|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 917 occurrences of 351 keywords
|
|
|
Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Direct anonymous attestation, User-controlled-anonymity, User-controlled-traceability, Trusted computing, Bilinear maps |
17 | Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro |
On the pseudo-freeness and the CDH assumption. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
CDH assumption, Pseudo-free group, Pseudo-free group with generalized exponential expressions, Weak pseudo-free group |
17 | Zhiguo Wan, Robert H. Deng, Feng Bao 0001, Bart Preneel, Ming Gu 0001 |
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. |
J. Comput. Sci. Technol. |
2009 |
DBLP DOI BibTeX RDF |
security protocol, group key agreement, password-authenticated key exchange |
17 | Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo |
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
modular security proof, provable security, bilinear pairing, authenticated key agreement, perfect forward secrecy |
17 | Feng Hao 0001, Piotr Zielinski |
The Power of Anonymous Veto in Public Discussion. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Dining Cryptographers problem, DC-net, anonymous veto, secure multiparty computation |
17 | Julien Bringer, Hervé Chabanne, Thomas Icart |
Efficient zero-knowledge identification schemes which respect privacy. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
privacy, identification, zero-knowledge |
17 | Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing |
Provably secure and efficient bounded ciphertext policy attribute based encryption. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute based encryption |
17 | Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
Conditional proxy re-encryption secure against chosen-ciphertext attack. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security |
17 | Yang Lu 0001, Jiguo Li 0001 |
Forward-Secure Certificate-Based Encryption. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Wuping Chen, Lei Zhang 0009, Bo Qin, Qianhong Wu, Huanguo Zhang |
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Stanislaw Jarecki, Xiaomin Liu |
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu |
Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Mödersheim |
Algebraic Properties in Alice and Bob Notation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
17 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. |
AAECC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Lei Zhang 0009, Bo Qin, Qianhong Wu, Futai Zhang |
Novel Efficient Certificateless Aggregate Signatures. |
AAECC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Georg Lippold, Colin Boyd, Juan Manuel González Nieto |
Strongly Secure Certificateless Key Agreement. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou 0001 |
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Compact CCA-Secure Encryption for Messages of Arbitrary Length. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Jun Shao, Zhenfu Cao |
CCA-Secure Proxy Re-encryption without Pairings. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance |
17 | Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Conditional proxy re-encryption, random oracle, chosen-ciphertext security |
17 | Jens Bender, Marc Fischlin, Dennis Kügler |
Security Analysis of the PACE Key-Agreement Protocol. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Benjamin Kellermann, Rainer Böhme |
Privacy-Enhanced Event Scheduling. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich |
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Qianhong Wu, Yi Mu 0001, Willy Susilo, Bo Qin, Josep Domingo-Ferrer |
Asymmetric Group Key Agreement. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung |
A New Randomness Extraction Paradigm for Hybrid Encryption. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction |
17 | Huafei Zhu, Feng Bao 0001 |
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security |
17 | Mijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won |
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key. |
ICCSA (2) |
2009 |
DBLP DOI BibTeX RDF |
Known key attack, Authentication, Cryptography, Provable security, Key distribution |
17 | E. Dongna, Qingfeng Cheng, Chuangui Ma |
Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
e-Residue Attack, RSA, Password Authenticated Key Exchange |
17 | Sven Schäge |
Twin Signature Schemes, Revisited. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Muxin Zhou, Zhenfu Cao |
Spatial Encryption under Simpler Assumption. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Lei Zhang 0009, Qianhong Wu, Bo Qin |
Identity-Based Verifiably Encrypted Signatures without Random Oracles. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature |
17 | Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka |
Efficient Non-interactive Universally Composable String-Commitment Schemes. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
non-interactive string commitment, all-but-one trapdoor functions, homomorphism, universal composability |
17 | Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 |
Server-Controlled Identity-Based Authenticated Key Exchange. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Key Exchange, Identity-based Cryptography |
17 | David Galindo |
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
non-interactive proofs, standard model, public key encryption, identity-based encryption |
17 | Giuseppe Ateniese, Karyn Benson, Susan Hohenberger |
