The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Diffie-Hellman (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1990 (18) 1991-1995 (15) 1996-1997 (21) 1998 (19) 1999 (17) 2000 (27) 2001 (32) 2002 (38) 2003 (57) 2004 (90) 2005 (93) 2006 (101) 2007 (97) 2008 (107) 2009 (75) 2010 (33) 2011 (25) 2012 (18) 2013 (28) 2014 (25) 2015-2016 (36) 2017 (28) 2018 (28) 2019 (32) 2020 (22) 2021 (22) 2022 (30) 2023-2024 (14)
Publication types (Num. hits)
article(353) incollection(13) inproceedings(780) phdthesis(2)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(111) CRYPTO(60) EUROCRYPT(56) Public Key Cryptography(42) ASIACRYPT(29) CCS(23) J. Cryptol.(22) ProvSec(21) CoRR(19) CT-RSA(19) RFC(17) INDOCRYPT(16) ACISP(15) ISC(15) ACNS(14) CANS(13) More (+10 of total 348)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 917 occurrences of 351 keywords

Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Alfred Menezes, Berkant Ustaoglu On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski, Filip Zagórski Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou Linkability of a Blind Signature Scheme and Its Improved Scheme. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17He Ge, Stephen R. Tate Traceable Signature: Better Efficiency and Beyond. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature
17Eun-Jun Yoon, Kee-Young Yoo An Improved Popescu's Authenticated Key Agreement Protocol. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Cryptography, Cryptanalysis, Elliptic curve cryptosystems, Key agreement
17Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF pairings, Signcryption, identity-based cryptography
17Wun-She Yap, Swee-Huay Heng, Bok-Min Goi An Efficient Certificateless Signature Scheme. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear pairing, signature scheme, Certificateless
17Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Aggelos Kiayias, Hong-Sheng Zhou Concurrent Blind Signatures Without Random Oracles. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17David Galindo, Eike Kiltz Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt Towards Provably Secure Group Key Agreement Building on Group Theory. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Xuebing Qing, Carlisle Adams KEAML - Key Exchange and Authentication Markup Language. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Kristian Gjøsteen A New Security Proof for Damgård's ElGamal. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura Toward the Fair Anonymous Signatures: Deniable Ring Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Hongsong Shi, Mingxing He, Zhiguang Qin Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clustering, Ad hoc networks, Bilinear pairings, Group key agreement, Hierarchical routing
17Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cramer-Shoup framework, subgroup membership problems, public key encryption, chosen ciphertext security, hybrid encryption
17Adam L. Young, Moti Yung Hiding Information Hiding. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jens Groth, Rafail Ostrovsky, Amit Sahai Non-interactive Zaps and New Techniques for NIZK. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Shuhua Wu, Yuefei Zhu Practical Password-Based Authenticated Key Exchange Protocol. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jen-Chieh Lai, Chia-Hui Wang Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. Search on Bibsonomy PSIVT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD
17Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Human memorable password, different password authentication, mobile computing, dictionary attacks, authenticated key exchange
17Kyung-Ah Shim An Identity-Based Proxy Signature Scheme from Pairings. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Michael de Mare, Rebecca N. Wright Secure Set Membership Using 3Sat. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17He Ge An Anonymous Authentication Scheme for Identification Card. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anonymous Identification, Privacy, Cryptographic Protocol, Identity Management, Group Signature
17Wenliang Du, Jing Deng 0001, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili A pairwise key predistribution scheme for wireless sensor networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Wireless sensor networks, key predistribution
17Christian Cachin, Klaus Kursawe, Victor Shoup Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Asynchronous consensus, Cryptographic common coin, Dual-threshold schemes, Byzantine faults, Threshold signatures
17Wen-Guey Tzeng, Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF revocation, broadcast encryption, traitor tracing
17Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan Password authenticated key exchange using hidden smooth subgroups. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, cryptography, password, key exchange
17Giuseppe Ateniese, Susan Hohenberger Proxy re-signatures: new definitions, algorithms, and applications. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authenticating path in network, proxy re-signature, bilinear maps
