|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | Pooya Farshim, Bogdan Warinschi |
Certified Encryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 179-197, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption |
75 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 1-12, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng |
Conditional Proxy Broadcast Re-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 327-342, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption |
69 | Yang Cui 0001, Kirill Morozov, Kazukuni Kobara, Hideki Imai |
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 18th International Symposium, AAECC-18 2009, Tarragona, Catalonia, Spain, June 8-12, 2009. Proceedings, pp. 159-168, 2009, Springer, 978-3-642-02180-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Deterministic encryption, code-based encryption, database security, hybrid encryption, searchable encryption |
68 | Walid Bagga, Refik Molva, Stefano Crosta |
Policy-based encryption schemes from bilinear pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 368, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Shiguo Lian |
Quasi-commutative watermarking and encryption for secure media content distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 43(1), pp. 91-107, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Commutative watermarking and encryption (CWE), Watermarking, Digital rights management (DRM), Video encryption |
67 | Phillip Rogaway, Don Coppersmith |
A Software-Optimized Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(4), pp. 273-287, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Cryptography, Cryptography, Stream cipher, Stream cipher, Encryption, Encryption, Key words |
65 | Phillip Rogaway |
Nonce-Based Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 348-359, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Initialization vector, provable security, modes of operation, symmetric encryption, nonces |
63 | Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 |
An Implementation and Evaluation of Online Disk Encryption for Windows Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 337-348, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security |
60 | Xu An Wang 0001, Xiaoyuan Yang 0002 |
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 657-660, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
60 | Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya |
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 354-363, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ID-Based encryption, broadcast encryption, forward security |
59 | Jonathan Katz, Arkady Yerukhimovich |
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 197-213, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
58 | Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki |
A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 87-112, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems |
58 | Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu |
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES 2003, San Jose, California, USA, October 30 - November 1, 2003, pp. 188-197, 2003, ACM, 1-58113-676-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, sensor networks, embedded systems, encryption |
58 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 196-214, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
56 | Jonathan Katz, Moti Yung |
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 284-299, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
55 | Chik How Tan |
Public-Key Encryption from ID-Based Encryption Without One-Time Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 450-459, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear maps |
55 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 380-397, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption |
55 | Toshihiko Matsuo |
Proxy Re-encryption Systems for Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 247-267, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proxy re-encryption system, public key encryption, identity-based encryption |
54 | Ribao Wei, Dingfeng Ye |
Delegate predicate encryption and its application to anonymous authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 372-375, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
predicate encryption, anonymous authentication |
54 | Shay Gueron |
Intel's New AES Instructions for Enhanced Performance and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 51-66, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
new instructions set, computer architecture, Advanced Encryption Standard |
53 | Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi |
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(4), pp. 313-324, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cost/performance, Security, Simulation, Optimization, Algorithms, Dynamic programming, Wireless communication, Emerging technologies, Wireless systems, Data encryption, Data Encryption, Security and Privacy Protection, integrity and protection |
53 | Giovanni Di Crescenzo, Vishal Saraswat |
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 282-296, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption |
53 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Timed-Release and Key-Insulated Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 191-205, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
timed-release, key-insulated encryption, authenticated encryption |
53 | Dan Boneh, Jonathan Katz |
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 87-103, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Public-key encryption, Identity-based encryption, Chosen-ciphertext security |
53 | Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette |
Authenticated On-Line Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 145-159, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks |
53 | Mihir Bellare, Alexandra Boldyreva, Jessica Staddon |
Randomness Re-use in Multi-recipient Encryption Schemeas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 85-99, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Encryption, provable security, randomness, broadcast encryption |
