Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Sudhir Aggarwal, Daniel Beech, Rajarshi Das, Breno de Medeiros, Eric Thompson |
X-Online: An Online Interface for Digital Decryption Tools. |
SADFE |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Robert Sliz, Min-Yung Chang, Min-Jui Huang |
Secure Encryption, Decryption and Internet-based Transfer of the Binary Images. |
iiWAS |
2007 |
DBLP BibTeX RDF |
|
15 | Yu Long 0001, Kefei Chen |
Construction of Dynamic Threshold Decryption Scheme from Pairing. |
Int. J. Netw. Secur. |
2006 |
DBLP BibTeX RDF |
|
15 | Jae-Gil Lee 0001, Kyu-Young Whang |
Secure query processing against encrypted XML data using Query-Aware Decryption. |
Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Goichiro Hanaoka, Hideki Imai |
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
15 | Lihua Wang 0001, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto |
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
15 | Yongdong Wu, Feng Bao 0001 |
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Sigurd Eskeland |
Access control by secure multi-party EPR decryption in the medical scenario. |
Communication, Network, and Information Security |
2006 |
DBLP BibTeX RDF |
|
15 | Savvas Gitzenis, Nicholas Bambos |
Power-managed block level file decryption in wireless network computing. |
WiOpt |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Burton S. Kaliski Jr. |
Decryption Exponent. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Robert W. Vaagan, Wallace Koehler |
Intellectual property rights vs. public access rights: ethical aspects of the DeCSS decryption program. |
Inf. Res. |
2005 |
DBLP BibTeX RDF |
|
15 | Jun Furukawa 0001 |
Efficient and Verifiable Shuffling and Shuffle-Decryption. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2005 |
DBLP BibTeX RDF |
|
15 | Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia |
Implementation of A Fast Square In RSA Encryption/Decryption Architecture. |
Security and Management |
2005 |
DBLP BibTeX RDF |
|
15 | Himanshu Thapliyal, M. B. Srinivas, Hamid R. Arabnia |
Faster RSA Encryption/Decryption Architecture Using an Efficient High Speed Overlay Multiplier. |
Security and Management |
2005 |
DBLP BibTeX RDF |
|
15 | Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha |
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack |
15 | Charlie Obimbo |
A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption. |
CSC |
2005 |
DBLP BibTeX RDF |
|
15 | Igor E. Shparlinski |
On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA. |
Inf. Process. Lett. |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Ghassan Kbar |
Improved SSL application using session key based double key encryption/decryption (SDKED). |
Parallel and Distributed Computing and Networks |
2004 |
DBLP BibTeX RDF |
|
15 | Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner |
Design of a reconfigurable AES encryption/decryption engine for mobile terminals. |
ISCAS (2) |
2004 |
DBLP BibTeX RDF |
|
15 | Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong |
Delegation of signing and decryption rights using pki proxy memo. |
IASTED Conf. on Software Engineering |
2004 |
DBLP BibTeX RDF |
|
15 | Zhenchuan Chai, Zhenfu Cao, Rongxing Lu |
ID-based threshold decryption without random oracles and its application in key escrow. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Jonathan K. Millen |
On the freedom of decryption. |
Inf. Process. Lett. |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Luis Hernández Encinas, Jaime Muñoz Masqué, A. Queiruga Dios |
Large decryption exponents in RSA. |
Appl. Math. Lett. |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild |
Distributing the Encryption and Decryption of a Block Cipher. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
15 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Decryption. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
15 | Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte |
NAEP: Provable Security in the Presence of Decryption Failures. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
15 | John Proos |
Imperfect Decryption and an Attack on the NTRU Encryption Scheme. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
15 | Gene Eu Jan, Lokar J. Y. Lin, W. R. Liou, Y. Y. Chen |
The Design and Implementation of a 2048-Bit RSA Encryption/Decryption Chip. |
