The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for public with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1970 (17) 1971-1974 (25) 1975-1976 (38) 1977-1978 (27) 1979 (19) 1980 (17) 1981 (16) 1982 (27) 1983 (23) 1984 (39) 1985 (49) 1986 (40) 1987 (52) 1988 (47) 1989 (49) 1990 (66) 1991 (47) 1992 (71) 1993 (93) 1994 (107) 1995 (119) 1996 (209) 1997 (193) 1998 (246) 1999 (311) 2000 (450) 2001 (565) 2002 (856) 2003 (873) 2004 (1143) 2005 (1407) 2006 (1509) 2007 (1728) 2008 (1751) 2009 (1581) 2010 (1001) 2011 (892) 2012 (1008) 2013 (1271) 2014 (1246) 2015 (1303) 2016 (1371) 2017 (1446) 2018 (1530) 2019 (1750) 2020 (1961) 2021 (2269) 2022 (1845) 2023 (1940) 2024 (490)
Publication types (Num. hits)
article(13430) book(32) data(18) incollection(344) inproceedings(20929) phdthesis(294) proceedings(86)
Venues (Conferences, Journals, ...)
CoRR(1321) Public Libr. Q.(720) IACR Cryptol. ePrint Arch.(623) Public Key Cryptography(558) DG.O(416) HICSS(379) Public Transp.(332) ICEGOV(293) MIE(293) EGOV(279) IEEE Access(256) Gov. Inf. Q.(250) CRYPTO(229) EUROCRYPT(216) Public Key Cryptography (1)(199) EuroPKI(196) More (+10 of total 5029)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14005 occurrences of 4807 keywords

Results
Found 35133 publication records. Showing 35133 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Georg Fuchsbauer, Romain Gay Weakly Secure Equivalence-Class Signatures from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Pratish Datta, Tatsuaki Okamoto, Junichi Tomida Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi Local Non-malleable Codes in the Bounded Retrieval Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Chris Peikert, Sina Shiehian Privately Constraining and Programming PRFs, the LWE Way. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe SOFIA: MQ MQ -Based Signatures in the QROM. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Yi Deng 0002, Xuyang Song, Jingyue Yu, Yu Chen 0003 On the Security of Classic Protocols for Unique Witness Relations. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy 0001 Improved (Almost) Tightly-Secure Structure-Preserving Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Benedikt Auerbach, Bertram Poettering Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp Non-malleability vs. CCA-Security: The Case of Commitments. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Craig Gentry, Adam O'Neill, Leonid Reyzin A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Tara Pressley Public Libraries, Serious Mental Illness, and Homelessness: A Survey of Public Librarians. Search on Bibsonomy Public Libr. Q. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Serge Fehr (eds.) Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Serge Fehr (eds.) Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren 0001 Asymptotically Tight Bounds for Composing ORAM with PIR. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24David Pointcheval, Olivier Sanders, Jacques Traoré Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Rishab Goyal, Venkata Koppula, Brent Waters Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Gottfried Herold, Alexander May 0001 LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Yang Yu 0008, Guangwu Xu, Xiaoyun Wang 0001 Provably Secure NTRU Instances over Prime Cyclotomic Rings. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Barak Shani On the Bit Security of Elliptic Curve Diffie-Hellman. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi 0001 Predictable Arguments of Knowledge. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Gottfried Herold, Elena Kirshanova Improved Algorithms for the Approximate k-List Problem in Euclidean Norm. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Jorge L. Villar Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Antonio Faonio, Jesper Buus Nielsen Fully Leakage-Resilient Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Taechan Kim 0001, Jinhyuck Jeong Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Antonio Faonio, Jesper Buus Nielsen Non-malleable Codes with Split-State Refresh. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Michel Abdalla, Fabrice Benhamouda, David Pointcheval Removing Erasures with Explainable Hash Proof Systems. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Carmit Hazay, Muthuramakrishnan Venkitasubramaniam Scalable Multi-party Private Set-Intersection. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Benoît Libert, Thomas Peters, Chen Qian 0002 Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Charanjit S. Jutla, Arnab Roy 0001 Improved Structure Preserving Signatures Under Standard Bilinear Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Chris Brzuska, Håkon Jacobsen A Modular Security Analysis of EAP and IEEE 802.11. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Venkata Koppula, Andrew Poelstra, Brent Waters Universal Samplers with Fast Verification. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Mihir Bellare, Bertram Poettering, Douglas Stebila Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Srinivasan Raghuraman, Silas Richelson, Vinod Vaikuntanathan Chosen-Ciphertext Secure Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Fabrice Benhamouda, Florian Bourse, Helger Lipmaa CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Nuttapong Attrapadung Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Wutichai Chongchitmate, Rafail Ostrovsky Circuit-Private Multi-key FHE. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam Better Two-Round Adaptive Multi-party Computation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Aggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang Ceremonies for End-to-End Verifiable Elections. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Dan Boneh, Kevin Lewi, David J. Wu 0001 Constraining Pseudorandom Functions Privately. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi Access Control Encryption for Equality, Comparison, and More. