|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 917 occurrences of 351 keywords
|
|
|
Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt |
Secure group key establishment revisited. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Group key establishment, Malicious insiders, Provable security |
17 | Wei Gao 0007, Xueli Wang, Dongqing Xie |
Chameleon Hashes Without Key Exposure Based on Factoring. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
chameleon signature, key-exposure, chameleon hash |
17 | Haibo Tian, Xi Sun, Yumin Wang |
A New Public-Key Encryption Scheme. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
security, public-key cryptosystems, deduction |
17 | Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 |
Formal Proofs for the Security of Signcryption. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Dario Catalano, David Pointcheval, Thomas Pornin |
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
New constructions of fuzzy identity-based encryption. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
efficient constructions, fuzzy identity-based encryption |
17 | Ran Canetti, Susan Hohenberger |
Chosen-ciphertext secure proxy re-encryption. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
encryption, obfuscation, chosen-ciphertext security, re-encryption |
17 | Rafail Ostrovsky, Amit Sahai, Brent Waters |
Attribute-based encryption with non-monotonic access structures. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Robust group key agreement using short broadcasts. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
fault tolerance, group key agreement |
17 | Ling Cheung, Calvin C. Newport |
Provably secure ciphertext policy ABE. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute-based encryption |
17 | Johann Großschädl, Alexander Szekely, Stefan Tillich |
The energy cost of cryptographic key establishment in wireless sensor networks. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
energy evaluation, wireless networking, cryptography, security protocols, key establishment |
17 | Dave Singelée, Bart Preneel |
Key Establishment Using Secure Distance Bounding Protocols. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jiguo Li 0001, Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Qianhong Wu |
Certificate-Based Signature: Security Model and Efficient Construction. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Certificate-based signature, Key replacement attack, PKI |
17 | Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides |
Low-cost Anonymous Timed-Release Encryption. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
multiple time-servers, cryptographic protocols, bilinear pairings, timed-release encryption |
17 | M. M. Chowdhury |
An Authentication Scheme Using Non-Commutative Semigroups. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Chunxiang Gu, Yuefei Zhu |
An Efficient ID-Based Proxy Signature Scheme from Pairings. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
bilinear pairings, proxy signatures, ID-based cryptography |
17 | Leif Uhsadel, Axel Poschmann, Christof Paar |
Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
8-bit micro controller, secp160r1, wireless sensor network, elliptic curve cryptography, Micaz |
17 | Douglas Wikström |
Designated Confirmer Signatures Revisited. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Cleopas O. Angaye, Paul S. Fisher |
Application of FI sequences for authentication in a network. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
finite induction, private keys, security, public keys |
17 | Ernie Brickell, Jiangtao Li 0001 |
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocols, trusted computing |
17 | Ratna Dutta |
Multi-Party Key Agreement in Password-Based Setting. |
Asia International Conference on Modelling and Simulation |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yong Ho Hwang, Pil Joong Lee |
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Zhaohui Cheng, Liqun Chen 0002, Li Ling, Richard Comley |
General and Efficient Certificateless Public Key Encryption Constructions. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won |
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
nonce-chained authentication, scalability, Cryptography, provable security, binary tree, group key exchange |
17 | Fagen Li, Yupu Hu, Chuanrong Zhang |
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
identity-based signcryption, Ad hoc networks, provable security, bilinear pairings |
17 | Gökay Saldamli, Çetin Kaya Koç |
Spectral Modular Exponentiation. |
IEEE Symposium on Computer Arithmetic |
2007 |
DBLP DOI BibTeX RDF |
|
17 | William Hasenplaugh, Gunnar Gaubatz, Vinodh Gopal |
Fast Modular Reduction. |
IEEE Symposium on Computer Arithmetic |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jianhong Zhang |
An Improved Designated-Verifier Proxy Signature Scheme. |
IEEE NAS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu |
A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. |
COMPSAC (2) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ioannis Chatzigiannakis, Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis |
Agent-based Distributed Group Key Establishment in Wireless Sensor Networks. |
