The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for public with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1970 (17) 1971-1974 (25) 1975-1976 (38) 1977-1978 (27) 1979 (19) 1980 (17) 1981 (16) 1982 (27) 1983 (23) 1984 (39) 1985 (49) 1986 (40) 1987 (52) 1988 (47) 1989 (49) 1990 (66) 1991 (47) 1992 (71) 1993 (93) 1994 (107) 1995 (119) 1996 (209) 1997 (193) 1998 (246) 1999 (311) 2000 (450) 2001 (565) 2002 (856) 2003 (873) 2004 (1143) 2005 (1407) 2006 (1509) 2007 (1728) 2008 (1751) 2009 (1581) 2010 (1001) 2011 (892) 2012 (1008) 2013 (1271) 2014 (1246) 2015 (1303) 2016 (1371) 2017 (1446) 2018 (1530) 2019 (1750) 2020 (1961) 2021 (2269) 2022 (1845) 2023 (1940) 2024 (490)
Publication types (Num. hits)
article(13430) book(32) data(18) incollection(344) inproceedings(20929) phdthesis(294) proceedings(86)
Venues (Conferences, Journals, ...)
CoRR(1321) Public Libr. Q.(720) IACR Cryptol. ePrint Arch.(623) Public Key Cryptography(558) DG.O(416) HICSS(379) Public Transp.(332) ICEGOV(293) MIE(293) EGOV(279) IEEE Access(256) Gov. Inf. Q.(250) CRYPTO(229) EUROCRYPT(216) Public Key Cryptography (1)(199) EuroPKI(196) More (+10 of total 5029)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14005 occurrences of 4807 keywords

Results
Found 35133 publication records. Showing 35133 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Nelly Fazio, Irippuge Milinda Perera Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Shota Yamada 0001, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Qiong Huang 0001, Duncan S. Wong, Willy Susilo The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Aurélie Bauer, Damien Vergnaud, Jean-Christophe Zapalowicz Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Gottfried Herold Polly Cracker, Revisited, Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Craig Gentry, Shai Halevi, Nigel P. Smart Better Bootstrapping in Fully Homomorphic Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24David Mandell Freeman Improved Security for Linearly Homomorphic Signatures: A Generic Framework. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Brett Hemenway, Rafail Ostrovsky Extended-DDH and Lossy Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Dario Catalano, Dario Fiore 0001, Bogdan Warinschi Efficient Network Coding Signatures in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Enrico Thomae, Christopher Wolf Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Charanjit S. Jutla, Arnab Roy 0001 Relatively-Sound NIZKs and Password-Based Key-Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee Efficient Password Authenticated Key Exchange via Oblivious Transfer. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel DDH-Like Assumptions Based on Extension Rings. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24David Cash, Matthew Green 0001, Susan Hohenberger New Definitions and Separations for Circular Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Dominique Schröder, Dominique Unruh Security of Blind Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Jacob Alperin-Sheriff, Chris Peikert Circular and KDM Security for Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar 0001 Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract). Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi (eds.) Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Vivien Dubois, Jean-Gabriel Kammerer Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud Signatures on Randomizable Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Vinod Vaikuntanathan New Developments in Leakage-Resilient Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Daniel J. Bernstein, Tanja Lange 0001, Peter Schwabe On the Correct Use of the Negation Map in the Pollard rho Method. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Tolga Acar, Lan Nguyen Revocation for Delegatable Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann 0001 Linear Recurring Sequences for the UOV Key Generation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Tomas Toft Sub-linear, Secure Comparison with Two Non-colluding Parties. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Qixiang Mei, Bao Li 0001, Xianhui Lu, Dingding Jia Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Jacob C. N. Schuldt, Kanta Matsuura On-line Non-transferable Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha Oblivious Transfer with Hidden Access Control Policies. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Tatsuaki Okamoto, Katsuyuki Takashima Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Jae Hong Seo Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Matthew Green 0001 Secure Blind Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Jian Weng 0001, Yunlei Zhao, Goichiro Hanaoka On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Luk Bettale, Jean-Charles Faugère, Ludovic Perret Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Dan Boneh, David Mandell Freeman Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Nuttapong Attrapadung, Benoît Libert Homomorphic Network Coding Signatures in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Takahiro Matsuda 0002, Kanta Matsuura Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Roberto Maria Avanzi, Clemens Heuberger Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Amit Sahai, Hakan Seyalioglu Fully Secure Accountable-Authority Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik (If) Size Matters: Size-Hiding Private Set Intersection. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Junzuo Lai, Robert H. Deng, Shengli Liu 0001 Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Shota Yamada 0001, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Brent Waters Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Rishiraj Bhattacharyya, Avradip Mandal On the Impossibility of Instantiating PSS in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Shai Halevi, Hugo Krawczyk One-Pass HMQV and Asymmetric Key-Wrapping. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Rachel Hall Public Praxis: A Vision for Critical Information Literacy in Public Libraries. Search on Bibsonomy Public Libr. Q. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Loriene Roy, Trina Bolfing, Bonnie Brzozowski Computer Classes for Job Seekers: LIS Students Team with Public Librarians to Extend Public Services. Search on Bibsonomy Public Libr. Q. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Phong Q. Nguyen, David Pointcheval (eds.) Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Nigel Davies 0001, Antonio Krüger, Marc Langheinrich, Albrecht Schmidt 0001, Martin Strohbach 10011 Report - Pervasive Public Displays. Search on Bibsonomy Pervasive Public Displays The full citation details ... 2010 DBLP  BibTeX  RDF
