|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 917 occurrences of 351 keywords
|
|
|
Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Alfred Menezes, Berkant Ustaoglu |
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Filip Zagórski |
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. |
ICSNC |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou |
Linkability of a Blind Signature Scheme and Its Improved Scheme. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | He Ge, Stephen R. Tate |
Traceable Signature: Better Efficiency and Beyond. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature |
17 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Popescu's Authenticated Key Agreement Protocol. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Cryptanalysis, Elliptic curve cryptosystems, Key agreement |
17 | Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen |
An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
pairings, Signcryption, identity-based cryptography |
17 | Wun-She Yap, Swee-Huay Heng, Bok-Min Goi |
An Efficient Certificateless Signature Scheme. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairing, signature scheme, Certificateless |
17 | Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater |
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Aggelos Kiayias, Hong-Sheng Zhou |
Concurrent Blind Signatures Without Random Oracles. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
17 | David Galindo, Eike Kiltz |
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt |
Towards Provably Secure Group Key Agreement Building on Group Theory. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Xuebing Qing, Carlisle Adams |
KEAML - Key Exchange and Authentication Markup Language. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Kristian Gjøsteen |
A New Security Proof for Damgård's ElGamal. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura |
Toward the Fair Anonymous Signatures: Deniable Ring Signatures. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Hongsong Shi, Mingxing He, Zhiguang Qin |
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Clustering, Ad hoc networks, Bilinear pairings, Group key agreement, Hierarchical routing |
17 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Cramer-Shoup framework, subgroup membership problems, public key encryption, chosen ciphertext security, hybrid encryption |
17 | Adam L. Young, Moti Yung |
Hiding Information Hiding. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jens Groth, Rafail Ostrovsky, Amit Sahai |
Non-interactive Zaps and New Techniques for NIZK. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Shuhua Wu, Yuefei Zhu |
Practical Password-Based Authenticated Key Exchange Protocol. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jen-Chieh Lai, Chia-Hui Wang |
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. |
PSIVT |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD |
17 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
Human memorable password, different password authentication, mobile computing, dictionary attacks, authenticated key exchange |
17 | Kyung-Ah Shim |
An Identity-Based Proxy Signature Scheme from Pairings. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Michael de Mare, Rebecca N. Wright |
Secure Set Membership Using 3Sat. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | He Ge |
An Anonymous Authentication Scheme for Identification Card. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
Anonymous Identification, Privacy, Cryptographic Protocol, Identity Management, Group Signature |
17 | Wenliang Du, Jing Deng 0001, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili |
A pairwise key predistribution scheme for wireless sensor networks. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
security, Wireless sensor networks, key predistribution |
17 | Christian Cachin, Klaus Kursawe, Victor Shoup |
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Asynchronous consensus, Cryptographic common coin, Dual-threshold schemes, Byzantine faults, Threshold signatures |
17 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
17 | Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan |
Password authenticated key exchange using hidden smooth subgroups. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
authentication, cryptography, password, key exchange |
17 | Giuseppe Ateniese, Susan Hohenberger |
Proxy re-signatures: new definitions, algorithms, and applications. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
authenticating path in network, proxy re-signature, bilinear maps |
17 | Felix Brandt 0001, Tuomas Sandholm |
Efficient Privacy-Preserving Protocols for Multi-unit Auctions. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Hyun-Sun Kang, Chang-Seop Park |
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Fagen Li, Juntao Gao, Yupu Hu |
ID-Based Threshold Unsigncryption Scheme from Pairings. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
(t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof |
17 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Eberhard Stickel |
A New Method for Exchanging Secret Keys. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Nicholas Hopper |
On Steganographic Chosen Covertext Security. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Deepak Kapur, Paliath Narendran, Lida Wang |
A Unification Algorithm for Analysis of Protocols with Blinded Signatures. |
Mechanizing Mathematical Reasoning |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 |
An Identity-Based Model for Grid Security Infrastructure. |
ISSADS |
2005 |
DBLP DOI BibTeX RDF |
Identity Cryptography, Grid Security Infrastructure, Secure Group Communication |
17 | Douglas Wikström |
A Sender Verifiable Mix-Net and a New Proof of a Shuffle. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Duncan S. Wong, Agnes Hui Chan, Feng Zhu |
Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
Wireless Communications, Key Exchange, Authentication Protocol |
17 | Yevgeniy Dodis, Aleksandr Yampolskiy |
A Verifiable Random Function with Short Proofs and Keys. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Cheng-Kang Chu, Wen-Guey Tzeng |
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Kristian Gjøsteen |
Symmetric Subgroup Membership Problems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, standard model, public key encryption, hybrid encryption |
17 | Sattam S. Al-Riyami, Kenneth G. Paterson |
CBE from CL-PKE: A Generic Construction and Efficient Schemes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings |
17 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Analysis and Improvement of a Signcryption Scheme with Key Privacy. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Certificateless Public Key Encryption Without Pairing. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Hervé Chabanne, Duong Hieu Phan, David Pointcheval |
Public Traceability in Traitor Tracing Schemes. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yael Tauman Kalai |
Smooth Projective Hashing and Two-Message Oblivious Transfer. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yuanbo Guo, Jianfeng Ma 0001, Yadi Wang |
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. |
International Conference on Computational Science (3) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Duc-Liem Vo, Kwangjo Kim |
Yet Another Forward Secure Signature from Bilinear Pairings. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
key evolution, pairings, Forward security, key exposure |
17 | Sanjit Chatterjee, Palash Sarkar 0001 |
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
