|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | San Ling, Khoa Nguyen 0002, Damien Stehlé, Huaxiong Wang |
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu |
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Susan Hohenberger, Brent Waters |
Attribute-Based Encryption with Fast Decryption. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Özgür Dagdelen, Payman Mohassel, Daniele Venturi 0001 |
Rate-Limited Secure Function Evaluation: Definitions and Constructions. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Jae Hong Seo, Keita Emura |
Revocable Identity-Based Encryption Revisited: Security Model and Construction. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou |
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval |
Tighter Reductions for Forward-Secure Signature Schemes. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Kwangsu Lee, Dong Hoon Lee 0001, Moti Yung |
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia |
Robust Encryption, Revisited. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Brent Waters |
Functional Encryption: Origins and Recent Developments. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Yehuda Lindell |
Techniques for Efficient Secure Computation Based on Yao's Protocol. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Ryo Nishimaki, Keita Xagawa |
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Dario Catalano, Dario Fiore 0001 |
Vector Commitments and Their Applications. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda 0002, Shota Yamada 0001 |
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Tatsuaki Okamoto, Katsuyuki Takashima |
Decentralized Attribute-Based Signatures. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Jesper Buus Nielsen, Daniele Venturi 0001, Angela Zottarel |
On the Connection between Leakage Tolerance and Adaptive Security. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou |
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Keita Xagawa |
Improved (Hierarchical) Inner-Product Encryption from Lattices. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Marc Fischlin, Johannes Buchmann 0001, Mark Manulis (eds.) |
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Arash Hariri, Arash Reyhani-Masoleh |
On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection. |
Fault Analysis in Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Nadia El Mrabet, Dan Page, Frederik Vercauteren |
Fault Attacks on Pairing-Based Cryptography. |
Fault Analysis in Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Nisha Jacob, Sirote Saetang, Chien-Ning Chen, Sebastian Kutzner, San Ling, Axel Poschmann |
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers. |
Selected Areas in Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, Neil Gershenfeld |
Cryptography with Asynchronous Logic Automata. |
Cryptography and Security |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Florian Böhl, Dennis Hofheinz, Daniel Kraschewski |
On Definitions of Selective Opening Security. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Shota Yamada 0001, Goichiro Hanaoka, Noboru Kunihiro |
Space Efficient Signature Schemes from the RSA Assumption. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Dario Fiore 0001, Vadim Lyubashevsky |
From Selective to Full Security: Semi-generic Transformations in the Standard Model. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Léo Ducas, Alain Durmus |
Ring-LWE in Polynomial Rings. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura |
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Sven Schäge |
Strong Security from Probabilistic Signature Schemes. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | David Pointcheval |
Password-Based Authenticated Key Exchange. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Brett Hemenway, Rafail Ostrovsky |
On Homomorphic Encryption and Chosen-Ciphertext Security. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Christophe Clavier, Benoit Feix, Loïc Thierry, Pascal Paillier |
Generating Provable Primes Efficiently on Embedded Devices. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Yusuke Sakai 0001, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta |
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia |
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee |
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Dennis Hofheinz, Tibor Jager, Edward Knapp |
Waters Signatures with Optimal Security Reduction. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Brett Hemenway, Steve Lu 0001, Rafail Ostrovsky |
Correlated Product Security from Any One-Way Function. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Hoeteck Wee |
Public Key Encryption against Related Key Attacks. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang |
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda |
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Udaya Parampalli, Kim Ramchen, Vanessa Teague |
Efficiently Shuffling in Public. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Jae Hong Seo, Jung Hee Cheon, Jonathan Katz |
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Koichi Sakumoto |
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Emil Stefanov, Elaine Shi, Dawn Song |
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Nelly Fazio, Irippuge Milinda Perera |
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Shota Yamada 0001, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro |
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Qiong Huang 0001, Duncan S. Wong, Willy Susilo |
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Aurélie Bauer, Damien Vergnaud, Jean-Christophe Zapalowicz |
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Gottfried Herold |