WOWMOM |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Bounded CCA2-Secure Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Xavier Boyen |
Miniature CCA2 PK Encryption: Tight Security Without Redundancy. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ueli M. Maurer, Dominik Raub |
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations |
17 | Tatsuaki Okamoto |
Authenticated Key Exchange and Key Encapsulation in the Standard Model. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ratna Dutta |
Overcome Weakness of a Password-Based Group Key Agreement Protocol. |
ISCC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko |
Efficient Pseudorandom Generators Based on the DDH Assumption. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
17 | He Ge, Stephen R. Tate |
A Direct Anonymous Attestation Scheme for Embedded Devices. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature |
17 | Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart |
Identity-Based Traitor Tracing. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao |
An Efficient Certified Email Protocol. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol |
17 | Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan |
Traitor Tracing with Optimal Transmission Rate. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Constant Transmission Rate, Bilinear Maps, Traitor Tracing, Fingerprint Codes |
17 | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo |
Secure Remote User Authentication Scheme Using Bilinear Pairings. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Cryptanalysis, Smart card, Password, Bilinear pairings, Key agreement |
17 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Jennifer Seberry, Xinyi Huang 0001 |
Identity-Based Proxy Signature from Pairings. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Chia-Hui Wang, Mei-Wen Li, Wanjiun Liao |
A Distributed Key-Changing Mechanism for Secure Voice Over IP (VoIP) Service. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yoon-Su Jeong, Sang Ho Lee 0002 |
Hybrid Key Establishment Protocol Based on ECC for Wireless Sensor Network. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi 0001 |
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Elliptic curves, Pairing based cryptosystem |
17 | Lasse Øverlier, Paul F. Syverson |
Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. |
Privacy Enhancing Technologies |
2007 |
DBLP DOI BibTeX RDF |
|
17 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang |
Proxy Re-signature Schemes Without Random Oracles. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
proxy re-signature, existential unforgeability, standard model, bilinear maps, ID-based |
17 | Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
proxy cryptosystem, certificate-based encryption (CBE), pairing |
17 | Xiangxue Li, Dong Zheng 0001, Kefei Chen |
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. |
ICA3PP |
2007 |
DBLP DOI BibTeX RDF |
characteristic sequence, linkable ring signature, linear feedback shift-register, threshold signature |
17 | Seokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won |
Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
BDH assumption, bilinear map, Group key agreement, batch verification |
17 | Lei Zhang 0009, Futai Zhang, Fangguo Zhang |
New Efficient Certificateless Signature Scheme. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
certificateless signature scheme, cryptography, bilinear map, random oracle model |
17 | Dong Zheng 0001, Xiangxue Li, Kefei Chen, Jianhua Li |
Linkable Ring Signatures from Linear Feedback Shift Register. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
Characteristic sequence, Linkabilty, Anonymity, Linear feedback shift register, Ring signatures |
17 | Jin Li 0002, Tsz Hon Yuen, Kwangjo Kim |
Practical Threshold Signatures Without Random Oracles. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
CDH problem, Threshold Signature, Bilinear groups |
17 | Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols |
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Palash Sarkar 0001, Sanjit Chatterjee |
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Lei Zhang 0009, Futai Zhang, Wei Wu 0001 |
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography |
17 | Chin-Chen Chang 0001, Hao-Chuan Tsai, Yi-Hui Chen |
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jun Shao 0001, Zhenfu Cao, Licheng Wang, Rongxing Lu |
Efficient Password-Based Authenticated Key Exchange Without Public Information. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Elaine Shi, John Bethencourt, T.-H. Hubert Chan, Dawn Xiaodong Song, Adrian Perrig |
Multi-Dimensional Range Query over Encrypted Data. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Chen Yang, Furong Wang, Xinmei Wang |
Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Eun-Kyung Ryu, Tsuyoshi Takagi |
Efficient Conjunctive Keyword-Searchable Encryption. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen |
Authenticated Broadcast Encryption Scheme. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, broadcast encryption, bilinear map |
17 | Dennis Hofheinz, Eike Kiltz |
Secure Hybrid Encryption from Weakened Key Encapsulation. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Yongping Zhang, Wei Wei, Tianjie Cao |