VLSI |
2003 |
DBLP BibTeX RDF |
|
15 | Nikos Sklavos 0001, Alexandros Papakonstantinou, Spyros Theoharis, Odysseas G. Koufopavlou |
Low-power Implementation of an Encryption/Decryption System with Asynchronous Techniques. |
VLSI Design |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Jan Camenisch, Victor Shoup |
Practical Verifiable Encryption and Decryption of Discrete Logarithms. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
15 | S. M. Shahruz, A. K. Pradeep, R. Gurumoorthy |
Design of a novel cryptosystem based on dynamic encryption and decryption by observability. |
CDC |
2002 |
DBLP DOI BibTeX RDF |
|
15 | John G. Apostolopoulos, Susie J. Wee |
Secure scalable streaming enabling transcoding without decryption. |
ICIP (1) |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Tsuyoshi Takagi |
New public-key cryptosystems with fast decryption. (PDF / PS) |
|
2001 |
RDF |
|
15 | Peter Pesic |
The Clue to the Labyrinth: Francis BACON and the Decryption of Nature. |
Cryptologia |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Sachar Paulus, Tsuyoshi Takagi |
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time. |
J. Cryptol. |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Min-Shiang Hwang, Chin-Chen Chang 0001, Kuo-Feng Hwang |
A threshold decryption scheme without session keys. |
Comput. Electr. Eng. |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Michael C.-J. Lin, Youn-Long Lin |
A VLSI implementation of the blowfish encryption/decryption algorithm. |
ASP-DAC |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Jui-Cheng Yen, Jiun-In Guo |
A new chaotic key-based design for image encryption and decryption. |
ISCAS |
2000 |
DBLP DOI BibTeX RDF |
|
15 | John R. T. Brazier |
Possible NSA Decryption Capabilities. |
Datenschutz und Datensicherheit |
1999 |
DBLP BibTeX RDF |
|
15 | Sachar Paulus, Tsuyoshi Takagi |
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
15 | Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi |
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. |
Electron. Colloquium Comput. Complex. |
1997 |
DBLP BibTeX RDF |
|
15 | Kazuo Ohta |
Remarks on Blind Decryption. |
ISW |
1997 |
DBLP DOI BibTeX RDF |
|
15 | Klaus Huber, Stefan Wolter |
Telekom's MAGENTA algorithm for en-/decryption in the Gigabit/sec range. |
ICASSP |
1996 |
DBLP DOI BibTeX RDF |
|
15 | Rani Siromoney, K. G. Subramanian 0001, P. J. Abisha |
Encryption-Decryption Techniques for Pictures. |
Int. J. Pattern Recognit. Artif. Intell. |
1989 |
DBLP DOI BibTeX RDF |
|
15 | Rani Siromoney, K. G. Subramanian 0001, P. J. Abisha |
Encryption-Decryption Techniques for Pictures. |
Array Grammars, Patterns and Recognizers |
1989 |
DBLP DOI BibTeX RDF |
|
15 | Michael Lucks |
A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Cheatham |
Message Decryption and Spelling Checkers. |
Cryptologia |
1987 |
DBLP DOI BibTeX RDF |
|
15 | Mel L. Barclay, Joshua S. Barclay |
Use of microcomputer System for Medical Record Encryption and Decryption Using a Sequential Pseudo-Random Key. |
Cryptologia |
1982 |
DBLP DOI BibTeX RDF |
|
15 | Paul S. Henry |
Fast decryption algorithm for the knapsack cipher. |
Comput. Secur. |
1982 |
DBLP DOI BibTeX RDF |
|
15 | Rajendra S. Wall |
Decryption of Simple Substitution Cyphers with Word Divisions Using a Content Addressable Memory. |
Cryptologia |
1980 |
DBLP DOI BibTeX RDF |
|
8 | Sanjeev Ghosh, Sangeeta Mishra, Payal Saha |
Chaos based encryption technique for digital images. |
ICWET |
2011 |
DBLP DOI BibTeX RDF |
|
8 | Muhammad Adnan Tariq, Boris Koldehofe, Ala Altaweel, Kurt Rothermel |
Providing basic security mechanisms in broker-less publish/subscribe systems. |
DEBS |
2010 |
DBLP DOI BibTeX RDF |
security, P2P, publish/subscribe |
8 | Flavius Opritoiu, Mircea Vladutiu, Lucian Prodan, Mihai Udrescu |
A high-speed AES architecture implementation. |
Conf. Computing Frontiers |
2010 |
DBLP DOI BibTeX RDF |
cryptochip, optimization, fpga, hardware, aes |
8 | Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Giuseppe Bianchi 0001 |
Key escrow schemes with sliding window for privacy-aware anomaly detection system. |
EDBT/ICDT Workshops |
2010 |
DBLP DOI BibTeX RDF |
Shamir's scheme, privacy, sliding window, key revocation |
8 | Radia J. Perlman, Charlie Kaufman, Ray A. Perlner |
Privacy-preserving DRM. |
