|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 645 occurrences of 247 keywords
|
|
|
Results
Found 875 publication records. Showing 875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Chris Karlof, David A. Wagner 0001 |
Hidden Markov Model Cryptanalysis. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Julien Cathalo, François Koeune, Jean-Jacques Quisquater |
A New Type of Timing Attack: Application to GPS. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
GPS, Side-Channel Attacks, Timing Attacks, Identification Schemes |
10 | Kiamal Z. Pekmestzi, Nikos K. Moshopoulos |
A Systolic, High Speed Architecture for an RSA Cryptosystem. |
J. VLSI Signal Process. |
2002 |
DBLP DOI BibTeX RDF |
Montgomery algorithm, modular squaring, RSA, public key cryptography, modular multiplication |
10 | Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim 0001, Kee-Young Yoo |
New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata. |
PARA |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Dario Catalano, Phong Q. Nguyen, Jacques Stern |
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
Paillier, Hensel, One-wayness, RSA, Lattice, Discrete logarithm, Public-key |
10 | Emmanuel Bresson, Jacques Stern |
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Panu Hämäläinen, Marko Hännikäinen, Markku Niemi, Timo Hämäläinen 0001 |
Performance evaluation of Secure Remote Password protocol. |
ISCAS (3) |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Johann Großschädl |
Instruction Set Extension for Long Integer Modulo Arithmetic on RISC-Based Smart Cards. |
SBAC-PAD |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Elena Trichina, Antonio Bellezza |
Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Hyunchul Shin, Jin-Aeon Lee, Lee-Sup Kim |
A hardware cost minimized fast Phong shader. |
IEEE Trans. Very Large Scale Integr. Syst. |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Bradley D. Brown, Howard C. Card |
Stochastic Neural Computation I: Computational Elements. |
IEEE Trans. Computers |
2001 |
DBLP DOI BibTeX RDF |
stochastic arithmetic, computational elements, Pulsed neural networks |
10 | Akihiro Yamamura, Kaoru Kurosawa |
Generic Algorithms and Key Agreement Protocols Based on Group Actions. |
ISAAC |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Klaus Reinhardt |
The Complexity of Translating Logic to Finite Automata. |
Automata, Logics, and Infinite Games |
2001 |
DBLP DOI BibTeX RDF |
|
10 | William Hesse |
Division Is in Uniform TC0. |
ICALP |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Jorge Guajardo, Rainer Blümel, Uwe Krieger, Christof Paar |
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Marc Joye, Christophe Tymen |
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms |
10 | Willi Geiselmann, Harald Lukhaub |
Redundant Representation of Finite Fields. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi |
Lenient/Strict Batch Verification in Several Groups. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Nick Howgrave-Graham, Joan G. Dyer, Rosario Gennaro |
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Adam L. Young, Moti Yung |
Bandwidth-Optimal Kleptographic Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory |
10 | Wei-Chang Tsai, C. Bernard Shung, Sheng-Jyh Wang |
Two systolic architectures for modular multiplication. |
IEEE Trans. Very Large Scale Integr. Syst. |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Colin Boyd, Chris Pavlovski |
Attacking and Repairing Batch Verification Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
10 | Muxiang Zhang, Christopher Carroll, Agnes Hui Chan |
The Software-Oriented Stream Cipher SSC2. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Hagen Ploog, Dirk Timmermann |
On Multiple Precision Based Montgomery Multiplication without Precomputation of N0´ = -N0-1 mod W. |
ICCD |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Alain Colmerauer, Thi-Bich-Hanh Dao |
Expressiveness of Full First Order Constraints in the Algebra of Finite or Infinite Trees. |
CP |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Rosario Gennaro |
An Improved Pseudo-random Generator Based on Discrete Log. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Johann Großschädl |
High-Speed RSA Hardware Based on Barret's Modular Reduction Method. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
RSA algorithm, partial parallel multiplier, full-custom VLSI design, pipelining, Public-key cryptography, modular arithmetic |
10 | Johann Großschädl |
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency |
10 | Colin D. Walter |
Moduli for Testing Implementations of the RSA Cryptosystem. |
IEEE Symposium on Computer Arithmetic |
1999 |
DBLP DOI BibTeX RDF |
RSA modulus, implementation validation benchmark, verification, testing, cryptography, Computer arithmetic, correctness |
10 | Jan Camenisch, Markus Michels |
Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Jyh-Huei Guo, Chin-Liang Wang, Hung-Chih Hu |
Design and implementation of an RSA public-key cryptosystem. |
ISCAS (1) |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Jen-Shiun Chiang, Jian-Kao Chen |
An efficient VLSI architecture for RSA public-key cryptosystem. |
ISCAS (1) |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Siguna Müller |
On the Combined Fermat/Lucas Probable Prime Test. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Vincent D. Blondel |
Structured Numbers: Properties of a Hierarchy of Operations on Binary Trees. |
Acta Informatica |
1998 |
DBLP DOI BibTeX RDF |
|
10 | Erik De Win, Serge Mister, Bart Preneel, Michael J. Wiener |
On the Performance of Signature Schemes Based on Elliptic Curves. |
ANTS |
1998 |
DBLP DOI BibTeX RDF |
|
10 | M. R. K. Krishna Rao, Abdul Sattar 0001 |
