Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Pance Ribarski, Ljupcho Antovski |
Mixnets: Implementation and performance evaluation of decryption and re-encryption types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITI ![In: Proceedings of the 34th International Conference on Information Technology Interfaces, ITI 2012, Cavtat / Dubrovnik, Croatia, June 25-28, 2012, pp. 493-498, 2012, IEEE, 978-1-4673-1629-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Saddam Quirem, Byeong Kil Lee |
AES decryption using warp-synchronous programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: 31st IEEE International Performance Computing and Communications Conference, IPCCC 2012, Austin, TX, USA, December 1-3, 2012, pp. 203-204, 2012, IEEE Computer Society, 978-1-4673-4881-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Alexander Albrecht, Felix Naumann |
Schema Decryption for Large Extract-Transform-Load Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - 31st International Conference ER 2012, Florence, Italy, October 15-18, 2012. Proceedings, pp. 116-125, 2012, Springer, 978-3-642-34001-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser 0001 |
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 242-257, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Xuhua Zhou, Xuhua Ding, Kefei Chen |
A Generic Construction of Accountable Decryption and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 322-335, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Vipin Kumar, Chirag Chetan, Aparajita Ojha |
On a Visual Secret Sharing Scheme with High Quality Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012, pp. 1200-1203, 2012, IEEE Computer Society, 978-1-4673-2172-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Panyaporn Prangjarote, Chih-Yang Lin, Li-Wei Kang, Chia-Hung Yeh |
Joint Fingerprinting and Decryption for VQ Images through Bipartite Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGEC ![In: 2012 Sixth International Conference on Genetic and Evolutionary Computing, ICGEC 2012, Kitakyushu, Japan, August 25-28, 2012, pp. 27-30, 2012, IEEE, 978-1-4673-2138-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Hoonjung Lee, Junghoon Kim, Junggab Son, Sangjin Kim, Heekuck Oh |
ID-based key management scheme using threshold decryption for OPMD environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2012, Las Vegas, NV, USA, January 13-16, 2012, pp. 733-734, 2012, IEEE, 978-1-4577-0230-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Santanu Sarkar 0001, Subhamoy Maitra |
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings, pp. 476-493, 2012, Springer, 978-3-642-33026-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Burt Kaliski |
Decryption Exponent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 322, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Feng Xu, Xin Lv, Likun Jia |
A New Verifiable Threshold Decryption Scheme Without Trusted Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Autom. Soft Comput. ![In: Intell. Autom. Soft Comput. 17(5), pp. 551-558, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Christopher Portmann, Keisuke Tanaka |
Information-Theoretic Secrecy with Access to Decryption Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(7), pp. 1585-1590, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Boris S. Verkhovsky |
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Netw. Syst. Sci. ![In: Int. J. Commun. Netw. Syst. Sci. 4(7), pp. 475-481, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Daniel R. L. Brown |
Identity-Based Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 266, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Matthew Green 0001 |
Secure Blind Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 109, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Mahmood Al-khassaweneh |
Image encryption method based on using least square error techniques at the decryption stage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 4(4), pp. 332-344, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Gerassimos D. Barlas, Ahmed Hassan, Yasser Al Jundi |
An Analytical Approach to the Design of Parallel Block Cipher Encryption/Decryption: A CPU/GPU Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: Proceedings of the 19th International Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2011, Ayia Napa, Cyprus, 9-11 February 2011, pp. 247-251, 2011, IEEE Computer Society, 978-0-7695-4328-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Varun Mittal, Piyush Murli Agarwal |
An encryption and decryption algorithm for messages transmitted by phonetic alphabets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoCPaR ![In: Third International Conference of Soft Computing and Pattern Recognition, SoCPaR 2011, Dalian, China, October 14-16, 2011, pp. 1-4, 2011, IEEE, 978-1-4577-1195-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Lukasz Smolinski |
Maintaining uniformity in the processes of encryption and decryption with a variable number of encryption rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWDTS ![In: 9th East-West Design & Test Symposium, EWDTS 2011, Sevastopol, Ukraine, September 9-12, 2011, pp. 131-135, 2011, IEEE Computer Society, 978-1-4577-1957-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Yang Zhang 0015, Junliang Chen |