IDtrust |
2010 |
DBLP DOI BibTeX RDF |
blindable parameterizable public key, privacy, algorithms, protocols, DRM |
8 | Shiguo Lian |
Quasi-commutative watermarking and encryption for secure media content distribution. |
Multim. Tools Appl. |
2009 |
DBLP DOI BibTeX RDF |
Commutative watermarking and encryption (CWE), Watermarking, Digital rights management (DRM), Video encryption |
8 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. |
Des. Codes Cryptogr. |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
8 | Luiz Octavio Massato Kobayashi, Sérgio Shiguemi Furuie |
Proposal for DICOM Multiframe Medical Image Integrity and Authenticity. |
J. Digit. Imaging |
2009 |
DBLP DOI BibTeX RDF |
Security, image processing, authenticity, integrity, DICOM |
8 | Fahim K. Sufi, Ibrahim Khalil |
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking. |
J. Medical Syst. |
2009 |
DBLP DOI BibTeX RDF |
ECG obfuscation, ECG feature detection, Securing ECG data, ECG encryption, HIPAA |
8 | Ali Zemouche, Mohamed Boutayeb |
Sobolev Norms-Based State Estimation and Input Recovery for a Class of Nonlinear Systems. Design and Experimental Results. |
IEEE Trans. Signal Process. |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Miodrag J. Mihaljevic, Hideki Imai |
An approach for stream ciphers design based on joint computing over random and secret data. |
Computing |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 94B60 |
8 | Andrej Dujella |
A variant of Wiener's attack on RSA. |
Computing |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) Primary: 94A60, Secondary: 11A55, 11J70 |
8 | Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis |
Deep packet anonymization. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing |
Provably secure and efficient bounded ciphertext policy attribute based encryption. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute based encryption |
8 | Masana Murase, Kanna Shimizu, Wilfred Plouffe, Masaharu Sakamoto |
Effective implementation of the cell broadband engineTM isolation loader. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
cell broadband engine(tm), encrypt-then-sign, substituted-ciphertext attack, multi-core, isolation |
8 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
A generic construction of useful client puzzles. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
identity based KEM, security notions, useful client puzzle |
8 | Xianghan Zheng, Vladimir A. Oleshchuk |
A secure architecture for P2PSIP-based communication systems. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
chord secure proxy, DHT (distributed hash table), session initiation protocol (SIP), peer-to-peer (P2P), chord, P2PSIP |
8 | David Canright, Dag Arne Osvik |
A More Compact AES. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
tower field, composite Galois field, bitslice, AES |
8 | Tetsu Iwata, Kan Yasuda |
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode |
8 | Burkhard Englert, Pritesh Shah |
On the design and implementation of a secure online password vault. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
security, web services, authentication, passwords, Ajax |
8 | Kyong-jin Kim, Eugene Kim, Seng-Phil Hong |
Privacy information protection in portable device. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
privacy information protection, portable device |
8 | Markus Hinkelmann, Andreas Jakoby |
Preserving Privacy versus Data Retention. |
TAMC |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Zubair Md. Fadlullah, Tarik Taleb, Nidal Nasser, Nei Kato |
Exploring the security requirements for quality of service in combined wired and wireless networks. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
quality of protection, quality of service, encryption |
8 | Nobuyuki Sato, Eijiro Sumii |
The Higher-Order, Call-by-Value Applied Pi-Calculus. |
APLAS |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Joseph K. Liu, Jianying Zhou 0001 |
An Efficient Identity-Based Online/Offline Encryption Scheme. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Chang Liu, Chang-Hai Jiang, Hai Hu, Kai-Yuan Cai, Dazhi Huang, Stephen S. Yau |
A Control-Based Approach to Balance Services Performance and Security for Adaptive Service Based Systems (ASBS). |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa |
Efficient Public Key Encryption Based on Ideal Lattices. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan |
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. |
ICIC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Hao Yuan, Mikhail J. Atallah |
Efficient and secure distribution of massive geo-spatial data. |
GIS |
2009 |
DBLP DOI BibTeX RDF |
geo-spatial access control, key assignment and derivation, key management |
8 | Wolter Pieters, Qiang Tang 0001 |
Data Is Key: Introducing the Data-Based Access Control Paradigm. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
data-based access control, de-perimeterisation, secret sharing, secure sketches |
8 | Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail |
FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Karatsuba-Ofman multiplier, polynomial inversion, field programmable gate arrays, Elliptic curve cryptography, Galois field, polynomial multiplication |
8 | Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto |
Compact CCA-Secure Encryption for Messages of Arbitrary Length. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Conditional proxy re-encryption, random oracle, chosen-ciphertext security |
8 | Behzad Malek, Ali Miri |
Combining Attribute-Based and Access Systems. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Maria Chiara Laghi, Michele Amoretti, Gianni Conte |
Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
security, peer-to-peer, service |
8 | Qianhong Wu, Yi Mu 0001, Willy Susilo, Bo Qin, Josep Domingo-Ferrer |
Asymmetric Group Key Agreement. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Aggelos Kiayias, Serdar Pehlivanoglu |
On the security of a public-key traitor tracing scheme with sublinear ciphertext size. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
blackbox tracing, public key cryptosystem, traitor tracing |
8 | Yu-Fang Chung, Tzer-Shyong Chen, Chia-Chao Ho, Yi-Hsuan Yeh, Hsiu-Chia Ko |
Hierarchical Time-Bound Key Management for Mobile Agents. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Time-bound Key Management, Access Control, Mobile Agent, Key Management, Elliptic Curve Cryptosystem |
8 | Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, Falko Strenzke |
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. |
ASAP |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Yong-Joon Park, Zhao Zhang, Songqing Chen |
Run-Time Detection of Malwares via Dynamic Control-Flow Inspection. |
ASAP |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Benoît Libert, Damien Vergnaud |
Adaptive-ID Secure Revocable Identity-Based Encryption. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
provable security, revocation, Identity-based encryption |
8 | Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005, Mike Grace |
ReFormat: Automatic Reverse Engineering of Encrypted Messages. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
Data Lifetime Analysis, Security, Reverse Engineering, Encryption, Network Protocols |
8 | Riccardo Focardi, Flaminia L. Luccio, Graham Steel |
Blunting Differential Attacks on PIN Processing APIs. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
Financial Cryptography, PIN Verification, Security APIs |
8 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Confidentiality. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
private-key predicate encryption, key confidentiality |
8 | Craig Gentry |
Computing on Encrypted Data. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Markus Kasper, Timo Kasper, Amir Moradi 0001, Christof Paar |
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
8 | Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk |
Practical Threshold Signatures with Linear Secret Sharing Schemes. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Linear secret sharing, function sharing, threshold cryptography |
8 | Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani |
Reducing Key Length of the McEliece Cryptosystem. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Alternant code, quasi-cyclic, public-key cryptography, McEliece cryptosystem |
8 | Benny Applebaum, David Cash, Chris Peikert, Amit Sahai |
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
Key-dependent message security, Learning problems, Encryption, Lattice-based cryptography |
8 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|