The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Pance Ribarski, Ljupcho Antovski Mixnets: Implementation and performance evaluation of decryption and re-encryption types. Search on Bibsonomy ITI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Saddam Quirem, Byeong Kil Lee AES decryption using warp-synchronous programming. Search on Bibsonomy IPCCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Alexander Albrecht, Felix Naumann Schema Decryption for Large Extract-Transform-Load Systems. Search on Bibsonomy ER The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser 0001 Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Xuhua Zhou, Xuhua Ding, Kefei Chen A Generic Construction of Accountable Decryption and Its Applications. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Vipin Kumar, Chirag Chetan, Aparajita Ojha On a Visual Secret Sharing Scheme with High Quality Decryption. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Panyaporn Prangjarote, Chih-Yang Lin, Li-Wei Kang, Chia-Hung Yeh Joint Fingerprinting and Decryption for VQ Images through Bipartite Matching. Search on Bibsonomy ICGEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Hoonjung Lee, Junghoon Kim, Junggab Son, Sangjin Kim, Heekuck Oh ID-based key management scheme using threshold decryption for OPMD environment. Search on Bibsonomy ICCE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Santanu Sarkar 0001, Subhamoy Maitra Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents. Search on Bibsonomy CHES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Burt Kaliski Decryption Exponent. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Feng Xu, Xin Lv, Likun Jia A New Verifiable Threshold Decryption Scheme Without Trusted Center. Search on Bibsonomy Intell. Autom. Soft Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Christopher Portmann, Keisuke Tanaka Information-Theoretic Secrecy with Access to Decryption Oracles. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Boris S. Verkhovsky Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls. Search on Bibsonomy Int. J. Commun. Netw. Syst. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Daniel R. L. Brown Identity-Based Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
15Matthew Green 0001 Secure Blind Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
15Mahmood Al-khassaweneh Image encryption method based on using least square error techniques at the decryption stage. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Gerassimos D. Barlas, Ahmed Hassan, Yasser Al Jundi An Analytical Approach to the Design of Parallel Block Cipher Encryption/Decryption: A CPU/GPU Case Study. Search on Bibsonomy PDP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Varun Mittal, Piyush Murli Agarwal An encryption and decryption algorithm for messages transmitted by phonetic alphabets. Search on Bibsonomy SoCPaR The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Lukasz Smolinski Maintaining uniformity in the processes of encryption and decryption with a variable number of encryption rounds. Search on Bibsonomy EWDTS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Yang Zhang 0015, Junliang Chen Flexible Authorization by Generating Public Re-decryption Trapdoor in Outsourced Scenarios. Search on Bibsonomy IEEE CLOUD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Outsourced Data Service, Proxy Re-encryption Scheme, Access Control
15Hong Di, Kangfeng Zheng, Xinxin Niu, Xin Zhang Multiple-image compressed encryption and decryption by compressive holography. Search on Bibsonomy VCIP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Matthew Green 0001, Susan Hohenberger, Brent Waters Outsourcing the Decryption of ABE Ciphertexts. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2011 DBLP  BibTeX  RDF
15Yi-Chang Hsu, Jing-Jang Hwang Controlling Decryption of Personal Health Records in the Cloud. Search on Bibsonomy ICITCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Bo Song, Yasuaki Ito, Koji Nakano CRT-Based DSP Decryption Using Montgomery Modular Multiplication on the FPGA. Search on Bibsonomy IPDPS Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Matthew Green 0001 Secure Blind Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Takahiro Matsuda 0002, Kanta Matsuura Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou 0001 Identity-Based Server-Aided Decryption. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Bibhudendra Acharya, Nikhil Thomas, D. R. Kavin Arasu, N. Vishnu Prasad Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. Search on Bibsonomy ICCCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Jing Cao, Xue-feng Xing, Li-min Liu An IBE scheme with threshold to decryption for groups. Search on Bibsonomy FSKD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Naveed Islam, William Puech Decryption of noisy encrypted images by statistical analysis. Search on Bibsonomy EUVIP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Anil Hingmire, D. R. Ingle, Rahul Ambekar A new data encryption & decryption algorithm (PSZ proposal): a comparison with RSA. Search on Bibsonomy ICWET The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15D. Ganotra, S. S. Mantha, A. Vinaya Babu Encryption decryption algorithm for m-commerce. Search on Bibsonomy ICWET The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Luan Lan The AES Encryption and Decryption Realization Based on FPGA. Search on Bibsonomy CIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Patrick McHardy, Andreas Schuler, Erik Tews Interactive decryption of DECT phone calls. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Kuo-Ching Liu, Hui-Feng Huang A New Design of Encryption/Decryption for Field Applications. Search on Bibsonomy J. Convergence Inf. Technol. The full citation details ... 2010 DBLP  BibTeX  RDF
15Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park Fair threshold decryption with semi-trusted third parties. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Shu-Hui Chang, Chuan-Ming Li, Tzonelih Hwang Identity-based Hierarchical Designated Decryption. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2010 DBLP  BibTeX  RDF
15Santanu Sarkar 0001, Subhamoy Maitra Cryptanalysis of RSA with more than one decryption exponent. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Santanu Sarkar 0001, Subhamoy Maitra Cryptanalysis of RSA with two decryption exponents. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Xi Chen 0037, Shiguo Lian On the DCT Based Joint Fingerprint Embedding and Decryption Scheme. Search on Bibsonomy J. Multim. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15P. Karthigaikumar, K. Baskaran Partially Pipelined VLSI Implementation of Blowfish Encryption/Decryption Algorithm. Search on Bibsonomy Int. J. Image Graph. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Natasa Zivic Iterative method for improvement of coding and decryption Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
15Vasily Dolmatov GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Kenneth G. Paterson, Gaven J. Watson Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
15Jia Xu A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
15Ivan Zelinka, Roman Jasek Evolutionary Decryption of Chaotically Encrypted Information. Search on Bibsonomy Evolutionary Algorithms and Chaotic Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Rikke Bendlin, Ivan Damgård Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. Search on Bibsonomy TCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15K. G. Gopchandran, K. Gopakumar, B. Premlet Information encryption and decryption using hyperchaotic systems in delayed nonlinear feedback systems. Search on Bibsonomy ICUMT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Ratheesh Kumar Meleppat, C. L. Linslal, V. P. Mahadevan Pillai, Sudheer Sreedhara Krishna Color image encryption and decryption based on jigsaw transform employed at the input plane of a double random phase encoding system. Search on Bibsonomy ICUMT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Abraham Oommen Panicker, A. Jabeena, A. Hassan Mujeeb Advanced image encryption and decryption using sandwich phase diffuser and false image along with cryptographical enhancement. Search on Bibsonomy ICUMT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Simon R. Lang, Neville I. Williams Impeding CAPTCHA Breakers with Visual Decryption. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
15Yunfei Li, Qing Liu, Tong Li, Wenming Xiao Two efficient methods to speed up the Batch RSA decryption. Search on Bibsonomy IWACI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Chih-Yang Lin, Wei-Lun Huang, Tzung-Her Chen Noise-Resistant Joint Fingerprinting and Decryption Based on Vector Quantization. Search on Bibsonomy BWCCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Da-Peng Guo, Qiu-Hua Lin Fast decryption utilizing correlation calculation for BSS-based speech encryption system. Search on Bibsonomy ICNC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Debasis Giri, Prithayan Barua, P. D. Srivastava, Biswapati Jana A Cryptosystem for Encryption and Decryption of Long Confidential Messages. Search on Bibsonomy ISA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Kenneth G. Paterson, Gaven J. Watson Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. Search on Bibsonomy EUROCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Subhamoy Maitra, Santanu Sarkar 0001, Sourav Sen Gupta 0001 Publishing Upper Half of RSA Decryption Exponent. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Xin Lv, Congming Wang Public Verifiable Threshold Decryption Scheme without Trusted Center. Search on Bibsonomy GCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Akshay Wattal, Anjali Agarwal, Ankit Kathuria Astute image encryption and decryption using modified secure image encryption algorithm (M-SIP). Search on Bibsonomy ICWET The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Subhamoy Maitra, Santanu Sarkar 0001 Efficient CRT-RSA Decryption for Small Encryption Exponents. Search on Bibsonomy CT-RSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Ram Ratan Key Independent Decryption of Graphically Encrypted Images. Search on Bibsonomy PAISI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Fan Wu 0013, Johnel Woods, Chung-Han Chen, Hira N. Narang High Performance Symmetric Decryption Algorithm on General Purpose Graphics Processing Unit. Search on Bibsonomy PDPTA The full citation details ... 2010 DBLP  BibTeX  RDF
15Sherman S. M. Chow, Wun-She Yap Partial decryption attacks in security-mediated certificateless encryption. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Fouz Sattar, Muid Mufti On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2009 DBLP  BibTeX  RDF
15R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi, M. Suguna Knapsack Based ECC Encryption and Decryption. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2009 DBLP  BibTeX  RDF