53 | Yasumasa Nakai, Takahiro Matsuda 0002, Wataru Kitada, Kanta Matsuura |
A Generic Construction of Timed-Release Encryption with Pre-open Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 53-70, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
pre-open capability, public key encryption, identity-based encryption, timed-release encryption, generic construction |
53 | Ivan Damgård, Lars R. Knudsen |
Two-Key Triple Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(3), pp. 209-218, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
The Data Encryption Standard, The Data Encryption Standard, Block ciphers, Block ciphers, Pseudorandom generators, Pseudorandom generators, Key words, Multiple encryption, Multiple encryption |
52 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 186-200, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
51 | Yuliang Zheng 0001 |
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 165-179, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption |
49 | Osamu Watanabe 0002, Akiko Nakazaki, Hitoshi Kiya |
A scalable encryption method allowing backward compatibility with JPEG2000 images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 6324-6327, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen |
Authenticated Broadcast Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 512-518, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, broadcast encryption, bilinear map |
49 | Dragos Trinca |
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 464-469, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption |
49 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Universally Anonymizable Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 293-312, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy |
49 | Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu |
Analyzing and modeling encryption overhead for sensor network nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wireless Sensor Networks and Applications ![In: Proceedings of the Second ACM International Conference on Wireless Sensor Networks and Applications, WSNA 2003, San Diego, CA, USA, September 19, 2003, pp. 151-159, 2003, ACM, 1-58113-764-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
encryption overhead, model, sensor networks, embedded systems, analysis |
49 | Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto |
Multi-recipient Public-Key Encryption from Simulators in Security Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 293-308, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption |
49 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Provably Secure Timed-Release Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(2), pp. 4:1-4:44, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
key-insulated encryption, timed-release, authenticated encryption |
49 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(3), pp. 350-391, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity-based encryption, Random-oracle model, Foundations, Searchable encryption |
49 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(1), pp. 97-130, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
49 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(4), pp. 469-491, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
49 | Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 185-198, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identity-Based Encryption, Proxy re-encryption, Personal Health Record |
49 | Shih-Ching Ou, Hung-Yuan Chung, Wen-Tsai Sung |
Improving the compression and encryption of images using FPGA-based cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 28(1-2), pp. 5-22, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Significance-linked connected component analysis (SLCCA), Image compression encryption scheme (ICES), Advance encryption standard (AES), Discrete wavelet transform (DWT) |
49 | George Danezis |
Breaking Four Mix-Related Schemes Based on Universal Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 46-59, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Universal re-encryption, re-encryption mix networks, traffic analysis, anonymous communications |
49 | Dominik Engel, Andreas Uhl |
Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 63-70, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
lightweight encryption, parameterized biorthogonal wavelet lifting, transparent encryption, JPEG 2000 |
49 | Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters |
Attribute-based encryption for fine-grained access control of encrypted data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 89-98, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption |
49 | Jeremy Epstein, Tim Williams |
Using Fortezza For Transparent File Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 140-147, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development |
47 | Josef Pieprzyk, David Pointcheval |
Josef Pieprzyk, David Pointcheval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 387-401, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, parallelization, Signcryption |
47 | Rosario Gennaro, Shai Halevi |
More on Key Wrapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 53-70, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Deterministic Encryption, Key Wrapping, Modes of Operation, Symmetric Encryption |
46 | Ronald L. Rivest |
All-or-Nothing Encryption and the Package Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 210-218, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
46 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 1-19, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
44 | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Bounded CCA2-Secure Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 502-518, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Thomas Stütz, Andreas Uhl |
Transparent Image Encryption Using Progressive JPEG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 286-298, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Ran Canetti, Shai Halevi, Jonathan Katz |
Adaptively-Secure, Non-interactive Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 150-168, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yevgeniy Dodis, Jonathan Katz |
