The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Ming-xuan Sun Nonlinear masking and iterative learning decryption for secure communications. Search on Bibsonomy Int. J. Autom. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Song Luo Anonymous hierarchical identity-based encryption without key delegation in decryption. Search on Bibsonomy Int. J. Embed. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Mihir Bellare, Dennis Hofheinz, Eike Kiltz Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? Search on Bibsonomy J. Cryptol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Tao Wu, Shuguo Li, Litian Liu Fast RSA decryption through high-radix scalable Montgomery modular multipliers. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Juha Partala Symmetric Blind Decryption with Perfect Secrecy. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
15Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz On-the fly AES Decryption/Encryption for Cloud SQL Databases. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
15Xiang Zhang, Wenbo Li, Hongyu Hu, Niloy K. Dutta High-Speed All-Optical Encryption and Decryption Based on Two-Photon Absorption in Semiconductor Optical Amplifiers. Search on Bibsonomy JOCN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Suqing Lin, Rui Zhang 0002, Hui Ma 0002, Suqing Wang Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Zhen Liu 0008, Zhenfu Cao, Duncan S. Wong Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Baodong Qin, Robert H. Deng, Shengli Liu 0001, Siqi Ma Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Guy Barwell, Dan Page, Martijn Stam Rogue Decryption Failures: Reconciling AE Robustness Notions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
15Mariya Georgieva, Frédéric de Portzamparc Toward Secure Implementation of McEliece Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
15Jian Wang 0030, Jiaqi Mu, Shuangqing Wei, Chunxiao Jiang, Norman C. Beaulieu Statistical Characterization of Decryption Errors in Block-Ciphered Systems. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing. Search on Bibsonomy UKSim The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Xu An Wang 0001, Jianfeng Ma 0001, Fatos Xhafa Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency. Search on Bibsonomy 3PGCIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Mariya Georgieva, Frédéric de Portzamparc Toward Secure Implementation of McEliece Decryption. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai Application of NTRU Using Group Rings to Partial Decryption Technique. Search on Bibsonomy INTRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Paul Rad, Mohan Muppidi, Aldo S. Jaimes, Sos S. Agaian, Mo M. Jamshidi A novel image encryption method to reduce decryption execution time in cloud. Search on Bibsonomy SysCon The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Jens-Matthias Bohli, Roman Kurpatov, Mischa Schmidt Selective decryption of outsourced IoT data. Search on Bibsonomy WF-IoT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Y. Sreenivasa Rao Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Sourya Joyee De, Sushmita Ruj Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption. Search on Bibsonomy GLOBECOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15João Carlos Néto, Alexandre Ferreira Tenca, Wilson Vicente Ruggiero CRT RSA decryption: Modular exponentiation based solely on Montgomery Multiplication. Search on Bibsonomy ACSSC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Rodica-Mihaela Teodorescu, Ioan Lita, Ion Bogdan Cioc, Daniel Alexandru Visan Virtual instrumentation application for symmetrical and asymmetrical text encryption/decryption studying. Search on Bibsonomy ECAI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Bony H. K. Chen, Paul Y. S. Cheung, Peter Y. K. Cheung, Yu-Kwong Kwok An efficient architecture for zero overhead data en-/decryption using reconfigurable cryptographic engine. Search on Bibsonomy FPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Martin Beck Randomized decryption (RD) mode of operation for homomorphic cryptography - increasing encryption, communication and storage efficiency. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Yusuke Sakai 0001, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Sahan Ahmad, Kazi Md. Rokibul Alam, Habibur Rahman 0003, Shinsuke Tamura A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. Search on Bibsonomy NSysS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Stefan Pham, Stefan Arbanowski, Stefan Kaiser An Open Source Content Decryption Module to Improve DRM Integration with HTML5 Platforms. Search on Bibsonomy ISM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Guy Barwell, Daniel Page, Martijn Stam Rogue Decryption Failures: Reconciling AE Robustness Notions. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Paulo Martins 0002, Leonel Sousa, Julien Eynard, Jean-Claude Bajard Programmable RNS lattice-based parallel cryptographic decryption. Search on Bibsonomy ASAP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Dirk Thatmann, Artjom Butyrtschik, Axel Küpper A secure DHT-based key distribution system for attribute-based encryption and decryption. Search on Bibsonomy ICSPCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen 0001 Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. Search on Bibsonomy ESORICS (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. Search on Bibsonomy CRYPTO (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Danwei Chen, Liangqing Wan, Chen Wang, Su Pan, Yuting Ji A Multi-authority Attribute-Based Encryption Scheme with Pre-decryption. Search on Bibsonomy PAAP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Jilliam María Díaz Barros, Adlane Habed, Cédric Demonceaux, Alamin Mansouri Computer vision-based approach for rite decryption in old societies. Search on Bibsonomy MVA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Song Luo, Zhong Chen 0001 Hierarchical identity-based encryption without key delegation in decryption. Search on Bibsonomy Int. J. Grid Util. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ming Li 0029, Di Xiao 0001, Yushu Zhang, Hong Liu Attack and improvement of the joint fingerprinting and decryption method for vector quantization images. Search on Bibsonomy Signal Process. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Chih-Yang Lin, Panyaporn Prangjarote, Chia-Hung Yeh, Hui-Fuang Ng Reversible joint fingerprinting and decryption based on side match vector quantization. Search on Bibsonomy Signal Process. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Keying Li, Hua Ma Outsourcing Decryption of Multi-Authority ABE Ciphertexts. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2014 DBLP  BibTeX  RDF
15Hanzhong Zheng, Simin Yu, Jinhu Lü Design and ARM Platform-Based Realization of Digital Color Image Encryption and Decryption via Single State Variable Feedback Control. Search on Bibsonomy Int. J. Bifurc. Chaos The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Tamer M. Barakat A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Kyungtae Kang, Junhee Ryu, Dong Kun Noh Accommodating the Variable Timing of Software AES Decryption on Mobile Receivers. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Xiwen Fang, Xuejia Lai DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Prerana Sharma Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Hayder Raheem Hashim, Irtifaa Abdalkadum Neamaa Image Encryption and Decryption in A Modification of ElGamal Cryptosystem in MATLAB. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Charan Kumar, Dinesh Kumar, Arun Kumar Reddy Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Yixin Liu, Haipeng Zhang, Tao Feng Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Addepalli V. N. Krishna Time stamp based ECC encryption and decryption. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2014 DBLP  BibTeX  RDF
15Baocang Wang, Yupu Hu, Xixiang Lv Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Nishant Doshi, Devesh C. Jinwala Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Abderrahmane Nitaj, Mohamed Ould Douh A new attack on RSA with a composed decryption exponent. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
15Myungjin Cho, In-Ho Lee Optical Image Encryption and Decryption Considering Wireless Communication Channels. Search on Bibsonomy J. Inf. Process. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi Hybrid encryption/decryption technique using new public key and symmetric key algorithm. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Xianhua Song, Xiamu Niu Comment on: Novel image encryption/decryption based on quantum fourier transform and double phase encoding. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption. Search on Bibsonomy J. Math. Cryptol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yuhan Zheng, Fei Qi 0003, Xinzhou Cheng, Xiaojun Jing, Hai Huang 0001 Compressive sensing based decryption method for covert CDD-OFDM transmission. Search on Bibsonomy PIMRC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng 0001 Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. Search on Bibsonomy AsiaCCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zhangjie Huang, Lei Hu, Jun Xu 0022 Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Sonia Hammami, Mohamed Djemai, Krishna Busawon Using discrete-time hyperchaotic-based asymmetric encryption and decryption keys for secure signal transmission. Search on Bibsonomy CSNDSP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Dalel Bouslimi, Gouenou Coatrieux, Michel Cozic, Christian Roux Combination of watermarking and joint watermarking-decryption for reliability control and traceability of medical images. Search on Bibsonomy EMBC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Randi Markussen, Lorena Ronquillo, Carsten Schürmann Trust in internet election observing the Norwegian decryption and counting ceremony. Search on Bibsonomy EVOTE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Xu Bai, Lei Jiang 0003, Xinxing Liu, Jianlong Tan RSA Encryption/Decryption Implementation Based on Zedboard. Search on Bibsonomy ISCTCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Ye Yan, Tao Shu Energy-efficient In-network encryption/decryption for wireless body area sensor networks. Search on Bibsonomy GLOBECOM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yi Wang 0016, Akash Kumar 0001, Yajun Ha FPGA-based high throughput XTS-AES encryption/decryption for storage area network. Search on Bibsonomy FPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Halima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal A forensic analysis framework for recovering encryption keys and BB10 backup decryption. Search on Bibsonomy PST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Huawang Qin, Xiaohua Zhu, Yuewei Dai Provably Secure Identity-Based Threshold Decryption on Access Structure. Search on Bibsonomy CIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Takeshi Kumaki, Takeshi Fujino, Tetsushi Koide Interleaved-bitslice AES encryption and decryption with massive-parallel mobile embedded processor. Search on Bibsonomy APCCAS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Liaojun Pang, Huixian Li nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness. Search on Bibsonomy Comput. Informatics The full citation details ... 2013 DBLP  BibTeX  RDF