Polly Cracker, Revisited, Revisited. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Craig Gentry, Shai Halevi, Nigel P. Smart |
Better Bootstrapping in Fully Homomorphic Encryption. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | David Mandell Freeman |
Improved Security for Linearly Homomorphic Signatures: A Generic Framework. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Brett Hemenway, Rafail Ostrovsky |
Extended-DDH and Lossy Trapdoor Functions. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Dario Catalano, Dario Fiore 0001, Bogdan Warinschi |
Efficient Network Coding Signatures in the Standard Model. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Enrico Thomae, Christopher Wolf |
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti |
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Charanjit S. Jutla, Arnab Roy 0001 |
Relatively-Sound NIZKs and Password-Based Key-Exchange. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama |
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee |
Efficient Password Authenticated Key Exchange via Oblivious Transfer. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel |
DDH-Like Assumptions Based on Extension Rings. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | David Cash, Matthew Green 0001, Susan Hohenberger |
New Definitions and Separations for Circular Security. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Dominique Schröder, Dominique Unruh |
Security of Blind Signatures Revisited. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Jacob Alperin-Sheriff, Chris Peikert |
Circular and KDM Security for Identity-Based Encryption. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar 0001 |
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract). |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi (eds.) |
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Chen-Mou Cheng |
Multi-Threaded Implementation for Cryptography and Cryptanalysis. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Tim Güneysu |
FPGAs in Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Nicolas Sendrier |
Code-Based Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Daniel J. Bernstein |
Post-Quantum Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Gilles Brassard, Claude Crépeau |
Quantum Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Elisa Gorla |
Torus-Based Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Louis Goubin, Jacques Patarin, Bo-Yin Yang |
Multivariate Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Darrel Hankerson, Alfred Menezes |
Elliptic Curve Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Brecht Wyseur |
White-Box Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Alexander W. Dent |
Certificateless Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Daniele Micciancio |
Lattice-Based Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | |
Cryptography on Reconfigurable Devices. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Kazue Sako |
Public Key Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Yvo Desmedt |
Threshold Cryptography. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Tommaso Addabbo, Ada Fort, Santina Rocchi, Valerio Vignoli |
Digitized Chaos for Pseudo-random Number Generation in Cryptography. |
Chaos-Based Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Igor Mishkovski, Ljupco Kocarev |
Chaos-Based Public-Key Cryptography. |
Chaos-Based Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Wallace Kit-Sang Tang, Ying Liu 0020 |
Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography. |
Chaos-Based Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Ross J. Anderson, Mike Bond, Omar Choudary 0001, Steven J. Murdoch, Frank Stajano |
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. |
Financial Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Emilia Käsper |
Fast Elliptic Curve Cryptography in OpenSSL. |
Financial Cryptography Workshops |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Vivien Dubois, Jean-Gabriel Kammerer |
Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud |
Signatures on Randomizable Ciphertexts. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi |
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Daniel J. Bernstein, Tanja Lange 0001, Peter Schwabe |
On the Correct Use of the Negation Map in the Pollard rho Method. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Tolga Acar, Lan Nguyen |
Revocation for Delegatable Anonymous Credentials. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann 0001 |
Linear Recurring Sequences for the UOV Key Generation. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Tomas Toft |
Sub-linear, Secure Comparison with Two Non-colluding Parties. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Qixiang Mei, Bao Li 0001, Xianhui Lu, Dingding Jia |
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jacob C. N. Schuldt, Kanta Matsuura |
On-line Non-transferable Signatures Revisited. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha |
Oblivious Transfer with Hidden Access Control Policies. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Tatsuaki Okamoto, Katsuyuki Takashima |
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jae Hong Seo |
Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Matthew Green 0001 |
Secure Blind Decryption. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jian Weng 0001, Yunlei Zhao, Goichiro Hanaoka |
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Luk Bettale, Jean-Charles Faugère, Ludovic Perret |
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Dan Boneh, David Mandell Freeman |
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
|
|