The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1988 (16) 1989-1993 (16) 1994-1997 (27) 1998 (18) 1999 (15) 2000 (23) 2001 (37) 2002 (55) 2003 (67) 2004 (75) 2005 (97) 2006 (102) 2007 (105) 2008 (99) 2009 (90) 2010 (37) 2011 (27) 2012 (22) 2013 (20) 2014 (32) 2015 (39) 2016 (42) 2017 (32) 2018 (45) 2019 (69) 2020 (65) 2021 (56) 2022 (71) 2023 (58) 2024 (13)
Publication types (Num. hits)
article(474) incollection(6) inproceedings(988) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1021 occurrences of 506 keywords

Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Sudhir Aggarwal, Daniel Beech, Rajarshi Das, Breno de Medeiros, Eric Thompson X-Online: An Online Interface for Digital Decryption Tools. Search on Bibsonomy SADFE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Robert Sliz, Min-Yung Chang, Min-Jui Huang Secure Encryption, Decryption and Internet-based Transfer of the Binary Images. Search on Bibsonomy iiWAS The full citation details ... 2007 DBLP  BibTeX  RDF
15Yu Long 0001, Kefei Chen Construction of Dynamic Threshold Decryption Scheme from Pairing. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2006 DBLP  BibTeX  RDF
15Jae-Gil Lee 0001, Kyu-Young Whang Secure query processing against encrypted XML data using Query-Aware Decryption. Search on Bibsonomy Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Goichiro Hanaoka, Hideki Imai A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
15Lihua Wang 0001, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
15Yongdong Wu, Feng Bao 0001 Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Sigurd Eskeland Access control by secure multi-party EPR decryption in the medical scenario. Search on Bibsonomy Communication, Network, and Information Security The full citation details ... 2006 DBLP  BibTeX  RDF
15Savvas Gitzenis, Nicholas Bambos Power-managed block level file decryption in wireless network computing. Search on Bibsonomy WiOpt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Burton S. Kaliski Jr. Decryption Exponent. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Robert W. Vaagan, Wallace Koehler Intellectual property rights vs. public access rights: ethical aspects of the DeCSS decryption program. Search on Bibsonomy Inf. Res. The full citation details ... 2005 DBLP  BibTeX  RDF
15Jun Furukawa 0001 Efficient and Verifiable Shuffling and Shuffle-Decryption. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2005 DBLP  BibTeX  RDF
15Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia Implementation of A Fast Square In RSA Encryption/Decryption Architecture. Search on Bibsonomy Security and Management The full citation details ... 2005 DBLP  BibTeX  RDF
15Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay Multiplier. Search on Bibsonomy Security and Management The full citation details ... 2005 DBLP  BibTeX  RDF
15Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack
15Charlie Obimbo A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption. Search on Bibsonomy CSC The full citation details ... 2005 DBLP  BibTeX  RDF
15Igor E. Shparlinski On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Ghassan Kbar Improved SSL application using session key based double key encryption/decryption (SDKED). Search on Bibsonomy Parallel and Distributed Computing and Networks The full citation details ... 2004 DBLP  BibTeX  RDF
15Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner Design of a reconfigurable AES encryption/decryption engine for mobile terminals. Search on Bibsonomy ISCAS (2) The full citation details ... 2004 DBLP  BibTeX  RDF
15Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong Delegation of signing and decryption rights using pki proxy memo. Search on Bibsonomy IASTED Conf. on Software Engineering The full citation details ... 2004 DBLP  BibTeX  RDF
15Zhenchuan Chai, Zhenfu Cao, Rongxing Lu ID-based threshold decryption without random oracles and its application in key escrow. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Jonathan K. Millen On the freedom of decryption. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios Large decryption exponents in RSA. Search on Bibsonomy Appl. Math. Lett. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
15Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
15Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte NAEP: Provable Security in the Presence of Decryption Failures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
15John Proos Imperfect Decryption and an Attack on the NTRU Encryption Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
15Gene Eu Jan, Lokar J. Y. Lin, W. R. Liou, Y. Y. Chen The Design and Implementation of a 2048-Bit RSA Encryption/Decryption Chip. Search on Bibsonomy VLSI The full citation details ... 2003 DBLP  BibTeX  RDF
15Nikos Sklavos 0001, Alexandros Papakonstantinou, Spyros Theoharis, Odysseas G. Koufopavlou Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques. Search on Bibsonomy VLSI Design The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Jan Camenisch, Victor Shoup Practical Verifiable Encryption and Decryption of Discrete Logarithms. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
15S. M. Shahruz, A. K. Pradeep, R. Gurumoorthy Design of a novel cryptosystem based on dynamic encryption and decryption by observability. Search on Bibsonomy CDC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15John G. Apostolopoulos, Susie J. Wee Secure scalable streaming enabling transcoding without decryption. Search on Bibsonomy ICIP (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Tsuyoshi Takagi New public-key cryptosystems with fast decryption. (PDF / PS) Search on Bibsonomy 2001   RDF