Improvement of an Authenticated Key Agreement Protocol. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Elliptic Curves, Key Agreement Protocol |
17 | Zhiguo Wan, Robert H. Deng, Feng Bao 0001, Bart Preneel |
n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jason Barbour, Mohamed F. Younis |
Sensor Network Connectivity and Security Analysis Using a Single Per-node Random Key. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Felix Brandt 0001 |
How to obtain full privacy in auctions. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Cryptographic protocols, Auctions, Homomorphic encryption |
17 | Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson |
Threshold Password-Authenticated Key Exchange. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Key exchange, Password authentication, Dictionary attack, Threshold cryptosystems |
17 | Wenliang Du, Jing Deng 0001, Yunghsiang S. Han, Pramod K. Varshney |
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Wireless sensor networks, network security, key predistribution |
17 | Jun Furukawa 0001, Kazue Sako |
An Efficient Publicly Verifiable Mix-Net for Long Inputs. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Hybrid-mix, efficient, public verifiability, multiple encryption |
17 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Efficient Conjunctive Keyword Search on Encrypted Data Storage System. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Martin Hlavác, Tomás Rosa |
Extended Hidden Number Problem and Its Cryptanalytic Applications. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
DSA implementation, hyper-threading, lattice, sliding window, side channel analysis, cache analysis |
17 | Zhenchuan Chai, Zhenfu Cao, Rongxing Lu |
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. |
WASA |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi |
Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | G. Shailaja, K. Phani Kumar, Ashutosh Saxena |
Universal Designated Multi Verifier Signature without Random Oracles. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury |
A Programmable Parallel Structure to perform Galois Field Exponentiation. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Sunghyuck Hong, Noé Lopez-Benitez |
Enhanced Group Key Generation Algorithm. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Chris Peikert |
On Error Correction in the Exponent. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Alexander W. Dent, Steven D. Galbraith |
Hidden Pairings and Trapdoor DDH Groups. |
ANTS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Martin Schaffer, Peter Schartner |
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | He Ge, Stephen R. Tate |
A group signature scheme with signature claiming and variable linkability. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Roberto Zunino, Pierpaolo Degano |
Handling exp, × (and Timestamps) in Protocol Analysis. |
FoSSaCS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Zhenfeng Zhang, Duncan S. Wong, Jing Xu 0002, Dengguo Feng |
Certificateless Public-Key Signature: Security Model and Efficient Construction. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Proxy Signature Without Random Oracles. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Without Random Oracles, CDH Problem, Bilinear Pairings, Proxy Signature |
17 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
authenticated group key agreement, cryptography, bilinear pairings, ID-based |
17 | He Ge, Stephen R. Tate |
Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Embedded Systems, Authentication, Key Exchange, Strong RSA Assumption |
17 | Eun-Jun Yoon, Kee-Young Yoo |
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Michel Abdalla, David Pointcheval |
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Smooth Projective Hash Functions, Group Key Exchange, Password-based Authentication |
17 | Sylvain Pasini, Serge Vaudenay |
SAS-Based Authenticated Key Agreement. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval |
The Twist-AUgmented Technique for Key Exchange. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Craig Gentry, Zulfikar Ramzan |
Identity-Based Aggregate Signatures. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
17 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Authentication and Key Exchange Protocol for Secure Credential Services. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jung Doo Koo, Jungsook Koo, Dong Chun Lee |
Secure Authentication Protocol in Mobile IPv6 Networks. |
KES (3) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Kenneth G. Paterson, Jacob C. N. Schuldt |
Efficient Identity-Based Signatures Secure in the Standard Model. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Man Ho Au, Willy Susilo, Siu-Ming Yiu |
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Xavier Boyen, Brent Waters |
Compact Group Signatures Without Random Oracles. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Krzysztof Pietrzak |
Composition Implies Adaptive Security in Minicrypt. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Craig Gentry |
Practical Identity-Based Encryption Without Random Oracles. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Identity Based Encryption |
Displaying result #801 - #900 of 1148 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|