The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Nuttapong Attrapadung, Benoît Libert Homomorphic Network Coding Signatures in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Takahiro Matsuda 0002, Kanta Matsuura Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Roberto Maria Avanzi, Clemens Heuberger Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Amit Sahai, Hakan Seyalioglu Fully Secure Accountable-Authority Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik (If) Size Matters: Size-Hiding Private Set Intersection. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Junzuo Lai, Robert H. Deng, Shengli Liu 0001 Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Shota Yamada 0001, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Brent Waters Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Rishiraj Bhattacharyya, Avradip Mandal On the Impossibility of Instantiating PSS in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Shai Halevi, Hugo Krawczyk One-Pass HMQV and Asymmetric Key-Wrapping. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Phong Q. Nguyen, David Pointcheval (eds.) Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Sergei N. Molotkov Phase-time coding quantum cryptography. Search on Bibsonomy Quantum Cryptography and Computing The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28John Dubois Commercial potential of quantum cryptography. Search on Bibsonomy Quantum Cryptography and Computing The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Amir Moradi 0001, Axel Poschmann Lightweight Cryptography and DPA Countermeasures: A Survey. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Ueli Maurer Constructive Cryptography - A Primer. Search on Bibsonomy Financial Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Daniel W. Engels, Xinxin Fan, Guang Gong, Honggang Hu, Eric M. Smith Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen Text Search Protocols with Simulation Based Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Zhenfu Cao, Ivan Visconti, Zongyang Zhang Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Sven Laur, Helger Lipmaa On the Feasibility of Consistent Computations. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa Security of Encryption Schemes in Weakened Random Oracle Models. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Toshihide Matsuda, Ryo Nishimaki, Keisuke Tanaka CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Steven D. Galbraith, Raminder S. Ruprai Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Xavier Boyen Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Mathias Herrmann, Alexander May 0001 Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Jean-Charles Faugère, Pierre-Jean Spaenlehauer Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Robert Granger, Michael Scott Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Jean-Charles Faugère, Raphaël Marinier, Guénaël Renault Implicit Factoring with Shared Most Significant and Middle Bits. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Craig Costello, Tanja Lange 0001, Michael Naehrig Faster Pairing Computations on Curves with High-Degree Twists. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Nigel P. Smart, Frederik Vercauteren Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Javier Herranz, Fabien Laguillaumie, Carla Ràfols Constant Size Ciphertexts in Threshold Attribute-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Nuttapong Attrapadung, Benoît Libert Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Carmit Hazay, Kobbi Nissim Efficient Set Operations in the Presence of Malicious Adversaries. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Petros Mol, Scott Yilek Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001, Yang Xiang 0001 Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder Confidential Signatures and Deterministic Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Ali Bagherzandi, Stanislaw Jarecki Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder Unlinkability of Sanitizable Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Reza Rezaeian Farashahi, Marc Joye Efficient Arithmetic on Hessian Curves. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Takuya Hayashi 0001, Naoyuki Shinohara, Lihua Wang 0001, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi Solving a 676-Bit Discrete Logarithm Problem in GF(36n). Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi Groth-Sahai Proofs Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin Secure Network Coding over the Integers. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28David Mandell Freeman, Oded Goldreich 0001, Eike Kiltz, Alon Rosen, Gil Segev 0001 More Constructions of Lossy and Correlation-Secure Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Jens Groth, Aggelos Kiayias, Helger Lipmaa Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman Preventing Pollution Attacks in Multi-source Network Coding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Stanislaw Jarecki, Gene Tsudik (eds.) Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Antoine Joux Introduction to Identity-Based Cryptography. Search on Bibsonomy Identity-Based Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Olivier Billet, Jintai Ding Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography. Search on Bibsonomy Gröbner Bases, Coding, and Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Massimiliano Sala Gröbner Bases, Coding, and Cryptography: a Guide to the State-of-Art. Search on Bibsonomy Gröbner Bases, Coding, and Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway 09031 Abstracts Collection - Symmetric Cryptography. Search on Bibsonomy Symmetric Cryptography The full citation details ... 2009 DBLP  BibTeX  RDF
28Helena Handschuh, Stefan Lucks, Bart Preneel, Phillip Rogaway 09031 Executive Summary - Symmetric Cryptography. Search on Bibsonomy Symmetric Cryptography The full citation details ... 2009 DBLP  BibTeX  RDF
28Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake An Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Section, Public-key Cryptosystem, Algebraic Surface
28M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Exchange, Insider Attacks, Key Compromise Impersonation
28Patrick Longa, Catherine H. Gebotys Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multibase non-adjacent form, fractional window, Elliptic curve cryptosystem, scalar multiplication, double base number system
28Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas Verifiable Rotation of Homomorphic Encryptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Paz Morillo, Carla Ràfols The Security of All Bits Using List Decoding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit security, one-way function, list decoding
28Minkyu Kim, Jung Hee Cheon, Jin Hong 0001 Subset-Restricted Random Walks for Pollard rho Method on Fpm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pollard rho method, pairing, normal basis, discrete logarithm problem
28Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Compact CCA-Secure Encryption for Messages of Arbitrary Length. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Ivan Damgård, Martin Geisler 0001, Mikkel Krøigaard, Jesper Buus Nielsen Asynchronous Multiparty Computation: Theory and Implementation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Toru Nakanishi 0001, Hiroki Fujii, Yuta Hira, Nobuo Funabiki Revocable Group Signature Schemes with Constant Costs for Signing and Verifying. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Alexander May 0001, Maike Ritzenhofen Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Factoring with an oracle, lattices
28Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
28Scott E. Coull, Matthew Green 0001, Susan Hohenberger Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Sherman S. M. Chow Removing Escrow from Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Jun Shao, Zhenfu Cao CCA-Secure Proxy Re-encryption without Pairings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unidirectional PRE, DDH, CCA security, random oracle, collusion-resistance
28Ivan Damgård, Gert Læssøe Mikkelsen On the Theory and Practice of Personal Digital Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Pascal Junod, Alexandre Karlov, Arjen K. Lenstra Improving the Boneh-Franklin Traitor Tracing Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Boneh-Franklin traitor tracing, Guruswami-Sudan algorithm, Reed-Solomon codes, Berlekamp-Massey algorithm
28Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk Security of Sanitizable Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Marc Fischlin, Dominique Schröder Security of Blind Signatures under Aborts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Aggelos Kiayias, Hong-Sheng Zhou Zero-Knowledge Proofs with Witness Elimination. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Benoît Libert, Damien Vergnaud Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficiency, traceability, Identity-based encryption
28Jan Camenisch, Markulf Kohlweiss, Claudio Soriente An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF revocation, anonymous credentials, dynamic accumulators
28Brian J. Matt Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pairing-based signatures, Wireless networks, Identity-based signatures, Short signatures, Batch verification
28Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters Signing a Linear Subspace: Signature Schemes for Network Coding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Hossein Ghodosi, Josef Pieprzyk Multi-Party Computation with Omnipresent Adversary. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation
28Mathias Herrmann, Gregor Leander A Practical Key Recovery Attack on Basic TCHo. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCHo, stream cipher, chosen ciphertext attack
28Ronald Cramer (eds.) Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Yi-Ru Liu, Wen-Guey Tzeng Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Broadcast encryption, collusion, polynomial interpolation
28Éric Levieil, David Naccache Cryptographic Test Correction. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Thomas Plantard, Willy Susilo, Khin Than Win A Digital Signature Scheme Based on CVPinfinity. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Rosario Gennaro Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Vadim Lyubashevsky Lattice-Based Identification Schemes Secure Under Active Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Akira Numayama, Toshiyuki Isshiki, Keisuke Tanaka Security of Digital Signature Schemes in Weakened Random Oracle Models. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, collision, random oracle model, preimage
28Sungwook Kim, Jung Hee Cheon A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Discrete Logarithm Problem with Low Hamming Weight Product (LHWP) Exponents, Parameterized Splitting Systems
28Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek A. El-Ghazawi An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MWR2MM Algorithm, Field Programmable Gate Arrays, Montgomery Multiplication
28James Birkett, Alexander W. Dent Relations Among Notions of Plaintext Awareness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Moses D. Liskov, Silvio Micali Online-Untransferable Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Carmine Ventre, Ivan Visconti Completely Non-malleable Encryption Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Petros Mol, Moti Yung Recovering NTRU Secret Key from Inversion Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis
28Alexander W. Dent, Benoît Libert, Kenneth G. Paterson Certificateless Encryption Schemes Strongly Secure in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF strong security, standard model, certificateless encryption
28Steven D. Galbraith, Eric R. Verheul An Analysis of the Vector Decomposition Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Vector decomposition problem, generalised discrete logarithm problem, elliptic curves, Diffie-Hellman problem
28Sven Laur, Sylvain Pasini SAS-Based Group Authentication and Key Agreement Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Groups, key agreement, message authentication, multi-party
28Alexander May 0001, Maike Ritzenhofen Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chinese Remaindering, Coppersmith’s method, Håstad’s attack, systems of univariate modular polynomials
28Benoît Libert, Damien Vergnaud Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unidirectionality, standard model, chosen-ciphertext security, proxy re-encryption
28Sebastian Faust, Emilia Käsper, Stefan Lucks Efficient Simultaneous Broadcast. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Patrick Longa, Ali Miri New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF point operation, precomputation scheme, Elliptic curve cryptosystem, scalar multiplication, composite operation
Displaying result #801 - #900 of 18658 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license