Flexible Authorization by Generating Public Re-decryption Trapdoor in Outsourced Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2011, Washington, DC, USA, 4-9 July, 2011, pp. 760-761, 2011, IEEE Computer Society, 978-1-4577-0836-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Outsourced Data Service, Proxy Re-encryption Scheme, Access Control |
15 | Hong Di, Kangfeng Zheng, Xinxin Niu, Xin Zhang |
Multiple-image compressed encryption and decryption by compressive holography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VCIP ![In: 2011 IEEE Visual Communications and Image Processing, VCIP 2011, Tainan, Taiwan, November 6-9, 2011, pp. 1-4, 2011, IEEE, 978-1-4577-1321-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Matthew Green 0001, Susan Hohenberger, Brent Waters |
Outsourcing the Decryption of ABE Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings, 2011, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Yi-Chang Hsu, Jing-Jang Hwang |
Controlling Decryption of Personal Health Records in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITCS ![In: Proceedings of the International Conference on IT Convergence and Security, ICITCS 2011, Suwon, Korea, December 14-16, 2011, pp. 69-79, 2011, Springer, 978-94-007-2910-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Bo Song, Yasuaki Ito, Koji Nakano |
CRT-Based DSP Decryption Using Montgomery Modular Multiplication on the FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS Workshops ![In: 25th IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2011, Anchorage, Alaska, USA, 16-20 May 2011 - Workshop Proceedings, pp. 532-541, 2011, IEEE, 978-1-61284-425-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Matthew Green 0001 |
Secure Blind Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings, pp. 265-282, 2011, Springer, 978-3-642-19378-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Takahiro Matsuda 0002, Kanta Matsuura |
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings, pp. 246-264, 2011, Springer, 978-3-642-19378-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou 0001 |
Identity-Based Server-Aided Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 337-352, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Bibhudendra Acharya, Nikhil Thomas, D. R. Kavin Arasu, N. Vishnu Prasad |
Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 2011, Odisha, India, February 12-14, 2011, pp. 606-609, 2011, ACM, 978-1-4503-0464-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Jing Cao, Xue-feng Xing, Li-min Liu |
An IBE scheme with threshold to decryption for groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD ![In: Eighth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, 26-28 July 2011, Shanghai, China, pp. 2226-2229, 2011, IEEE, 978-1-61284-180-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Naveed Islam, William Puech |
Decryption of noisy encrypted images by statistical analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUVIP ![In: European Workshop on Visual Information Processing, EUVIP 2011, Paris, France, July 4-6, 2011, pp. 192-198, 2011, IEEE, 978-1-4577-0072-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Anil Hingmire, D. R. Ingle, Rahul Ambekar |
A new data encryption & decryption algorithm (PSZ proposal): a comparison with RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWET ![In: Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25 - 26, 2011, pp. 1366, 2011, ACM, 978-1-4503-0449-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | D. Ganotra, S. S. Mantha, A. Vinaya Babu |
Encryption decryption algorithm for m-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWET ![In: Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25 - 26, 2011, pp. 218-219, 2011, ACM, 978-1-4503-0449-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Luan Lan |
The AES Encryption and Decryption Realization Based on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 603-607, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Patrick McHardy, Andreas Schuler, Erik Tews |
Interactive decryption of DECT phone calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 71-78, 2011, ACM, 978-1-4503-0692-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Kuo-Ching Liu, Hui-Feng Huang |
A New Design of Encryption/Decryption for Field Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Convergence Inf. Technol. ![In: J. Convergence Inf. Technol. 5(5), pp. 39-43, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park |
Fair threshold decryption with semi-trusted third parties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Cryptogr. ![In: Int. J. Appl. Cryptogr. 2(2), pp. 139-153, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Shu-Hui Chang, Chuan-Ming Li, Tzonelih Hwang |
Identity-based Hierarchical Designated Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 26(4), pp. 1243-1259, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Santanu Sarkar 0001, Subhamoy Maitra |
Cryptanalysis of RSA with more than one decryption exponent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 110(8-9), pp. 336-340, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Santanu Sarkar 0001, Subhamoy Maitra |