24Rosario Gennaro, Carmit Hazay, Jeffrey S. Sorensen Text Search Protocols with Simulation Based Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Zhenfu Cao, Ivan Visconti, Zongyang Zhang Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Sven Laur, Helger Lipmaa On the Feasibility of Consistent Computations. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa Security of Encryption Schemes in Weakened Random Oracle Models. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Toshihide Matsuda, Ryo Nishimaki, Keisuke Tanaka CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Steven D. Galbraith, Raminder S. Ruprai Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Xavier Boyen Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Mathias Herrmann, Alexander May 0001 Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Jean-Charles Faugère, Pierre-Jean Spaenlehauer Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Robert Granger, Michael Scott Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Jean-Charles Faugère, Raphaël Marinier, Guénaël Renault Implicit Factoring with Shared Most Significant and Middle Bits. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Craig Costello, Tanja Lange 0001, Michael Naehrig Faster Pairing Computations on Curves with High-Degree Twists. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Nigel P. Smart, Frederik Vercauteren Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Javier Herranz, Fabien Laguillaumie, Carla Ràfols Constant Size Ciphertexts in Threshold Attribute-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Nuttapong Attrapadung, Benoît Libert Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Carmit Hazay, Kobbi Nissim Efficient Set Operations in the Presence of Malicious Adversaries. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Petros Mol, Scott Yilek Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001, Yang Xiang 0001 Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder Confidential Signatures and Deterministic Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Ali Bagherzandi, Stanislaw Jarecki Identity-Based Aggregate and Multi-Signature Schemes Based on RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Christina Brzuska, Marc Fischlin, Anja Lehmann, Dominique Schröder Unlinkability of Sanitizable Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Reza Rezaeian Farashahi, Marc Joye Efficient Arithmetic on Hessian Curves. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Takuya Hayashi 0001, Naoyuki Shinohara, Lihua Wang 0001, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi Solving a 676-Bit Discrete Logarithm Problem in GF(36n). Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi Groth-Sahai Proofs Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin Secure Network Coding over the Integers. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24David Mandell Freeman, Oded Goldreich 0001, Eike Kiltz, Alon Rosen, Gil Segev 0001 More Constructions of Lossy and Correlation-Secure Trapdoor Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Jens Groth, Aggelos Kiayias, Helger Lipmaa Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman Preventing Pollution Attacks in Multi-source Network Coding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Stanislaw Jarecki, Gene Tsudik (eds.) Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Patrick Longa, Catherine H. Gebotys Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multibase non-adjacent form, fractional window, Elliptic curve cryptosystem, scalar multiplication, double base number system
24Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas Verifiable Rotation of Homomorphic Encryptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Paz Morillo, Carla Ràfols The Security of All Bits Using List Decoding. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit security, one-way function, list decoding
24Minkyu Kim, Jung Hee Cheon, Jin Hong 0001 Subset-Restricted Random Walks for Pollard rho Method on Fpm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pollard rho method, pairing, normal basis, discrete logarithm problem
24Ivan Damgård, Martin Geisler 0001, Mikkel Krøigaard, Jesper Buus Nielsen Asynchronous Multiparty Computation: Theory and Implementation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Alexander May 0001, Maike Ritzenhofen Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Factoring with an oracle, lattices
24Scott E. Coull, Matthew Green 0001, Susan Hohenberger Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Sherman S. M. Chow Removing Escrow from Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Ivan Damgård, Gert Læssøe Mikkelsen On the Theory and Practice of Personal Digital Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Pascal Junod, Alexandre Karlov, Arjen K. Lenstra Improving the Boneh-Franklin Traitor Tracing Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Boneh-Franklin traitor tracing, Guruswami-Sudan algorithm, Reed-Solomon codes, Berlekamp-Massey algorithm
24Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk Security of Sanitizable Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Marc Fischlin, Dominique Schröder Security of Blind Signatures under Aborts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Yoshinori Aono A New Lattice Construction for Partial Key Exposure Attack for RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction
24Benoît Libert, Damien Vergnaud Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficiency, traceability, Identity-based encryption
24Jan Camenisch, Markulf Kohlweiss, Claudio Soriente An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF revocation, anonymous credentials, dynamic accumulators
24Brian J. Matt Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pairing-based signatures, Wireless networks, Identity-based signatures, Short signatures, Batch verification
24Hossein Ghodosi, Josef Pieprzyk Multi-Party Computation with Omnipresent Adversary. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation
Displaying result #901 - #1000 of 35133 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license