15Ting Yi Chang An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks. Search on Bibsonomy Comput. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Le Trieu Phong, Wakaha Ogata New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Rajaram Ramasamy, Amutha Prabakar Muniyandi, M. Indra Devi A new algorithm for encryption/decryption for field applications. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Rajesh Kumar Pateriya, J. L. Rana, S. C. Shrivastava, Jaideep Patel A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
15Natasa Zivic Strategies and performances of Soft Input Decryption Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
15Mihir Bellare, Dennis Hofheinz, Eike Kiltz Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
15Rikke Bendlin, Ivan Damgård Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
15Hung-Min Sun, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, Vincent S. Tseng Trading decryption for speeding encryption in Rebalanced-RSA. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Weiping Zhang 0003, Wenyuan Chen, Jian Tang, Peng Xu, Yibin Li, Shengyong Li The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock. Search on Bibsonomy Sensors The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Natasa Zivic, Esad Kadusic, Mirko Skrbic Mathematical optimization of decrypting algorithm for soft input decryption. Search on Bibsonomy ICAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Stelian Flonta, Liviu Cristian Miclea, Izabella Diana Paun ElGamal with differentiated decryption on K+1 access levels. Search on Bibsonomy SACI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Laszlo Gyongyosi, Sándor Imre Unduplicable quantum data medium based secret decryption and verification. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Jesús Lázaro 0001, Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Kuo-Huang Chang, Yi-Cheng Chen, Chung-Cheng Hsieh Live Demonstration: Embedded a Low Area 32-bit AES for Image Encryption/Decryption Application. Search on Bibsonomy ISCAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Kuo-Huang Chang, Yi-Cheng Chen, Chung-Cheng Hsieh, Chi-Wu Huang, Chi-Jeng Chang Embedded a Low Area 32-bit AES for Image Encryption/decryption Application. Search on Bibsonomy ISCAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15David Galindo, Javier Herranz On the security of public key cryptosystems with a double decryption mechanism. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Dennis Hofheinz, Enav Weinreb Searchable encryption with decryption in the standard model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
15Le Trieu Phong, Wakaha Ogata Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
15Kiavash Bahreini Encryption and Decryption of Bitmap Images via Blowfish and Pseudo Triple DES Block Cipher Algorithms in Distributed Systems. Search on Bibsonomy Security and Management The full citation details ... 2008 DBLP  BibTeX  RDF
15Sigurd Eskeland, Vladimir A. Oleshchuk Efficient Hierarchical Group-Oriented Key Establishment and Decryption. Search on Bibsonomy IAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Shiguo Lian, Zhongxuan Liu, Yuan Dong, Haila Wang On the joint audio fingerprinting and decryption scheme. Search on Bibsonomy ICME The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Chayan Dutta, Thakar Lalitkrushna, Annie Nelson, S. R. Nagaraj, P. Lakshminarasimhan A New Encryption-Decryption Scheme that Solves Key Management Problem in Remote Sensing Satellite. Search on Bibsonomy ICETET The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Manoj Seshadrinathan, Kelly L. Dempski Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU. Search on Bibsonomy CVPR Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Mark White, Tai-Chi Lee, Michael Gubody Blowfish Encryption/Decryption Using FPGA and Custom Instructions. Search on Bibsonomy PDPTA The full citation details ... 2008 DBLP  BibTeX  RDF
15Artan Luma, Nderim Zeqiri, Zamir Dika, Biljana Percinkova Data Encryption and Decryption Using ANZL Algorithm. Search on Bibsonomy ICEIS (3-1) The full citation details ... 2008 DBLP  BibTeX  RDF
15Nicko van Someren RIPA part III - The intricacies of decryption. Search on Bibsonomy Digit. Investig. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15O. O. Obi, Falah H. Ali, Elias Stipidis Explicit expression for decryption in a generalisation of the paillier scheme. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Yu Long 0001, Kefei Chen, Shengli Liu 0001 ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Hossam El-din Hussien Ahmed, Hamdy Mohamed Kalash, Osama S. Farag Allah An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2007 DBLP  BibTeX  RDF
15Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang On the Performance of Joint Fingerprint Embedding and Decryption Scheme Search on Bibsonomy CoRR The full citation details ... 2007 DBLP  BibTeX  RDF
15Grenville J. Croll Some A Priori Torah Decryption Principles Search on Bibsonomy CoRR The full citation details ... 2007 DBLP  BibTeX  RDF
15Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong Efficient ID-Based Multi-Receiver Threshold Decryption. Search on Bibsonomy Int. J. Found. Comput. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001, Yumin Wang Group Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
15Yi-Ru Liu, Wen-Guey Tzeng Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
15Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based Encryption, Pairing
Displaying result #801 - #900 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license