15Peter Pesic The Clue to the Labyrinth: Francis BACON and the Decryption of Nature. Search on Bibsonomy Cryptologia The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Sachar Paulus, Tsuyoshi Takagi A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time. Search on Bibsonomy J. Cryptol. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Min-Shiang Hwang, Chin-Chen Chang 0001, Kuo-Feng Hwang A threshold decryption scheme without session keys. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Michael C.-J. Lin, Youn-Long Lin A VLSI implementation of the blowfish encryption/decryption algorithm. Search on Bibsonomy ASP-DAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Jui-Cheng Yen, Jiun-In Guo A new chaotic key-based design for image encryption and decryption. Search on Bibsonomy ISCAS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15John R. T. Brazier Possible NSA Decryption Capabilities. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 1999 DBLP  BibTeX  RDF
15Sachar Paulus, Tsuyoshi Takagi A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
15Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 1997 DBLP  BibTeX  RDF
15Kazuo Ohta Remarks on Blind Decryption. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
15Klaus Huber, Stefan Wolter Telekom's MAGENTA algorithm for en-/decryption in the Gigabit/sec range. Search on Bibsonomy ICASSP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
15Rani Siromoney, K. G. Subramanian 0001, P. J. Abisha Encryption-Decryption Techniques for Pictures. Search on Bibsonomy Int. J. Pattern Recognit. Artif. Intell. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
15Rani Siromoney, K. G. Subramanian 0001, P. J. Abisha Encryption-Decryption Techniques for Pictures. Search on Bibsonomy Array Grammars, Patterns and Recognizers The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
15Michael Lucks A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
15Thomas Cheatham Message Decryption and Spelling Checkers. Search on Bibsonomy Cryptologia The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
15Mel L. Barclay, Joshua S. Barclay Use of microcomputer System for Medical Record Encryption and Decryption Using a Sequential Pseudo-Random Key. Search on Bibsonomy Cryptologia The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
15Paul S. Henry Fast decryption algorithm for the knapsack cipher. Search on Bibsonomy Comput. Secur. The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
15Rajendra S. Wall Decryption of Simple Substitution Cyphers with Word Divisions Using a Content Addressable Memory. Search on Bibsonomy Cryptologia The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
8Sanjeev Ghosh, Sangeeta Mishra, Payal Saha Chaos based encryption technique for digital images. Search on Bibsonomy ICWET The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
8Muhammad Adnan Tariq, Boris Koldehofe, Ala Altaweel, Kurt Rothermel Providing basic security mechanisms in broker-less publish/subscribe systems. Search on Bibsonomy DEBS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, P2P, publish/subscribe
8Flavius Opritoiu, Mircea Vladutiu, Lucian Prodan, Mihai Udrescu A high-speed AES architecture implementation. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cryptochip, optimization, fpga, hardware, aes
8Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Giuseppe Bianchi 0001 Key escrow schemes with sliding window for privacy-aware anomaly detection system. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Shamir's scheme, privacy, sliding window, key revocation
8Radia J. Perlman, Charlie Kaufman, Ray A. Perlner Privacy-preserving DRM. Search on Bibsonomy IDtrust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF blindable parameterizable public key, privacy, algorithms, protocols, DRM
8Shiguo Lian Quasi-commutative watermarking and encryption for secure media content distribution. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Commutative watermarking and encryption (CWE), Watermarking, Digital rights management (DRM), Video encryption
8Kenneth G. Paterson, Sriramkrishnan Srinivasan On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60
8Luiz Octavio Massato Kobayashi, Sérgio Shiguemi Furuie Proposal for DICOM Multiframe Medical Image Integrity and Authenticity. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, image processing, authenticity, integrity, DICOM
8Fahim K. Sufi, Ibrahim Khalil A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking. Search on Bibsonomy J. Medical Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ECG obfuscation, ECG feature detection, Securing ECG data, ECG encryption, HIPAA
8Ali Zemouche, Mohamed Boutayeb Sobolev Norms-Based State Estimation and Input Recovery for a Class of Nonlinear Systems. Design and Experimental Results. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Miodrag J. Mihaljevic, Hideki Imai An approach for stream ciphers design based on joint computing over random and secret data. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60, 94B60
8Andrej Dujella A variant of Wiener's attack on RSA. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) Primary: 94A60, Secondary: 11A55, 11J70
8Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis Deep packet anonymization. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing Provably secure and efficient bounded ciphertext policy attribute based encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute based encryption
8Masana Murase, Kanna Shimizu, Wilfred Plouffe, Masaharu Sakamoto Effective implementation of the cell broadband engineTM isolation loader. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cell broadband engine(tm), encrypt-then-sign, substituted-ciphertext attack, multi-core, isolation
8Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai A generic construction of useful client puzzles. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity based KEM, security notions, useful client puzzle