15Lihua Wang 0001, Jun Shao 0001, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang Certificate-based proxy decryption systems with revocability in the standard model. Search on Bibsonomy Inf. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yonglong Zhuang, Xiaolan Weng, Yuwu Wang, Haiyang Zhuang Improvement and Analysis of Encryption and Decryption Performance in Cloud Document. Search on Bibsonomy J. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Rahul R. Upadhyay Study of Encryption and Decryption of Wave File in Image Formats. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
15Junzuo Lai, Robert H. Deng, Chaowen Guan, Jian Weng 0001 Attribute-Based Encryption With Verifiable Outsourced Decryption. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Susan Hohenberger, Brent Waters Attribute-Based Encryption with Fast Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam On Symmetric Encryption with Distinguishable Decryption Failures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu 0001 Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15 A new attack on RSA with a composed decryption exponent. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15Yu-Guang Yang 0001, Juan Xia, Xin Jia, Hua Zhang Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Zhen Liu 0008, Zhenfu Cao, Duncan S. Wong Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. Search on Bibsonomy CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yinghui Zhang 0002, Xiaofeng Chen 0001, Jin Li 0002, Duncan S. Wong, Hui Li 0006 Anonymous attribute-based encryption supporting efficient decryption test. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yanjun Jiang, Mingshan Lei MD5 Calculation and Decryption Using CUDA on GPU. Search on Bibsonomy ISCTCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15P. Shabana Subair, C. Balan, S. Dija, K. L. Thomas Forensic Decryption of FAT BitLocker Volumes. Search on Bibsonomy ICDF2C The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Omar Choudary 0001, Felix Gröbert, Joachim Metz Security Analysis and Decryption of Filevault 2. Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Panyaporn Prangjarote, Chih-Yang Lin, Chia-Hung Yeh High efficient joint fingerprinting and decryption for multimedia distribution. Search on Bibsonomy ICICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Y. Sreenivasa Rao, Ratna Dutta Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Susan Hohenberger, Brent Waters Attribute-Based Encryption with Fast Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam On Symmetric Encryption with Distinguishable Decryption Failures. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu 0001 Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Chih-Yang Lin, Panyaporn Prangjarote, Li-Wei Kang, Wei-Lun Huang, Tzung-Her Chen Joint fingerprinting and decryption with noise-resistant for vector quantization images. Search on Bibsonomy Signal Process. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Pance Ribarski, Ljupcho Antovski Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types. Search on Bibsonomy J. Comput. Inf. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Rashmi R. Rachh, P. V. Ananda Mohan, Basavaraj S. Anami Efficient Implementations for AES Encryption and Decryption. Search on Bibsonomy Circuits Syst. Signal Process. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Yasuaki Ito, Koji Nakano, Bo Song The Parallel FDFM Processor Core Approach for CRT-based RSA Decryption. Search on Bibsonomy Int. J. Netw. Comput. The full citation details ... 2012 DBLP  BibTeX  RDF
15Adrian Marius Chiuta AES Encryption and Decryption Using Direct3D 10 API Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
15Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi Reconciling and improving of multi-receiver signcryption protocols with threshold decryption. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Nooshin Bigdeli 0001, Yousef Farid, Karim Afshar A novel image encryption/decryption scheme based on chaotic neural networks. Search on Bibsonomy Eng. Appl. Artif. Intell. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Wei Gao 0007, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang Efficient identity-based threshold decryption scheme from bilinear pairings. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Santanu Sarkar 0001, Subhamoy Maitra More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Omar Choudary 0001, Felix Gröbert, Joachim Metz Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Fei Li 0006, Wei Gao 0007, Yilei Wang, Xueli Wang An Efficient Certificateless Threshold Decryption Schemes Based On Pairings. Search on Bibsonomy J. Comput. The full citation details ... 2012 DBLP  BibTeX  RDF
15Puwen Wei, Yuliang Zheng 0001 Efficient Public Key Encryption Admitting Decryption by Sender. Search on Bibsonomy EuroPKI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Prerana Sharma, Devesh Mishra, Ankur Agarwal Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license