Key-Private Proxy Re-encryption. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Huafei Zhu, Feng Bao 0001 |
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
simulator, Oblivious transfer, universally composable |
17 | Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata |
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
selective/all conversion, RSA, standard model, undeniable signature |
17 | Neil Costigan, Peter Schwabe |
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation |
17 | Ueli M. Maurer |
Unifying Zero-Knowledge Proofs of Knowledge. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Stanislaw Jarecki, Xiaomin Liu |
Private Mutual Authentication and Conditional Oblivious Transfer. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Supachai Tangwongsan, Sathaporn Kassuvan |
A highly effective model for security protection against eavesdropping exploits. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
security protection, voice eavesdropping, voice encryption, security model, key exchange |
17 | Vanesa Daza, Javier Herranz, Germán Sáez |
On the Computational Security of a Distributed Key Distribution Scheme. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Xiaolei Dong, Zhenfu Cao, Licheng Wang |
New designing of cryptosystems based on quadratic fields. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
quadratic field cryptography, quadratic fields, provable security, public key cryptosystem |
17 | Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang |
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
ellipse curve, bilinear pairing, group key agreement, secure group communication |
17 | Shuhua Wu, Yuefei Zhu |
Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
three-party, password, forward-secure |
17 | Roland Schmitz |
Public Key Cryptography: A Dynamical Systems Perspective. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki |
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
concurrent proofs of knowledge, equiocable homomorphic commitment, forking lemma, multisignatures |
17 | Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
HMAC is a randomness extractor and applications to TLS. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
key extraction, TLS, HMAC, randomness extraction |
17 | Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters |
Black-box accountable authority identity-based encryption. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
accountable authority, identity-based encryption |
17 | Emmanuel Bresson, Mark Manulis |
Securing group key exchange against strong corruptions. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
authenticated group key exchange, strong corruptions, mutual authentication, contributiveness, insider attacks |
17 | Benoît Libert, Damien Vergnaud |
Multi-use unidirectional proxy re-signatures. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
multi-use proxy re-cryptography, unidirectionality, digital signatures |
17 | Yvo Desmedt, Tanja Lange 0001 |
Revisiting Pairing Based Group Key Exchange. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Key Distribution, Pairings, Forward Security, Group Key Exchange |
17 | Piyi Yang, Zhenfu Cao, Xiaolei Dong |
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack |
17 | Michael Ho, Yu-Ying Shih |
Fast parallel bio-molecular logic computing algorithms of discrete logarithm. |
BIBE |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yael Tauman Kalai, Xin Li 0006, Anup Rao 0001, David Zuckerman |
Network Extractor Protocols. |
FOCS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Qingsong Ye, Huaxiong Wang, Christophe Tartary |
Privacy-Preserving Distributed Set Intersection. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
privacy-preserving set intersection, homomorphic encryption |
17 | Hongji Wang, Gang Yao, Qingshan Jiang |
An Identity-Based Group Key Agreement Protocol from Pairing. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Kristina Altmann, Tibor Jager, Andy Rupp |
On Black-Box Ring Extraction and Integer Factorization. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Vipul Goyal, Abhishek Jain 0002, Omkant Pandey, Amit Sahai |
Bounded Ciphertext Policy Attribute Based Encryption. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Manoj Prabhakaran 0001, Mike Rosulek |
Homomorphic Encryption with CCA Security. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Wei Gao 0007, Guilin Wang, Xueli Wang, Fei Li 0006 |
One-Round ID-Based Blind Signature Scheme without ROS Assumption. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta |
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Recipient Anonymity, Access Control on Encrypted Data, Attribute-Based Encryption, Ciphertext Policy |
17 | Zecheng Wang, Taozhi Si, Haifeng Qian, Zhibin Li 0005 |
A CDH-Based Multi-Signature Scheme with Tight Security Reduction. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Xiaofeng Chen 0004, Dengguo Feng |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Zhenjie Huang, Xuanzhi Lin, Rufen Huang |
Certificateless Concurrent Signature Scheme. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Antony Chung, Utz Roedig |
DHB-KEY: An efficient key distribution scheme for wireless sensor networks. |
MASS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Shay Gueron, Michael E. Kounavis |
A Technique for Accelerating Characteristic 2 Elliptic Curve Cryptography. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
|
17 | HyunGon Kim, ByeongKyun Oh |
Secure and low latency handoff scheme for proxy mobile IPv6. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