Cryptanalysis of RSA with two decryption exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 110(5), pp. 178-181, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Xi Chen 0037, Shiguo Lian |
On the DCT Based Joint Fingerprint Embedding and Decryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Multim. ![In: J. Multim. 5(5), pp. 473-480, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | P. Karthigaikumar, K. Baskaran |
Partially Pipelined VLSI Implementation of Blowfish Encryption/Decryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Image Graph. ![In: Int. J. Image Graph. 10(3), pp. 327-341, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Natasa Zivic |
Iterative method for improvement of coding and decryption ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1004.0590, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Vasily Dolmatov |
GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5830, pp. 1-19, March 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Kenneth G. Paterson, Gaven J. Watson |
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 95, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Jia Xu |
A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 247, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Ivan Zelinka, Roman Jasek |
Evolutionary Decryption of Chaotically Encrypted Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Evolutionary Algorithms and Chaotic Systems ![In: Evolutionary Algorithms and Chaotic Systems, pp. 329-343, 2010, Springer, 978-3-642-10706-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Rikke Bendlin, Ivan Damgård |
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings, pp. 201-218, 2010, Springer, 978-3-642-11798-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | K. G. Gopchandran, K. Gopakumar, B. Premlet |
Information encryption and decryption using hyperchaotic systems in delayed nonlinear feedback systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUMT ![In: Proceedings of the International Conference on Ultra Modern Telecommunications, ICUMT 2010, 18-20 October 2010, Moscow, Russia, pp. 855-859, 2010, IEEE, 978-1-4244-7285-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Ratheesh Kumar Meleppat, C. L. Linslal, V. P. Mahadevan Pillai, Sudheer Sreedhara Krishna |
Color image encryption and decryption based on jigsaw transform employed at the input plane of a double random phase encoding system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUMT ![In: Proceedings of the International Conference on Ultra Modern Telecommunications, ICUMT 2010, 18-20 October 2010, Moscow, Russia, pp. 860-862, 2010, IEEE, 978-1-4244-7285-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Abraham Oommen Panicker, A. Jabeena, A. Hassan Mujeeb |
Advanced image encryption and decryption using sandwich phase diffuser and false image along with cryptographical enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUMT ![In: Proceedings of the International Conference on Ultra Modern Telecommunications, ICUMT 2010, 18-20 October 2010, Moscow, Russia, pp. 833-837, 2010, IEEE, 978-1-4244-7285-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Simon R. Lang, Neville I. Williams |
Impeding CAPTCHA Breakers with Visual Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 39-46, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Yunfei Li, Qing Liu, Tong Li, Wenming Xiao |
Two efficient methods to speed up the Batch RSA decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWACI ![In: Third International Workshop on Advanced Computational Intelligence, IWACI 2010, Suzhou, China., pp. 469-473, 2010, IEEE, 978-1-4244-6334-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Chih-Yang Lin, Wei-Lun Huang, Tzung-Her Chen |
Noise-Resistant Joint Fingerprinting and Decryption Based on Vector Quantization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference), pp. 463-468, 2010, IEEE Computer Society, 978-0-7695-4236-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Da-Peng Guo, Qiu-Hua Lin |
Fast decryption utilizing correlation calculation for BSS-based speech encryption system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: Sixth International Conference on Natural Computation, ICNC 2010, Yantai, Shandong, China, 10-12 August 2010, pp. 1428-1432, 2010, IEEE, 978-1-4244-5961-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Debasis Giri, Prithayan Barua, P. D. Srivastava, Biswapati Jana |
A Cryptosystem for Encryption and Decryption of Long Confidential Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings, pp. 86-96, 2010, Springer, 978-3-642-13364-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Kenneth G. Paterson, Gaven J. Watson |
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings, pp. 345-361, 2010, Springer, 978-3-642-13189-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Subhamoy Maitra, Santanu Sarkar 0001, Sourav Sen Gupta 0001 |
Publishing Upper Half of RSA Decryption Exponent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings, pp. 25-39, 2010, Springer, 978-3-642-16824-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Xin Lv, Congming Wang |
