The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1977 (15) 1978-1979 (15) 1980-1982 (58) 1983-1984 (26) 1985-1986 (23) 1987-1988 (25) 1989 (40) 1990 (30) 1991 (35) 1992 (25) 1993 (21) 1994 (40) 1995 (83) 1996 (72) 1997 (161) 1998 (151) 1999 (192) 2000 (203) 2001 (269) 2002 (266) 2003 (413) 2004 (462) 2005 (1107) 2006 (751) 2007 (770) 2008 (836) 2009 (770) 2010 (641) 2011 (1762) 2012 (584) 2013 (637) 2014 (667) 2015 (644) 2016 (679) 2017 (668) 2018 (708) 2019 (799) 2020 (821) 2021 (994) 2022 (952) 2023 (1011) 2024 (232)
Publication types (Num. hits)
article(3493) book(110) data(1) incollection(1974) inproceedings(12442) phdthesis(297) proceedings(341)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7345 occurrences of 1913 keywords

Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern Total Break of the l-IC Signature Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson Proxy Signatures Secure Against Proxy Key Exposure. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provable security, proxy signatures
28Tatsuaki Okamoto, Xiaoyun Wang (eds.) Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen 07021 Abstracts Collection -- Symmetric Cryptography. Search on Bibsonomy Symmetric Cryptography The full citation details ... 2007 DBLP  BibTeX  RDF
28Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen 07021 Executive Summary -- Symmetric Cryptography. Search on Bibsonomy Symmetric Cryptography The full citation details ... 2007 DBLP  BibTeX  RDF
28Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer 07381 Abstracts Collection -- Cryptography. Search on Bibsonomy Cryptography The full citation details ... 2007 DBLP  BibTeX  RDF
28Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer 07381 Executive Summary - Cryptography. Search on Bibsonomy Cryptography The full citation details ... 2007 DBLP  BibTeX  RDF
28Jens Groth, Steve Lu 0001 Verifiable Shuffle of Large Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF homomorphic commitment, honest verifier zero-knowledge, homomorphic encryption, Shuffle, mix-net
28Noboru Kunihiro, Kaoru Kurosawa Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, factoring, LLL algorithm
28Xavier Boyen, Brent Waters Full-Domain Subgroup Hiding and Constant-Size Group Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum Optimistic Fair Exchange in a Multi-user Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Marc Fischlin Anonymous Signatures Made Easy. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF perfectly one-way hash function, Anonymity, signature scheme, randomness extractor
28Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi A Closer Look at PKI: Security and Efficiency. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Akinori Kawachi, Keisuke Tanaka, Keita Xagawa Multi-bit Cryptosystems Based on Lattice Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Takashi Nishide, Kazuo Ohta Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bitwise Sharing, Secret Sharing, Multiparty Computation
28Mihir Bellare, Sarah Shoup Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Nicolas Gama, Phong Q. Nguyen New Chosen-Ciphertext Attacks on NTRU. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Eiichiro Fujisaki, Koutarou Suzuki Traceable Ring Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Designated Confirmer Signature, Digital Signature, Fair Exchange
28Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
28Rafail Ostrovsky, William E. Skeith III A Survey of Single-Database Private Information Retrieval: Techniques and Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Juan A. Garay, Berry Schoenmakers, José Villegas Practical and Secure Solutions for Integer Comparison. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Millionaires’ problem, secure multi-party computation, homomorphic encryption
28Huafei Zhu, Willy Susilo, Yi Mu 0001 Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF setup-free, stand-alone, verifiably committed signatures, multi-party
28Alex D. Myasnikov, Alexander Ushakov Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Jung Hee Cheon, Jeong Hyun Yi Fast Batch Verification of Multiple Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sparse exponent, elliptic curve, exponentiation, Koblitz curve, Batch verification, non-adjacent form, Frobenius map
28Hovav Shacham, Brent Waters Efficient Ring Signatures Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko Efficient Pseudorandom Generators Based on the DDH Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Ahto Buldas, Sven Laur Knowledge-Binding Commitments with Applications in Time-Stamping. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Daewan Han, Myung-Hwan Kim, Yongjin Yeom Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack
28Emmanuel Bresson, Dario Catalano, Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Dima Ruinskiy, Adi Shamir, Boaz Tsaban Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Thompson’s group, Shpilrain-Ushakov, Subgroup distance function, Cryptanalysis, Key agreement
28He Ge, Stephen R. Tate A Direct Anonymous Attestation Scheme for Embedded Devices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature
28Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart Identity-Based Traitor Tracing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (eds.) Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Yvo Desmedt, Tanja Lange 0001 Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Matthieu Finiasz, Serge Vaudenay When Stream Cipher Analysis Meets Public-Key Cryptography. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF discrete logarithm, proof of knowledge, Public key cryptanalysis
28Daniel J. Bernstein Curve25519: New Diffie-Hellman Speed Records. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF new curve, new software, high conjectured security, short keys, elliptic curves, high speed, Diffie-Hellman, point multiplication, constant time
28Ivan Damgård, Rune Thorbek Linear Integer Secret Sharing and Distributed Exponentiation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Dan Boneh, Emily Shen, Brent Waters Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Anna Lysyanskaya, Mira Meyerovich Provably Secure Steganography with Imperfect Sampling. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital signatures, Markov processes, steganography, Information hiding
28Payman Mohassel, Matthew K. Franklin Efficient Polynomial Operations in the Shared-Coefficients Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF polynomial operations, threshold homomorphic encryption, privacy-preserving set operations, secure multi-party computation, passive adversary
28Kaoru Kurosawa, Katja Schmidt-Samoa New Online/Offline Signature Schemes Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption
28Sylvain Pasini, Serge Vaudenay SAS-Based Authenticated Key Agreement. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval The Twist-AUgmented Technique for Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Payman Mohassel, Matthew K. Franklin Efficiency Tradeoffs for Malicious Two-Party Computation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation
28Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval Password-Based Group Key Exchange in a Constant Number of Rounds. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Group Key Exchange, Password-based Authentication
28Daniel Bleichenbacher, Alexander May 0001 New Attacks on RSA with Small Secret CRT-Exponents. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, RSA, lattices
28Tor E. Bjørstad, Alexander W. Dent Building Better Signcryption Schemes with Tag-KEMs. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval Encoding-Free ElGamal Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Frédéric Muller, Frédéric Valette High-Order Attacks Against the Exponent Splitting Protection. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28An Commeine, Igor A. Semaev An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Discrete Logarithms, Number Field Sieve
28Isamu Teranishi, Kazue Sako k-Times Anonymous Authentication with a Constant Proving Cost. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF k-times anonymous authentication, efficiency, public verifiability
28Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Eike Kiltz On the Limitations of the Spread of an IBE-to-PKE Transformation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Ilya Mironov Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance
28Craig Gentry, Zulfikar Ramzan Identity-Based Aggregate Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Sanjit Chatterjee, Palash Sarkar 0001 Generalization of the Selective-ID Security Model for HIBE Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Cheng-Kang Chu, Wen-Guey Tzeng Conditional Oblivious Cast. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF oblivious cast, conditional oblivious transfer, secure computation
28Kristin E. Lauter, Anton Mityagin Security Analysis of KEA Authenticated Key Exchange Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai Parallel Key-Insulated Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Serge Vaudenay (eds.) Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Yvo Desmedt Threshold Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Darrel Hankerson, Alfred Menezes Elliptic Curve Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Kazue Sako Public Key Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Daniele Micciancio Lattice Based Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Gilles Brassard, Claude Crépeau Quantum Cryptography. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Roberto Maria Avanzi, Tanja Lange 0001 Introduction to Public-Key Cryptography. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Sylvain Duquesne, Tanja Lange 0001 Pairing-Based Cryptography. Search on Bibsonomy Handbook of Elliptic and Hyperelliptic Curve Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Ivan Damgård, Kasper Dupont Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Hung-Min Sun, Cheng-Ta Yang RSA with Balanced Short Exponents and Its Application to Entity Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Short Exponent Attack, RSA, Lattice Reduction, Entity Authentication
28Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih Fast Multi-computations with Integer Similarity Strategy. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications
28David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan Experimenting with Faults, Lattices and the DSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF glitch attacks, fault injection, lattice reduction, DSA
28Emil Ong, John Kubiatowicz Optimizing Robustness While Generating Shared Secret Safe Primes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed key generation, safe primes, threshold RSA signatures
28Michel Abdalla, Olivier Chevassut, David Pointcheval One-Time Verifier-Based Encrypted Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Michel Abdalla, Pierre-Alain Fouque, David Pointcheval Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
28Louis Granboulan A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Dario Catalano, Rosario Gennaro Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Ryotaro Hayashi 0001, Keisuke Tanaka The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF undeniable and confirmer signature, anonymity, encryption, RSA, ring signature
28Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption
28Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security analysis, Undeniable signature
28Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang Tractable Rational Map Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tractable rational maps, digital signature, finite field, public key, multivariate
28Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk Converse Results to the Wiener Attack on RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Werner Schindler On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Montgomerys multiplication algo-rithm, statistical decision problem, optimal decision strategy, Side-channel attack, stochastic process
28Jakob Jonsson, Matthew J. B. Robshaw Securing RSA-KEM via the AES. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA-KEM, key derivation function, AES
28Oded Yacobi, Yacov Yacobi A New Related Message Attack on RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Jintai Ding, Dieter Schmidt Cryptanalysis of HFEv and Internal Perturbation of HFE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials
28Christopher Wolf, Bart Preneel Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public Key Schemes, Multivariate Quadratic Equations
28Yevgeniy Dodis, Aleksandr Yampolskiy A Verifiable Random Function with Short Proofs and Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Cheng-Kang Chu, Wen-Guey Tzeng Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Julien Cathalo, Jean-Sébastien Coron, David Naccache From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Kristian Gjøsteen Symmetric Subgroup Membership Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF subgroup membership problem, standard model, public key encryption, hybrid encryption
28Sattam S. Al-Riyami, Kenneth G. Paterson CBE from CL-PKE: A Generic Construction and Efficient Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings
28Daniel Bleichenbacher Breaking a Cryptographic Protocol with Pseudoprimes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Feng Bao 0001, Robert H. Deng, Jianying Zhou 0001 (eds.) Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Jacques Stern Cryptography and the French Banking Cards: Past, Present, Future. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Jean-Sébastien Coron Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Takeshi Koshiba, Kaoru Kurosawa Short Exponent Diffie-Hellman Problems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 18658 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license