17Felix Brandt 0001, Tuomas Sandholm Efficient Privacy-Preserving Protocols for Multi-unit Auctions. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Hyun-Sun Kang, Chang-Seop Park MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Fagen Li, Juntao Gao, Yupu Hu ID-Based Threshold Unsigncryption Scheme from Pairings. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof
17Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong ID-Based Signature Scheme Without Trusted PKG. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Eberhard Stickel A New Method for Exchanging Secret Keys. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Nicholas Hopper On Steganographic Chosen Covertext Security. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Deepak Kapur, Paliath Narendran, Lida Wang A Unification Algorithm for Analysis of Protocols with Blinded Signatures. Search on Bibsonomy Mechanizing Mathematical Reasoning The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 An Identity-Based Model for Grid Security Infrastructure. Search on Bibsonomy ISSADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Identity Cryptography, Grid Security Infrastructure, Secure Group Communication
17Douglas Wikström A Sender Verifiable Mix-Net and a New Proof of a Shuffle. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Duncan S. Wong, Agnes Hui Chan, Feng Zhu Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Wireless Communications, Key Exchange, Authentication Protocol
17Yevgeniy Dodis, Aleksandr Yampolskiy A Verifiable Random Function with Short Proofs and Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Cheng-Kang Chu, Wen-Guey Tzeng Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Kristian Gjøsteen Symmetric Subgroup Membership Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF subgroup membership problem, standard model, public key encryption, hybrid encryption
17Sattam S. Al-Riyami, Kenneth G. Paterson CBE from CL-PKE: A Generic Construction and Efficient Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings
17Guomin Yang, Duncan S. Wong, Xiaotie Deng Analysis and Improvement of a Signcryption Scheme with Key Privacy. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Certificateless Public Key Encryption Without Pairing. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Hervé Chabanne, Duong Hieu Phan, David Pointcheval Public Traceability in Traitor Tracing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Yael Tauman Kalai Smooth Projective Hashing and Two-Message Oblivious Transfer. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Yuanbo Guo, Jianfeng Ma 0001, Yadi Wang An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Duc-Liem Vo, Kwangjo Kim Yet Another Forward Secure Signature from Bilinear Pairings. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key evolution, pairings, Forward security, key exposure
17Sanjit Chatterjee, Palash Sarkar 0001 Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF parameter size, security, standard model, identity based encryption
17Felix Brandt 0001 Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Aldar C.-F. Chan, Ian F. Blake Scalable, Server-Passive, User-Anonymous Timed Release Cryptography. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Yuanbo Guo, Jianfeng Ma 0001 A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Kaoru Kurosawa, Swee-Huay Heng Identity-Based Identification Without Random Oracles. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ID-based cryptography, identification scheme
17Manuel Barbosa, Pooya Farshim Efficient Identity-Based Key Encapsulation to Multiple Parties. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Encapsulation Mechanism (KEM), Provable Security, Identity Based Cryptography, Hybrid Encryption
17Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Futai Zhang Short Designated Verifier Proxy Signature from Pairings. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, Pairings, Proxy Signature, Short Signature
17Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng ID-Based Proxy Signature Using Bilinear Pairings. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF provable security, bilinear pairings, proxy signatures, ID-based signatures
17Chen Zhuo, Hong Fan, Hong Liang A New Authentication and Key Exchange Protocol in WLAN. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Fabien Laguillaumie, Damien Vergnaud Time-Selective Convertible Undeniable Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Convertible undeniable signatures, time-selective conversion, anonymity, bilinear maps, exact security
17Michael Szydlo, Burton S. Kaliski Jr. Proofs for Two-Server Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concrete security reduction, secret sharing, password authentication
17Luis von Ahn, Nicholas J. Hopper, John Langford 0001 Covert two-party computation. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF covert computation, fair two-party computation, two-party computation, steganography
17Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Chu-Hsing Lin, Hsiu-Hsia Lin Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Zhenjie Huang, Zhixiong Chen, Yumin Wang Convertible Undeniable Partially Blind Signatures. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng ID-Based Aggregate Signatures from Bilinear Pairings. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear pairings, ID-based signatures, aggregate signatures