Learning from Entailment of Logic Programs with Local Variables. |
ALT |
1998 |
DBLP DOI BibTeX RDF |
|
10 | Tatsuaki Okamoto, Moti Yung |
Lower Bounds on Term-Based Divisible Cash Systems. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
10 | Markus Jakobsson |
A Practical Mix. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
privacy, robustness, error detection, Mix-network, decryption |
10 | Woei-Jiunn Tsaur, Shi-Jinn Horng, Shung-Shing Lee, Ruey-Chang Tsai |
An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments. |
ICPADS |
1997 |
DBLP DOI BibTeX RDF |
Internet, distributed systems, computer networks, Data security, data communications |
10 | Johannes Buchmann 0001, Sachar Paulus |
A One Way Function Based on Ideal Arithmetic in Number Fields. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
number fields, shortest vectors in lattices, One way function |
10 | Yair Frankel, Yiannis Tsiounis, Moti Yung |
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
10 | Paul C. van Oorschot, Michael J. Wiener |
On Diffie-Hellman Key Agreement with Short Exponents. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
10 | Irina E. Bocharova, Boris D. Kudryashov |
Fast Exponentation in Cryptography. |
AAECC |
1995 |
DBLP DOI BibTeX RDF |
|
10 | Matthew K. Franklin, Michael K. Reiter |
Verifiable Signature Sharing. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
10 | Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra |
Some Remarks on Lucas-Based Cryptosystems. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
10 | Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini |
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
cryptography, computer security, secret sharing, threshold schemes, group oriented cryptography |
10 | Masayuki Abe, Hikaru Morita |
Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
10 | Ingrid Biehl, Johannes A. Buchmann, Christoph Thiel |
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
10 | Thomas Beth, Hans-Joachim Knobloch, Marcus Otten |
Verifiable Secret Sharing for Monotone Access Structures. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
10 | Abraham Lempel, Gadiel Seroussi |
Application of Finte Fields to Memory Interleaving. |
AAECC |
1993 |
DBLP DOI BibTeX RDF |
|
10 | Peter Kornerup |
High-radix modular multiplication for cryptosystems. |
IEEE Symposium on Computer Arithmetic |
1993 |
DBLP DOI BibTeX RDF |
|
10 | Anindya Banerjee 0001, David A. Schmidt |
A Categorical Interpretation of Landin's Correspondence Principle. |
MFPS |
1993 |
DBLP DOI BibTeX RDF |
|
10 | Peter de Rooij |
On Schnorr's Preprocessing for Digital Signature Schemes. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
10 | Pierre Lescanne |
Termination of Rewrite Systems by Elementary Interpretations. |
ALP |
1992 |
DBLP DOI BibTeX RDF |
|
10 | Eugène van Heijst, Torben P. Pedersen, Birgit Pfitzmann |
New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract). |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
10 | Srecko Brlek, Pierre Castéran, Robert Strandh |
On Addition Schemes. |
TAPSOFT, Vol.2 |
1991 |
DBLP DOI BibTeX RDF |
compilation of functional languages, Scheme programming language, semi-numerical algorithms, continuations, addition chains, programming languages semantics |
10 | Thomas Beth, F. Schaefer |
Non Supersingular Elliptic Curves for Public Key Cryptosystems. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
10 | Masakatu Morii, Yuzo Takamatsu |
Exponetiation in Finite Fields Using Dual Basis Multiplier. |
AAECC |
1990 |
DBLP DOI BibTeX RDF |
|
10 | Hikaru Morita |
A Fast Modular-multiplication Module for Smart Cards. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
10 | Mikael Rittri |
Retrieving Library Identifiers via Equational Matching of Types. |
CADE |
1990 |
DBLP DOI BibTeX RDF |
|
10 | Gisela Meister |
On an Implementation of the Mohan-Adiga Algorithm. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
10 | Yacov Yacobi |
Exponentiating Faster with Addition Chains. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
10 | Dominique de Waleffe, Jean-Jacques Quisquater |
CORSAIR: A SMART Card for Public Key Cryptosystems. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
public key algorithms, digital signature, Smart card, RSA, zero-knowledge protocols |
10 | Brian A. LaMacchia, Andrew M. Odlyzko |
Computation of Discrete Logarithms in Prime Fields (Extended Abstract). |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
10 | Colin Boyd |
A New Multiple Key Cipher and an Improved Voting Scheme. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
10 | Claus-Peter Schnorr |
Efficient Identification and Signatures for Smart Cards (Abstract). |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
10 | Amos Fiat |
Batch RSA. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
10 | Claus-Peter Schnorr |
Efficient Identification and Signatures for Smart Cards. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
10 | António L. Furtado 0001, Paulo A. S. Veloso |
Iteration for applicative languages. |
ACM SIGPLAN Notices |
1988 |
DBLP DOI BibTeX RDF |
|
10 | Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts |
Fast RSA-Hardware: Dream or Reality? |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
10 | René Peralta 0001 |
Simultaneous Security of Bits in the Discrete Log. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
10 | Yvo Desmedt, Andrew M. Odlyzko |
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
10 | Karl J. Lieberherr |
Uniform Complexity and Digital Signatures. |
ICALP |
1981 |
DBLP DOI BibTeX RDF |
|
10 | John Cocke, Marvin Minsky |
Universality of Tag Systems with P=2. |
J. ACM |
1964 |
DBLP DOI BibTeX RDF |
|
Displaying result #801 - #875 of 875 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9] |
|