8Xianghan Zheng, Vladimir A. Oleshchuk A secure architecture for P2PSIP-based communication systems. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chord secure proxy, DHT (distributed hash table), session initiation protocol (SIP), peer-to-peer (P2P), chord, P2PSIP
8David Canright, Dag Arne Osvik A More Compact AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tower field, composite Galois field, bitslice, AES
8Tetsu Iwata, Kan Yasuda BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode
8Burkhard Englert, Pritesh Shah On the design and implementation of a secure online password vault. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, web services, authentication, passwords, Ajax
8Kyong-jin Kim, Eugene Kim, Seng-Phil Hong Privacy information protection in portable device. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy information protection, portable device
8Markus Hinkelmann, Andreas Jakoby Preserving Privacy versus Data Retention. Search on Bibsonomy TAMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Zubair Md. Fadlullah, Tarik Taleb, Nidal Nasser, Nei Kato Exploring the security requirements for quality of service in combined wired and wireless networks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF quality of protection, quality of service, encryption
8Nobuyuki Sato, Eijiro Sumii The Higher-Order, Call-by-Value Applied Pi-Calculus. Search on Bibsonomy APLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Joseph K. Liu, Jianying Zhou 0001 An Efficient Identity-Based Online/Offline Encryption Scheme. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Chang Liu, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau A Control-Based Approach to Balance Services Performance and Security for Adaptive Service Based Systems (ASBS). Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa Efficient Public Key Encryption Based on Ideal Lattices. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. Search on Bibsonomy ICIC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Hao Yuan, Mikhail J. Atallah Efficient and secure distribution of massive geo-spatial data. Search on Bibsonomy GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF geo-spatial access control, key assignment and derivation, key management
8Wolter Pieters, Qiang Tang 0001 Data Is Key: Introducing the Data-Based Access Control Paradigm. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data-based access control, de-perimeterisation, secret sharing, secure sketches
8Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Karatsuba-Ofman multiplier, polynomial inversion, field programmable gate arrays, Elliptic curve cryptography, Galois field, polynomial multiplication
8Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto Compact CCA-Secure Encryption for Messages of Arbitrary Length. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conditional proxy re-encryption, random oracle, chosen-ciphertext security
8Behzad Malek, Ali Miri Combining Attribute-Based and Access Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Maria Chiara Laghi, Michele Amoretti, Gianni Conte Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, peer-to-peer, service
8Qianhong Wu, Yi Mu 0001, Willy Susilo, Bo Qin, Josep Domingo-Ferrer Asymmetric Group Key Agreement. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Aggelos Kiayias, Serdar Pehlivanoglu On the security of a public-key traitor tracing scheme with sublinear ciphertext size. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF blackbox tracing, public key cryptosystem, traitor tracing
8Yu-Fang Chung, Tzer-Shyong Chen, Chia-Chao Ho, Yi-Hsuan Yeh, Hsiu-Chia Ko Hierarchical Time-Bound Key Management for Mobile Agents. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Time-bound Key Management, Access Control, Mobile Agent, Key Management, Elliptic Curve Cryptosystem
8Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, Falko Strenzke A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. Search on Bibsonomy ASAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Yong-Joon Park, Zhao Zhang, Songqing Chen Run-Time Detection of Malwares via Dynamic Control-Flow Inspection. Search on Bibsonomy ASAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Benoît Libert, Damien Vergnaud Adaptive-ID Secure Revocable Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provable security, revocation, Identity-based encryption
8Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005, Mike Grace ReFormat: Automatic Reverse Engineering of Encrypted Messages. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data Lifetime Analysis, Security, Reverse Engineering, Encryption, Network Protocols
8Riccardo Focardi, Flaminia L. Luccio, Graham Steel Blunting Differential Attacks on PIN Processing APIs. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Financial Cryptography, PIN Verification, Security APIs
8Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
8Craig Gentry Computing on Encrypted Data. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Markus Kasper, Timo Kasper, Amir Moradi 0001, Christof Paar Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
8Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk Practical Threshold Signatures with Linear Secret Sharing Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear secret sharing, function sharing, threshold cryptography
8Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani Reducing Key Length of the McEliece Cryptosystem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Alternant code, quasi-cyclic, public-key cryptography, McEliece cryptosystem
8Benny Applebaum, David Cash, Chris Peikert, Amit Sahai Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-dependent message security, Learning problems, Encryption, Lattice-based cryptography
8Brent Waters Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1470 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license