, Arnab Roy 0001 Relatively-Sound NIZKs and Password-Based Key-Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee Efficient Password Authenticated Key Exchange via Oblivious Transfer. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel DDH-Like Assumptions Based on Extension Rings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28David Cash, Matthew Green 0001, Susan Hohenberger New Definitions and Separations for Circular Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Dominique Schröder, Dominique Unruh Security of Blind Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Jacob Alperin-Sheriff, Chris Peikert Circular and KDM Security for Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar 0001 Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract). Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi (eds.) Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Chen-Mou Cheng Multi-Threaded Implementation for Cryptography and Cryptanalysis. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Tim Güneysu FPGAs in Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Nicolas Sendrier Code-Based Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Daniel J. Bernstein Post-Quantum Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Gilles Brassard, Claude Crépeau Quantum Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Elisa Gorla Torus-Based Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Louis Goubin, Jacques Patarin, Bo-Yin Yang Multivariate Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Darrel Hankerson, Alfred Menezes Elliptic Curve Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Brecht Wyseur White-Box Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Alexander W. Dent Certificateless Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Daniele Micciancio Lattice-Based Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28 Cryptography on Reconfigurable Devices. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Kazue Sako Public Key Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Yvo Desmedt Threshold Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Tommaso Addabbo, Ada Fort, Santina Rocchi, Valerio Vignoli Digitized Chaos for Pseudo-random Number Generation in Cryptography. Search on Bibsonomy Chaos-Based Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Igor Mishkovski, Ljupco Kocarev Chaos-Based Public-Key Cryptography. Search on Bibsonomy Chaos-Based Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Wallace Kit-Sang Tang, Ying Liu 0020 Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography. Search on Bibsonomy Chaos-Based Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Ross J. Anderson, Mike Bond, Omar Choudary 0001, Steven J. Murdoch, Frank Stajano Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. Search on Bibsonomy Financial Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Emilia Käsper Fast Elliptic Curve Cryptography in OpenSSL. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Vivien Dubois, Jean-Gabriel Kammerer Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud Signatures on Randomizable Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Daniel J. Bernstein, Tanja Lange 0001, Peter Schwabe On the Correct Use of the Negation Map in the Pollard rho Method. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Tolga Acar, Lan Nguyen Revocation for Delegatable Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann 0001 Linear Recurring Sequences for the UOV Key Generation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Tomas Toft Sub-linear, Secure Comparison with Two Non-colluding Parties. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Qixiang Mei, Bao Li 0001, Xianhui Lu, Dingding Jia Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Jacob C. N. Schuldt, Kanta Matsuura On-line Non-transferable Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha Oblivious Transfer with Hidden Access Control Policies. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Tatsuaki Okamoto, Katsuyuki Takashima Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Jae Hong Seo Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Matthew Green 0001 Secure Blind Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Jian Weng 0001, Yunlei Zhao, Goichiro Hanaoka On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Luk Bettale, Jean-Charles Faugère, Ludovic Perret Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Dan Boneh, David Mandell Freeman Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 18658 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license