Public Verifiable Threshold Decryption Scheme without Trusted Center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: GCC 2010, The Ninth International Conference on Grid and Cloud Computing, Nanjing, Jiangsu, China, 1-5 November 2010, pp. 478-482, 2010, IEEE Computer Society, 978-0-7695-4313-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Akshay Wattal, Anjali Agarwal, Ankit Kathuria |
Astute image encryption and decryption using modified secure image encryption algorithm (M-SIP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWET ![In: Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26 - 27, 2010, pp. 1007, 2010, ACM, 978-1-60558-812-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Subhamoy Maitra, Santanu Sarkar 0001 |
Efficient CRT-RSA Decryption for Small Encryption Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, pp. 26-40, 2010, Springer, 978-3-642-11924-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Ram Ratan |
Key Independent Decryption of Graphically Encrypted Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings, pp. 88-97, 2010, Springer, 978-3-642-13600-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Fan Wu 0013, Johnel Woods, Chung-Han Chen, Hira N. Narang |
High Performance Symmetric Decryption Algorithm on General Purpose Graphics Processing Unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDPTA ![In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2010, Las Vegas, Nevada, USA, July 12-15, 2010, 2 Volumes, pp. 222-227, 2010, CSREA Press, 1-60132-158-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Sherman S. M. Chow, Wun-She Yap |
Partial decryption attacks in security-mediated certificateless encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 3(4), pp. 148-151, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Fouz Sattar, Muid Mufti |
On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 8(2), pp. 119-124, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi, M. Suguna |
Knapsack Based ECC Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 9(3), pp. 218-226, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Ting Yi Chang |
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 32(17), pp. 1829-1836, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Le Trieu Phong, Wakaha Ogata |
New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8), pp. 1822-1835, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Rajaram Ramasamy, Amutha Prabakar Muniyandi, M. Indra Devi |
A new algorithm for encryption/decryption for field applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 31(6), pp. 1069-1072, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Rajesh Kumar Pateriya, J. L. Rana, S. C. Shrivastava, Jaideep Patel |
A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0907.4994, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Natasa Zivic |
Strategies and performances of Soft Input Decryption ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0907.4471, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Mihir Bellare, Dennis Hofheinz, Eike Kiltz |
Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 418, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Rikke Bendlin, Ivan Damgård |
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 391, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Hung-Min Sun, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, Vincent S. Tseng |
Trading decryption for speeding encryption in Rebalanced-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 82(9), pp. 1503-1512, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Weiping Zhang 0003, Wenyuan Chen, Jian Tang, Peng Xu, Yibin Li, Shengyong Li |
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 9(11), pp. 9300-9331, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Natasa Zivic, Esad Kadusic, Mirko Skrbic |
Mathematical optimization of decrypting algorithm for soft input decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAT ![In: XXII International Symposium on Information, Communication and Automation Technologies, ICAT 2009, Sarajevo, Bosnia and Herzegovina, 29-31 October, 2009, pp. 1-4, 2009, IEEE, 978-1-4244-4220-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Stelian Flonta, Liviu Cristian Miclea, Izabella Diana Paun |
ElGamal with differentiated decryption on K+1 access levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACI ![In: 5th International Symposium on Applied Computational Intelligence and Informatics, SACI 2009, Timisoara, Romania, May 28-29, 2009, pp. 375-380, 2009, IEEE, 978-1-4244-4477-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Laszlo Gyongyosi, Sándor Imre |
Unduplicable quantum data medium based secret decryption and verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009, pp. 1-5, 2009, IEEE, 978-1-4244-5648-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Jesús Lázaro 0001, Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga |
AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARC ![In: Reconfigurable Computing: Architectures, Tools and Applications, 5th International Workshop, ARC 2009, Karlsruhe, Germany, March 16-18, 2009. Proceedings, pp. 312-317, 2009, Springer, 978-3-642-00640-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Kuo-Huang Chang, Yi-Cheng Chen, Chung-Cheng Hsieh |