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Jesper Buus Nielsen, Samuel Ranellucci On the Computational Overhead of MPC with Dishonest Majority. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang (eds.) Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang (eds.) Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Angelo De Caro, Vincenzo Iovino, Adam O'Neill Deniable Functional Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Gunnar Hartung, Björn Kaidel, Alexander Koch 0001, Jessica Koch, Andy Rupp Fault-Tolerant Aggregate Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Johannes Krupp, Dominique Schröder, Mark Simkin 0001, Dario Fiore 0001, Giuseppe Ateniese, Stefan Nürnberger Nearly Optimal Verifiable Data Streaming. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider 0001, Dominique Schröder, Mark Simkin 0001 Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng 0001 CCA-Secure Keyed-Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Andreas Hülsing, Joost Rijneveld, Fang Song 0001 Mitigating Multi-target Attacks in Hash-Based Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Functional Encryption for Inner Product with Full Function Privacy. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Yohei Watanabe 0001, Junji Shikata Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Sebastian Faust, Daniel Masny, Daniele Venturi 0001 Chosen-Ciphertext Security from Subset Sum. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Marc Joye Identity-Based Cryptosystems and Quadratic Residuosity. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24David Bernhard, Marc Fischlin, Bogdan Warinschi On the Hardness of Proving CCA-Security of Signed ElGamal. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Michael Backes 0001, Sebastian Meiser 0001, Dominique Schröder Delegatable Functional Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Yusuke Sakai 0001, Nuttapong Attrapadung, Goichiro Hanaoka Attribute-Based Signatures for Circuits from Bilinear Map. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Takahiro Matsuda 0002, Goichiro Hanaoka Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Junqing Gong 0001, Jie Chen 0021, Xiaolei Dong, Zhenfu Cao, Shaohua Tang Extended Nested Dual System Groups, Revisited. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Andreas Hülsing, Joost Rijneveld, Peter Schwabe ARMed SPHINCS - Computing a 41 KB Signature in 16 KB of RAM. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Atsushi Takayasu, Noboru Kunihiro How to Generalize RSA Cryptanalyses. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE). Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Hoeteck Wee KDM-Security via Homomorphic Smooth Projective Hashing. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Luís T. A. N. Brandão Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme). Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Christophe Petit 0001, Michiel Kosters, Ange Messeng Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Ran Cohen Asynchronous Secure Multiparty Computation in Constant Time. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Jan Camenisch, Manu Drijvers, Anja Lehmann Universally Composable Direct Anonymous Attestation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang Indistinguishability Obfuscation with Non-trivial Efficiency. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Daniel Shahaf, Margarita Vald Universally Composable Authentication and Key-Exchange with Global PKI. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Samuel Neves, Mehdi Tibouchi Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Allison Bishop, Valerio Pastro Robust Secret Sharing Schemes Against Local Adversaries. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Yu Chen 0003, Baodong Qin, Jiang Zhang 0001, Yi Deng 0002, Sherman S. M. Chow Non-Malleable Functions and Their Applications. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Jonathan Katz (eds.) Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Mihir Bellare, Sriram Keelveedhi Interactive Message-Locked Encryption and Secure Deduplication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi How Secure is Deterministic Encryption? Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Vadim Lyubashevsky, Daniel Wichs Simple Lattice Trapdoor Sampling from a Broad Class of Distributions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Benoît Libert, Marc Joye, Moti Yung, Thomas Peters Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Romain Gay, Pierrick Méaux, Hoeteck Wee Predicate Encryption for Multi-dimensional Range Queries from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré Divisible E-Cash Made Practical. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Gilles Barthe, Edvard Fagerholm, Dario Fiore 0001, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Dennis Hofheinz, Jessica Koch, Christoph Striecks Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Allison B. Lewko, Sarah Meiklejohn A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval Simple Functional Encryption Schemes for Inner Products. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan Tightly-Secure Signatures from Chameleon Hash Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24David Cash, Rafael Dowsley, Eike Kiltz Digital Signatures from Strong RSA without Prime Generation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Florian Bergsma, Tibor Jager, Jörg Schwenk One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Ryo Hiromasa, Masayuki Abe, Tatsuaki Okamoto Packing Messages and Optimizing Bootstrapping in GSW-FHE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Emmanuela Orsini, Joop van de Pol, Nigel P. Smart Bootstrapping BGV Ciphertexts with a Wider Choice of p and q. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Shengli Liu 0001, Kenneth G. Paterson Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Jan Camenisch, Robert R. Enderlein, Gregory Neven Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 35133 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license