parameter size, security, standard model, identity based encryption |
17 | Felix Brandt 0001 |
Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Aldar C.-F. Chan, Ian F. Blake |
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography. |
ICDCS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yuanbo Guo, Jianfeng Ma 0001 |
A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Kaoru Kurosawa, Swee-Huay Heng |
Identity-Based Identification Without Random Oracles. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
ID-based cryptography, identification scheme |
17 | Manuel Barbosa, Pooya Farshim |
Efficient Identity-Based Key Encapsulation to Multiple Parties. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Key Encapsulation Mechanism (KEM), Provable Security, Identity Based Cryptography, Hybrid Encryption |
17 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Futai Zhang |
Short Designated Verifier Proxy Signature from Pairings. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Pairings, Proxy Signature, Short Signature |
17 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
ID-Based Proxy Signature Using Bilinear Pairings. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
provable security, bilinear pairings, proxy signatures, ID-based signatures |
17 | Chen Zhuo, Hong Fan, Hong Liang |
A New Authentication and Key Exchange Protocol in WLAN. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Fabien Laguillaumie, Damien Vergnaud |
Time-Selective Convertible Undeniable Signatures. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Convertible undeniable signatures, time-selective conversion, anonymity, bilinear maps, exact security |
17 | Michael Szydlo, Burton S. Kaliski Jr. |
Proofs for Two-Server Password Authentication. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
concrete security reduction, secret sharing, password authentication |
17 | Luis von Ahn, Nicholas J. Hopper, John Langford 0001 |
Covert two-party computation. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
covert computation, fair two-party computation, two-party computation, steganography |
17 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Chu-Hsing Lin, Hsiu-Hsia Lin |
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Zhenjie Huang, Zhixiong Chen, Yumin Wang |
Convertible Undeniable Partially Blind Signatures. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
ID-Based Aggregate Signatures from Bilinear Pairings. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
bilinear pairings, ID-based signatures, aggregate signatures |
17 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An efficient deniable authentication protocol. |
CW |
2005 |
DBLP DOI BibTeX RDF |
authentication, cryptography |
17 | Benoît Chevallier-Mames |
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Krzysztof Pietrzak |
Composition Does Not Imply Adaptive Security. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Changgen Peng, Xiang Li |
An Identity-Based Threshold Signcryption Scheme with Semantic Security. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Abdelkader H. Ouda, Mahmoud R. El-Sakka |
A Step Towards Practical Steganography Systems. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Irina Branovic, Roberto Giorgi, Enrico Martinelli |
A workload characterization of elliptic curve cryptography methods in embedded environments. |
SIGARCH Comput. Archit. News |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Maria Luisa Bonet, Carlos Domingo, Ricard Gavaldà, Alexis Maciel, Toniann Pitassi |
Non-Automatizability of Bounded-Depth Frege Proofs. |
Comput. Complex. |
2004 |
DBLP DOI BibTeX RDF |
Subject classification. 03F20, 68Q17, 68T15 |
17 | Dan Boneh, Ben Lynn, Hovav Shacham |
Short Signatures from the Weil Pairing. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Digital signatures, Elliptic curves, Pairings, Bilinear maps, Short signatures |
17 | Wen-Guey Tzeng |
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. |
IEEE Trans. Computers |
2004 |
DBLP DOI BibTeX RDF |
distributed oblivious transfer, Oblivious transfer, private information retrieval |
17 | Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya |
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
ID-Based encryption, broadcast encryption, forward security |
17 | Ernest F. Brickell, Jan Camenisch, Liqun Chen 0002 |
Direct anonymous attestation. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
integrity based computing, privacy, cryptographic protocols, trusted computing, anonymous credential systems |
17 | Dan Boneh, Hovav Shacham |
Group signatures with verifier-local revocation. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, group signatures, revocation |
17 | Ruizhong Wei, Jiang Wu 0001 |
Product Construction of Key Distribution Schemes for Sensor Networks. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Li Zhou, Chinya V. Ravishankar |
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
Key Agreement, Secure Group Communication, Key Authentication |
17 | Jukka Ylitalo, Pekka Nikander |
BLIND: A Complete Identity Protection Framework for End-Points. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague |
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. |
FoSSaCS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Vitaly Shmatikov |
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. |
ESOP |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Philippe Golle, Jessica Staddon, Brent R. Waters |
Secure Conjunctive Keyword Search over Encrypted Data. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Muxiang Zhang |
Password Authenticated Key Exchange Using Quadratic Residues. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Colin Boyd, Wenbo Mao, Kenneth G. Paterson |
Key Agreement Using Statically Keyed Authenticators. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Muxiang Zhang |
New Approaches to Password Authenticated Key Exchange Based on RSA. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Jean Monnerat, Serge Vaudenay |
Generic Homomorphic Undeniable Signatures. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Decryption. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Igor E. Shparlinski, Arne Winterhof |
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Kaoru Kurosawa, Swee-Huay Heng |
From Digital Signature to ID-based Identification/Signature. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
GDH group, signature scheme, ID-based cryptography, identification scheme |
17 | Emmanuel Bresson, Dario Catalano |
Constant Round Authenticated Group Key Agreement via Distributed Computation. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
New Security Results on Encrypted Key Exchange. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Taekyoung Kwon 0002 |
Practical Authenticated Key Agreement Using Passwords. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | S. Rahul, R. C. Hansdah |
An Efficient Distributed Group Key Management Algorithm. |
ICPADS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Yong-Hwan Lee, Il-Sun You, Sang-Burm Rhee |
Improving CAM-DH Protocol for Mobile Nodes with Constraint Computational Power. |
KES |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee |
TTS without Revocation Capability Secure Against CCA2. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Zhenjie Huang, Yumin Wang |
Convertible Nominative Signatures. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
nominative signature, untransferable, Digital signature, convertible |
17 | Dan Boneh, Xavier Boyen |
Short Signatures Without Random Oracles. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #901 - #1000 of 1148 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|