The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Key with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1961 (38) 1962-1967 (15) 1968-1971 (15) 1972-1975 (23) 1976 (23) 1977-1978 (30) 1979 (23) 1980 (26) 1981 (25) 1982 (53) 1983 (44) 1984 (69) 1985 (89) 1986 (62) 1987 (110) 1988 (114) 1989 (186) 1990 (170) 1991 (144) 1992 (158) 1993 (203) 1994 (264) 1995 (365) 1996 (457) 1997 (522) 1998 (621) 1999 (881) 2000 (1219) 2001 (1632) 2002 (1849) 2003 (2429) 2004 (3346) 2005 (4194) 2006 (4700) 2007 (5290) 2008 (5168) 2009 (3729) 2010 (1592) 2011 (1223) 2012 (1158) 2013 (1296) 2014 (1347) 2015 (1422) 2016 (1724) 2017 (1551) 2018 (1665) 2019 (1786) 2020 (1898) 2021 (2024) 2022 (1948) 2023 (2119) 2024 (569)
Publication types (Num. hits)
article(19865) book(46) data(5) incollection(453) inproceedings(40846) phdthesis(295) proceedings(98)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 41555 occurrences of 11846 keywords

Results
Found 61687 publication records. Showing 61608 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25Keita Xagawa Improved (Hierarchical) Inner-Product Encryption from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Marc Fischlin, Johannes Buchmann 0001, Mark Manulis (eds.) Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Florian Böhl, Dennis Hofheinz, Daniel Kraschewski On Definitions of Selective Opening Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Shota Yamada 0001, Goichiro Hanaoka, Noboru Kunihiro Space Efficient Signature Schemes from the RSA Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Michel Abdalla, Dario Fiore 0001, Vadim Lyubashevsky From Selective to Full Security: Semi-generic Transformations in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Léo Ducas, Alain Durmus Ring-LWE in Polynomial Rings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Sven Schäge Strong Security from Probabilistic Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Brett Hemenway, Rafail Ostrovsky On Homomorphic Encryption and Chosen-Ciphertext Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Christophe Clavier, Benoit Feix, Loïc Thierry, Pascal Paillier Generating Provable Primes Efficiently on Embedded Devices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Yusuke Sakai 0001, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Dennis Hofheinz, Tibor Jager, Edward Knapp Waters Signatures with Optimal Security Reduction. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Ali Juma, Yevgeniy Vahlis, Moti Yung Multi-location Leakage Resilient Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Brett Hemenway, Steve Lu 0001, Rafail Ostrovsky Correlated Product Security from Any One-Way Function. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Udaya Parampalli, Kim Ramchen, Vanessa Teague Efficiently Shuffling in Public. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Jae Hong Seo, Jung Hee Cheon, Jonathan Katz Constant-Round Multi-party Private Set Union Using Reversed Laurent Series. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Emil Stefanov, Elaine Shi, Dawn Song Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Nelly Fazio, Irippuge Milinda Perera Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Shota Yamada 0001, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Qiong Huang 0001, Duncan S. Wong, Willy Susilo The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Aurélie Bauer, Damien Vergnaud, Jean-Christophe Zapalowicz Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Gottfried Herold Polly Cracker, Revisited, Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Craig Gentry, Shai Halevi, Nigel P. Smart Better Bootstrapping in Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25David Mandell Freeman Improved Security for Linearly Homomorphic Signatures: A Generic Framework. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Brett Hemenway, Rafail Ostrovsky Extended-DDH and Lossy Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Dario Catalano, Dario Fiore 0001, Bogdan Warinschi Efficient Network Coding Signatures in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Enrico Thomae, Christopher Wolf Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel DDH-Like Assumptions Based on Extension Rings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25David Cash, Matthew Green 0001, Susan Hohenberger New Definitions and Separations for Circular Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Dominique Schröder, Dominique Unruh Security of Blind Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Jacob Alperin-Sheriff, Chris Peikert Circular and KDM Security for Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar 0001 Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract). Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi (eds.) Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Vivien Dubois, Jean-Gabriel Kammerer Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud Signatures on Randomizable Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Vinod Vaikuntanathan New Developments in Leakage-Resilient Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Daniel J. Bernstein, Tanja Lange 0001, Peter Schwabe On the Correct Use of the Negation Map in the Pollard rho Method. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Tolga Acar, Lan Nguyen Revocation for Delegatable Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Tomas Toft Sub-linear, Secure Comparison with Two Non-colluding Parties. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Qixiang Mei, Bao Li 0001, Xianhui Lu, Dingding Jia Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Jacob C. N. Schuldt, Kanta Matsuura On-line Non-transferable Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha Oblivious Transfer with Hidden Access Control Policies. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Tatsuaki Okamoto, Katsuyuki Takashima Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Jae Hong Seo Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Matthew Green 0001 Secure Blind Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Jian Weng 0001, Yunlei Zhao, Goichiro Hanaoka On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Luk Bettale, Jean-Charles Faugère, Ludovic Perret Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Dan Boneh, David Mandell Freeman Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Nuttapong Attrapadung, Benoît Libert Homomorphic Network Coding Signatures in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Takahiro Matsuda 0002, Kanta Matsuura Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Roberto Maria Avanzi, Clemens Heuberger Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Amit Sahai, Hakan Seyalioglu Fully Secure Accountable-Authority Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik (If) Size Matters: Size-Hiding Private Set Intersection. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Junzuo Lai, Robert H. Deng, Shengli Liu 0001 Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Shota Yamada 0001, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Brent Waters Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Rishiraj Bhattacharyya, Avradip Mandal On the Impossibility of Instantiating PSS in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Phong Q. Nguyen, David Pointcheval (eds.) Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Barbara Kedzierska University as an Environment for Shaping Key Teachers' Competence for Knowledge Society. Search on Bibsonomy Key Competencies in the Knowledge Society The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Ana Amélia Amorim Carvalho ICT in Teacher Education: Developing Key Competencies in Face-to-Face and Distance Learning. Search on Bibsonomy Key Competencies in the Knowledge Society The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen Text Search Protocols with Simulation Based Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Zhenfu Cao, Ivan Visconti, Zongyang Zhang Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Sven Laur, Helger Lipmaa On the Feasibility of Consistent Computations. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa Security of Encryption Schemes in Weakened Random Oracle Models. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Toshihide Matsuda, Ryo Nishimaki, Keisuke Tanaka CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Steven D. Galbraith, Raminder S. Ruprai Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Xavier Boyen Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Mathias Herrmann, Alexander May 0001 Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Jean-Charles Faugère, Pierre-Jean Spaenlehauer Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Robert Granger, Michael Scott Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Jean-Charles Faugère, Raphaël Marinier, Guénaël Renault Implicit Factoring with Shared Most Significant and Middle Bits. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Craig Costello, Tanja Lange 0001, Michael Naehrig Faster Pairing Computations on Curves with High-Degree Twists. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Javier Herranz, Fabien Laguillaumie, Carla Ràfols Constant Size Ciphertexts in Threshold Attribute-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Nuttapong Attrapadung, Benoît Libert Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Carmit Hazay, Kobbi Nissim Efficient Set Operations in the Presence of Malicious Adversaries. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Petros Mol, Scott Yilek Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001, Yang Xiang 0001 Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder Confidential Signatures and Deterministic Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Ali Bagherzandi, Stanislaw Jarecki Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder Unlinkability of Sanitizable Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Reza Rezaeian Farashahi, Marc Joye Efficient Arithmetic on Hessian Curves. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Takuya Hayashi 0001, Naoyuki Shinohara, Lihua Wang 0001, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi Solving a 676-Bit Discrete Logarithm Problem in GF(36n). Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi Groth-Sahai Proofs Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin Secure Network Coding over the Integers. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25David Mandell Freeman, Oded Goldreich 0001, Eike Kiltz, Alon Rosen, Gil Segev 0001 More Constructions of Lossy and Correlation-Secure Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Jens Groth, Aggelos Kiayias, Helger Lipmaa Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman Preventing Pollution Attacks in Multi-source Network Coding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Stanislaw Jarecki, Gene Tsudik (eds.) Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Patrick Longa, Catherine H. Gebotys Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multibase non-adjacent form, fractional window, Elliptic curve cryptosystem, scalar multiplication, double base number system
25Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas Verifiable Rotation of Homomorphic Encryptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Paz Morillo, Carla Ràfols The Security of All Bits Using List Decoding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit security, one-way function, list decoding
25Minkyu Kim, Jung Hee Cheon, Jin Hong 0001 Subset-Restricted Random Walks for Pollard rho Method on Fpm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pollard rho method, pairing, normal basis, discrete logarithm problem
25Ivan Damgård, Martin Geisler 0001, Mikkel Krøigaard, Jesper Buus Nielsen Asynchronous Multiparty Computation: Theory and Implementation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 61608 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license