Chosen-Ciphertext Security of Multiple Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 188-209, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Soichi Furuya, Kouichi Sakurai |
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 94-109, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
real-or-random security, Stream cipher, provable security, message authentication, mode of operation |
44 | Thomas Kunkelmann, Uwe Horn |
Video Encryption Based on Data Partitioning and Scalable Coding - A Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDMS ![In: Interactive Distributed Multimedia Systems and Telecommunication Services, 5th International Workshop, IDMS '98, Oslo, Norway, September 8-11, 1998, Proceedings, pp. 95-106, 1998, Springer, 3-540-64955-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
44 | Peter Gazi, Ueli M. Maurer |
Cascade Encryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 37-51, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cascade encryption, random system, indistinguishability, ideal cipher model |
44 | Alexander W. Dent |
A survey of certificateless encryption schemes and security models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(5), pp. 349-377, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptography, Public-key cryptography, Certificateless cryptography, Certificateless encryption |
44 | Shiguo Lian, Jinsheng Sun, Guangjie Liu, Zhiquan Wang |
Efficient video encryption scheme based on advanced video coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 38(1), pp. 75-89, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multimedia content protection, Digital right management, AVC, Video encryption |
44 | Saurabh Panjwani |
Tackling Adaptive Corruptions in Multicast Encryption Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 21-40, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Adaptive Corruptions, Selective Decryption, Multicast, Encryption |
44 | Yibo Fan, Jidong Wang, Takeshi Ikenaga, Yukiyasu Tsunoo, Satoshi Goto |
A New Video Encryption Scheme for H.264/AVC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 246-255, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Video, Encryption, H.264/AVC |
44 | Giuseppe Ateniese, Kevin Fu, Matthew Green 0001, Susan Hohenberger |
Improved proxy re-encryption schemes with applications to secure distributed storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(1), pp. 1-30, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
double decryption, key translation, bilinear maps, Proxy re-encryption |
44 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 176-190, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
44 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 440-453, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
44 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 583-587, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
compact encryption/decryption implementation, FPGA, Cryptography, AES, DES |
44 | Rosario Gennaro, Yael Gertner, Jonathan Katz |
Lower bounds on the efficiency of encryption and digital signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA, pp. 417-425, 2003, ACM, 1-58113-674-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
lower bounds, digital signatures, encryption, black-box |
44 | Eiichiro Fujisaki, Tatsuaki Okamoto |
Secure Integration of Asymmetric and Symmetric Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 537-554, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Adaptive chosen-ciphertext attack, Random oracle model, Indistinguishability, Hybrid encryption |
44 | Oliver Jung, Christoph Ruland |
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 340-352, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
SDH/SONET, Cryptography, Encryption, Confidentiality, Modes of Operation, Broadband Networks, Self-Synchronization |
44 | Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Practical ID-based encryption for wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 337-340, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
online/offline encryption, identity-based encryption, wireless sensor network security |
44 | Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa |
Encryption over Semi-trusted Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA Workshops ![In: Database Systems for Advanced Applications, DASFAA 2009 International Workshops: BenchmarX, MCIS, WDPP, PPDA, MBC, PhD, Brisbane, Australia, April 20-23, 2009, pp. 358-362, 2009, Springer, 978-3-642-04204-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Database cryptography, server-based encryption, client-based encryption, semi-trusted database, mixed cryptography |
44 | Kristen Dietiker |
PGP whole disk encryption: blazing trails in IT security at UW Medicine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 36th Annual ACM SIGUCCS Conference on User Services 2008, Portland, OR, USA, October 19-22, 2008, pp. 17-20, 2008, ACM, 978-1-60558-074-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
protected health information, whole disk encryption, encryption, compliance, Macintosh, software deployment, HIPAA, PGP, Windows XP |
44 | Mihir Bellare, Adriana Palacio |
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 16(6), pp. 379-396, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key update, Encryption, Identity-based encryption, Key exposure |
44 | David Galindo |
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 318-326, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
tag-based encryption, identity-based encryption, Foundations |
44 | Ulrich Kühn 0001 |
Side-Channel Attacks on Textbook RSA and ElGamal Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 324-336, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
RSA encryption, Side-channel attack, ElGamal encryption |
44 | Markus Jakobsson |
On Quorum Controlled Asymmetric Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 112-121, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
asymmetric proxy re-encryption, translation certificate, El Gamal encryption, quorum control, privacy, robustness |
44 | Dominik Engel, Thomas Stütz, Andreas Uhl |