Live Demonstration: Embedded a Low Area 32-bit AES for Image Encryption/Decryption Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2009), 24-17 May 2009, Taipei, Taiwan, pp. 1926, 2009, IEEE, 978-1-4244-3827-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Kuo-Huang Chang, Yi-Cheng Chen, Chung-Cheng Hsieh, Chi-Wu Huang, Chi-Jeng Chang |
Embedded a Low Area 32-bit AES for Image Encryption/decryption Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2009), 24-17 May 2009, Taipei, Taiwan, pp. 1922-1925, 2009, IEEE, 978-1-4244-3827-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | David Galindo, Javier Herranz |
On the security of public key cryptosystems with a double decryption mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 108(5), pp. 279-283, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Dennis Hofheinz, Enav Weinreb |
Searchable encryption with decryption in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 423, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Le Trieu Phong, Wakaha Ogata |
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 327, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Kiavash Bahreini |
Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2008 International Conference on Security & Management, SAM 2008, Las Vegas, Nevada, USA, July 14-17, 2008, pp. 449-455, 2008, CSREA Press, 1-60132-085-X. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Sigurd Eskeland, Vladimir A. Oleshchuk |
Efficient Hierarchical Group-Oriented Key Establishment and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pp. 67-72, 2008, IEEE Computer Society, 978-0-7695-3324-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Shiguo Lian, Zhongxuan Liu, Yuan Dong, Haila Wang |
On the joint audio fingerprinting and decryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, ICME 2008, June 23-26 2008, Hannover, Germany, pp. 261-264, 2008, IEEE Computer Society, 978-1-4244-2571-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Chayan Dutta, Thakar Lalitkrushna, Annie Nelson, S. R. Nagaraj, P. Lakshminarasimhan |
A New Encryption-Decryption Scheme that Solves Key Management Problem in Remote Sensing Satellite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETET ![In: First International Conference on Emerging Trends in Engineering and Technology, ICETET '08, Nagpur, Maharashtra, India, July 16-18, 2008, pp. 1261-1266, 2008, IEEE Computer Society, 978-0-7695-3267-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Manoj Seshadrinathan, Kelly L. Dempski |
Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR Workshops ![In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR Workshops 2008, Anchorage, AK, USA, 23-28 June, 2008, pp. 1-6, 2008, IEEE Computer Society, 978-1-4244-2339-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Mark White, Tai-Chi Lee, Michael Gubody |
Blowfish Encryption/Decryption Using FPGA and Custom Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDPTA ![In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, 2 Volumes, pp. 164-169, 2008, CSREA Press, 1-60132-084-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Artan Luma, Nderim Zeqiri, Zamir Dika, Biljana Percinkova |
Data Encryption and Decryption Using ANZL Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (3-1) ![In: ICEIS 2008 - Proceedings of the Tenth International Conference on Enterprise Information Systems, Volume ISAS-1, Barcelona, Spain, June 12-16, 2008, pp. 220-223, 2008, 978-989-8111-38-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Nicko van Someren |
RIPA part III - The intricacies of decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Investig. ![In: Digit. Investig. 4(3-4), pp. 113-115, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | O. O. Obi, Falah H. Ali, Elias Stipidis |
Explicit expression for decryption in a generalisation of the paillier scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 1(4), pp. 163-166, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Yu Long 0001, Kefei Chen, Shengli Liu 0001 |
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 33(3), pp. 166-176, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Hossam El-din Hussien Ahmed, Hamdy Mohamed Kalash, Osama S. Farag Allah |
An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 31(1), pp. 121-129, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang |
On the Performance of Joint Fingerprint Embedding and Decryption Scheme ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0706.3076, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Grenville J. Croll |
Some A Priori Torah Decryption Principles ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0712.2605, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong |
Efficient ID-Based Multi-Receiver Threshold Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Found. Comput. Sci. ![In: Int. J. Found. Comput. Sci. 18(5), pp. 987-1004, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001, Yumin Wang |
Group Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 17, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 167, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 392-406, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ID-based Encryption, Pairing |