MAG, low latency handoff, session, AAA, proxy mobile IPv6 |
17 | Vinodh Gopal, Satyajit Grover, Michael E. Kounavis |
Fast multiplication techniques for public key cryptography. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Vladimir Shpilrain |
Cryptanalysis of Stickel's Key Exchange Scheme. |
CSR |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Sebastian Faust, Emilia Käsper, Stefan Lucks |
Efficient Simultaneous Broadcast. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yaling Zhang, Jing Zhang, Yikun Zhang |
Multi-signers Strong Designated Verifier Signature Scheme. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Multi-signers, Designated Verifier Signature |
17 | Ernie Brickell, Liqun Chen 0002, Jiangtao Li 0001 |
A New Direct Anonymous Attestation Scheme from Bilinear Maps. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
direct anonymous attestation, the Camenisch-Lysyanskaya signature scheme, elliptic curve cryptography, bilinear map, trusted platform module |
17 | Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Signer Anonymity, Identity-Based Signature, Disjunctive Normal Form, Access Structure |
17 | Janet Light, Deepika David |
An efficient security algorithm in mobile computing for resource constrained mobile devices. |
Q2SWinet |
2008 |
DBLP DOI BibTeX RDF |
mobile computing, elliptic curve cryptography, optimal extension fields |
17 | Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe |
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk |
Distributed Private Matching and Set Operations. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
private matching, private set operation, homomorphic encryption |
17 | Yiling Wen, Jianfeng Ma 0001 |
An Aggregate Signature Scheme with Constant Pairing Operations. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao |
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Threshold Multi Authority ABE, Without a central authority |
17 | Guomin Li, Dake He, Wei Guo |
Password-Based Tripartite Key Exchange Protocol with Forward Secrecy. |
RSKT |
2008 |
DBLP DOI BibTeX RDF |
Password-based tripartite authenticated key exchange, Known key attacks, Forward secrecy |
17 | Huafei Zhu |
Round Optimal Universally Composable Oblivious Transfer Protocols. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
Double trap-door cryptosystems, simulator, oblivious transfer, universally composable |
17 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
digital signature, provable security, forward security, key exposure |
17 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Server-Aided Verification Signatures: Definitions and New Constructions. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
Server-aided computation, server-aided verification, BLS, ZSS, untrusted server, random oracle |
17 | Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk |
Universally Composable Security Analysis of TLS. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
TLS/SSL, secure sessions, key exchange, Universal Composability |
17 | Emmanuel Bresson, Jean Monnerat, Damien Vergnaud |
Separation Results on the "One-More" Computational Problems. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
“One-more” problems, Random self-reducible problems, Algebraic algorithms, Black-box reductions |
17 | Spyros S. Magliveras, Wandi Wei, Xukai Zou |
Notes on the CRTDH Group Key Agreement Protocol. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Zhong Xu, Xue Liu 0001, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu |
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 |
State Space Reduction in the Maude-NRL Protocol Analyzer. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Chris Peikert, Brent Waters |
Lossy trapdoor functions and their applications. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
public key encryption, trapdoor functions |
17 | Guo-Lun Luo, Henry Ker-Chang Chang |
A new online auction with convertible authenticated encryption and authentication. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Chao-Wen Chan, Chih-Hao Lin |
A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
secret sharing, key agreement, payment, visual cryptography |
17 | Robert H. Deng, Jian Weng 0001, Shengli Liu 0001, Kefei Chen |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
bilinear pairing, chosen-ciphertext security, Proxy re-encryption |
17 | Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan |
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems |
17 | Chris Peikert, Vinod Vaikuntanathan, Brent Waters |
A Framework for Efficient and Composable Oblivious Transfer. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Cécile Delerablée, David Pointcheval |
Dynamic Threshold Public-Key Encryption. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Wenbo Shi, Injoo Jang, Hyeong Seon Yoo |
A Provable Secure Authentication Protocol Given Forward Secure Session Key. |
APWeb |
2008 |
DBLP DOI BibTeX RDF |
forward secure session key, authentication, key distribution |
17 | Mohamed Layouni, Maki Yoshida, Shingo Okamura |
Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Amjad Gawanmeh, Sofiène Tahar, Leila Jemni Ben Ayed |
Event-B based invariant checking of secrecy in group key protocols. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov |
Protecting bus-based hardware IP by secret sharing. |
DAC |
2008 |
DBLP DOI BibTeX RDF |
cryptography, manufacturing, integrated circuits, computer crime |
Displaying result #701 - #800 of 1148 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|