17Hui-Feng Huang, Chin-Chen Chang 0001 An efficient deniable authentication protocol. Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, cryptography
17Benoît Chevallier-Mames An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Krzysztof Pietrzak Composition Does Not Imply Adaptive Security. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Changgen Peng, Xiang Li An Identity-Based Threshold Signcryption Scheme with Semantic Security. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Abdelkader H. Ouda, Mahmoud R. El-Sakka A Step Towards Practical Steganography Systems. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Irina Branovic, Roberto Giorgi, Enrico Martinelli A workload characterization of elliptic curve cryptography methods in embedded environments. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Maria Luisa Bonet, Carlos Domingo, Ricard Gavaldà, Alexis Maciel, Toniann Pitassi Non-Automatizability of Bounded-Depth Frege Proofs. Search on Bibsonomy Comput. Complex. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Subject classification. 03F20, 68Q17, 68T15
17Dan Boneh, Ben Lynn, Hovav Shacham Short Signatures from the Weil Pairing. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Digital signatures, Elliptic curves, Pairings, Bilinear maps, Short signatures
17Wen-Guey Tzeng Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF distributed oblivious transfer, Oblivious transfer, private information retrieval
17Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-Based encryption, broadcast encryption, forward security
17Ernest F. Brickell, Jan Camenisch, Liqun Chen 0002 Direct anonymous attestation. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF integrity based computing, privacy, cryptographic protocols, trusted computing, anonymous credential systems
17Dan Boneh, Hovav Shacham Group signatures with verifier-local revocation. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF trusted computing, group signatures, revocation
17Ruizhong Wei, Jiang Wu 0001 Product Construction of Key Distribution Schemes for Sensor Networks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Li Zhou, Chinya V. Ravishankar Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Key Agreement, Secure Group Communication, Key Authentication
17Jukka Ylitalo, Pekka Nikander BLIND: A Complete Identity Protection Framework for End-Points. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Ajith Ramanathan, John C. Mitchell, Andre Scedrov, Vanessa Teague Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols. Search on Bibsonomy FoSSaCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Vitaly Shmatikov Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. Search on Bibsonomy ESOP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Philippe Golle, Jessica Staddon, Brent R. Waters Secure Conjunctive Keyword Search over Encrypted Data. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Muxiang Zhang Password Authenticated Key Exchange Using Quadratic Residues. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Colin Boyd, Wenbo Mao, Kenneth G. Paterson Key Agreement Using Statically Keyed Authenticators. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Muxiang Zhang New Approaches to Password Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Jean Monnerat, Serge Vaudenay Generic Homomorphic Undeniable Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Igor E. Shparlinski, Arne Winterhof A Nonuniform Algorithm for the Hidden Number Problem in Subgroups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Kaoru Kurosawa, Swee-Huay Heng From Digital Signature to ID-based Identification/Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GDH group, signature scheme, ID-based cryptography, identification scheme
17Emmanuel Bresson, Dario Catalano Constant Round Authenticated Group Key Agreement via Distributed Computation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Emmanuel Bresson, Olivier Chevassut, David Pointcheval New Security Results on Encrypted Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Taekyoung Kwon 0002 Practical Authenticated Key Agreement Using Passwords. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17S. Rahul, R. C. Hansdah An Efficient Distributed Group Key Management Algorithm. Search on Bibsonomy ICPADS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Yong-Hwan Lee, Il-Sun You, Sang-Burm Rhee Improving CAM-DH Protocol for Mobile Nodes with Constraint Computational Power. Search on Bibsonomy KES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee TTS without Revocation Capability Secure Against CCA2. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Zhenjie Huang, Yumin Wang Convertible Nominative Signatures. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF nominative signature, untransferable, Digital signature, convertible
17Dan Boneh, Xavier Boyen Short Signatures Without Random Oracles. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1148 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license