Format-compliant jpeg2000 encryption with combined packet header and packet body protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 87-96, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
format-compliant encryption, packet body encryption, packet header encryption, JPEG2000 |
44 | Jonathan K. Millen, Hai-Ping Ko |
Narrowing terminates for encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 39-, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
term replacement rules, reduction properties, symbolic encryption operations, narrowing steps, infinite sequence, popular abstract encryption operators, terminating algorithm, cryptography, encryption, access protocols, protocol analysis |
43 | Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic |
MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: 2008 International Conference on Computer-Aided Design, ICCAD 2008, San Jose, CA, USA, November 10-13, 2008, pp. 678-684, 2008, IEEE Computer Society, 978-1-4244-2820-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Adam L. Young, Moti Yung |
Hiding Information Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 161-171, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 16-34, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
42 | Yang Ou, Chul Sur, Kyung Hyune Rhee |
A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM ![In: Advances in Multimedia Modeling, 15th International Multimedia Modeling Conference, MMM 2009, Sophia-Antipolis, France, January 7-9, 2009. Proceedings, pp. 51-62, 2009, Springer, 978-3-540-92891-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Joint Compression and Encryption, Packet Header Encryption, JPEG2000, Arithmetic Coding |
41 | Jiang Delei, Bai Sen, Dong Wenming |
An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (1) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, December 12-14, 2008, Wuhan, China, pp. 251-255, 2008, IEEE Computer Society, 978-0-7695-3336-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda |
Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 31-48, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Adam L. Young, Moti Yung |
Sliding Encryption: A Cryptographic Tool for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 230-241, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
41 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Practical Symmetric On-Line Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 362-375, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversary, Symmetric encryption, chosen plaintext attacks |
41 | Sherman S. M. Chow, Volker Roth 0002, Eleanor Gilbert Rieffel |
General Certificateless Encryption and Timed-Release Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 126-143, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security-mediated certificateless encryption, standard model, timed-release encryption |
40 | Hung-Min Sun, Muh-Chyi Leu |
A Real-Time Selective Video Encryption Using Context-Key Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 114-117, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Haifeng Qian, Yuan Zhou 0008, Zhibin Li 0005, Zecheng Wang, Bing Zhang 0008 |
Efficient public key encryption with smallest ciphertext expansion from factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 233-249, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
40 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Online/Offline Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 247-261, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Tingjian Ge, Stanley B. Zdonik |
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007, pp. 676-685, 2007, IEEE Computer Society, 1-4244-0802-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Min-Sung Koh, Esteban Rodriguez-Marek, Claudio Talarico |
A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen-Plaintext Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 1527-1530, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Kwangjin Hong, Keechul Jung |
Partial Encryption of Digital Contents Using Face Detection Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2006: Trends in Artificial Intelligence, 9th Pacific Rim International Conference on Artificial Intelligence, Guilin, China, August 7-11, 2006, Proceedings, pp. 632-640, 2006, Springer, 3-540-36667-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Chung-Ping Wu, C.-C. Jay Kuo |
Design of integrated multimedia compression and encryption systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(5), pp. 828-839, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Ulf T. Mattsson |
A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases: Protection against External and Internal Attacks on Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 559-565, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard |
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, pp. 212-226, 2004, Springer, 3-540-24327-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Andris Ambainis, Adam D. Smith |
Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPROX-RANDOM ![In: Approximation, Randomization, and Combinatorial Optimization, Algorithms and Techniques, 7th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2004, and 8th International Workshop on Randomization and Computation, RANDOM 2004, Cambridge, MA, USA, August 22-24, 2004, Proceedings, pp. 249-260, 2004, Springer, 3-540-22894-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Antonio Servetti, Juan Carlos De Martin |
Perception-based partial encryption of compressed speech. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Speech Audio Process. ![In: IEEE Trans. Speech Audio Process. 10(8), pp. 637-643, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Craig Gentry |
Fully homomorphic encryption using ideal lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 169-178, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fully homomorphic encryption |
39 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 259-277, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
private-key predicate encryption, key confidentiality |
Displaying result #1 - #100 of 21739 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|