The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptography with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1978 (19) 1979-1981 (22) 1982 (45) 1983-1984 (26) 1985-1986 (20) 1987-1988 (24) 1989 (38) 1990 (29) 1991 (61) 1992 (52) 1993 (51) 1994 (65) 1995 (120) 1996 (138) 1997 (216) 1998 (218) 1999 (257) 2000 (249) 2001 (338) 2002 (314) 2003 (465) 2004 (525) 2005 (1191) 2006 (827) 2007 (849) 2008 (929) 2009 (832) 2010 (743) 2011 (1864) 2012 (711) 2013 (749) 2014 (846) 2015 (806) 2016 (826) 2017 (842) 2018 (885) 2019 (267)
Publication types (Num. hits)
article(4954) book(81) incollection(1855) inproceedings(9202) phdthesis(141) proceedings(226)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8038 occurrences of 2046 keywords

Results
Found 16460 publication records. Showing 16459 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
148Jonathan Katz Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). Search on Bibsonomy SIGACT News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
84Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto Security-Mediated Certificateless Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security-mediated cryptography, certificateless cryptography
72Yih Huang, David Rine, Xunhua Wang A JCA-Based Implementation Framework for Threshold Cryptography. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
69Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
65Cryptography Editorial Office Acknowledgement to Reviewers of Cryptography in 2018. Search on Bibsonomy Cryptography The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
58Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
54Craig Gentry, Alice Silverberg Hierarchical ID-Based Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF hierarchical identity-based cryptography, elliptic curves, identity-based cryptography, pairing-based cryptography
53Phong Q. Nguyen Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP
52Shafi Goldwasser New Directions in Cryptography: Twenty Some Years Later. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF probabilistic proof systems, cryptography, cryptography, complexity theory, interactive proof systems, pseudo random number generation
52Tom Tedrick On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF History of Cryptography, History of War, Theory of War, Abstract Protocol Theory, Game Theoretic Cryptography, Rommel, ULTRA, Cryptographic Protocols
51Ian Grigg Financial Cryptography in 7 Layers. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
50Marc Joye, Christophe Tymen Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms
49Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson What can identity-based cryptography offer to web services? Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message-level security, web services, identity-based cryptography
49Lei Zhang 0009, Futai Zhang, Wei Wu A Provably Secure Ring Signature Scheme in Certificateless Cryptography. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography
49Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Superscalar Coprocessor for High-Speed Curve-Based Cryptography. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF curve-based cryptography, HECC, ECC, instruction-level parallelism, scalar multiplication, Superscalar, coprocessor
49Eli Biham, Yaron J. Goren, Yuval Ishai Basing Weak Public-Key Cryptography on Strong One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model
47Mary Ellen Zurko, Andrew S. Patrick Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF User-centered security, cryptography
47Walid Bagga, Refik Molva Policy-Based Cryptography and Applications. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Privacy, Authorization, Policy, Credentials, ID-based Cryptography
47Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai Toward Fair International Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party
47Zhi Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo Halftone visual cryptography. Search on Bibsonomy IEEE Trans. Image Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Xuhua Ding, Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mediated RSA, revocation, Identity-based encryption
47Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson Constructions and Bounds for Visual Cryptography. Search on Bibsonomy ICALP The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
45Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter How public key cryptography influences wireless sensor node lifetime. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor networks, performance, complexity, cryptography, RSA, elliptic curve cryptography
45Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce Improved topology assumptions for threshold cryptography in mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed cryptography, mobile ad hoc networks, threshold cryptography, threshold signatures
45Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff Practical Cryptography in High Dimensional Tori. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF torus-based cryptography, discrete-log based cryptography
45Jean-Claude Bajard, Laurent Imbert, Thomas Plantard Modular Number Systems: Beyond the Mersenne Family. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Generalized Mersenne numbers, Elliptic curve cryptography, Montgomery multiplication
44Wil Michiels Opportunities in White-Box Cryptography. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF black-box cryptography, gray-box cryptography, white-box cryptography, crypto corner, cryptography, security & privacy
43Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, authentication, pervasive computing, Elliptic Curve Cryptography, key-distribution, hardware implementation
43Carlos Roberto Moratelli, Érika F. Cota, Marcelo Lubaszewski A cryptography core tolerant to DFA fault attacks. Search on Bibsonomy SBCCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, smart cards, fault attacks
42Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval Distributed Public-Key Cryptography from Weak Secrets. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Kiyomichi Araki, Takakazu Satoh, Shinji Miura Overview of Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Jacques Stern Lattices and Cryptography: An Overview. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
41Vivien Dubois, Louis Granboulan, Jacques Stern Cryptanalysis of HFE with Internal Perturbation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internal perturbation, binary vector spaces, differential cryptanalysis, multivariate cryptography, HFE
41Christophe Doche, Thomas Icart, David R. Kohel Efficient Scalar Multiplication by Isogeny Decompositions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast arithmetic, efficiently computable isogenies, efficient tripling, ?-adic, Elliptic curve cryptography
41Jintai Ding, Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate
41Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 Generic On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic
41Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography
41Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems
41Kaoru Kurosawa, Swee-Huay Heng From Digital Signature to ID-based Identification/Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GDH group, signature scheme, ID-based cryptography, identification scheme
41Mehdi-Laurent Akkar, Nicolas Courtois, Romain Duteuil, Louis Goubin A Fast and Secure Implementation of Sflash. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE
41Nicolas Courtois, Magnus Daum, Patrick Felke On the Security of HFE, HFEv- and Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields
41Nicolas Courtois Generic Attacks and the Security of Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Asymmetric cryptography, Hidden Field Equations (HFE), MQ, HFEv-, Quartz, finite fields, Flash, short signatures, Nessie, Sflash
41Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
41David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
41Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
41Rajni Goel, Moses Garuba, Anteneh Girma Research Directions in Quantum Cryptography. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41James L. Massey Whither Cryptography? Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya Secret Key Cryptography with Cellular Automata. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Chin-Chen Chang 0001, Tai-Xing Yu Sharing a Secret Gray Image in Multiple Images. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secret sharing, Visual cryptography
40Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan Simultaneous Hardcore Bits and Cryptography against Memory Attacks. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Silvio Micali, Leonid Reyzin Physically Observable Cryptography (Extended Abstract). Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Gunnar Gaubatz, Berk Sunar Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF homomorphic embedding, modulus scaling, fault tolerance, error detection, public-key cryptography, arithmetic codes, Finite field arithmetic, cyclic codes, idempotency
40M. R. Oberman Communication Security in Remote controlled Computer Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF cryptography, remote control, Communication security
39Alexander Klimm, Oliver Sander, Jürgen Becker, Sylvain Subileau A Hardware/Software Codesign of a Co-processor for Real-Time Hyperelliptic Curve Cryptography on a Spartan3 FPGA. Search on Bibsonomy ARCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hyperelliptic Curve Cryptography (HECC), FPGA, embedded systems, Public Key Cryptography (PKC), reconfigurable hardware
39Olivier Billet, Henri Gilbert Cryptanalysis of Rainbow. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow
39Wei Ming Lim, Mohammed Benaissa Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and cryptography. Search on Bibsonomy CODES+ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GF(2m) arithmetic, forward error control coding, galois field processor, cryptography, advanced encryption standard, elliptic curve cryptography, design space exploration, Reed-Solomon code, hardware-software co-design, BCH code
39Benoît Libert, Jean-Jacques Quisquater On Constructing Certificateless Cryptosystems from Identity Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF provable security, bilinear maps, Certificateless encryption
39Liqun Chen, John Malone-Lee Improved Identity-Based Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Nick Mathewson, Roger Dingledine Mixminion: Strong Anonymity for Financial Cryptography. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Florian Hess, Gadiel Seroussi, Nigel P. Smart Two Topics in Hyperelliptic Cryptography. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Frédéric Amiel, Benoit Feix, Karine Villegas Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF arithmetic coprocessors, reverse engineering, Public key cryptography, side-channel analysis, exponentiation
38Jaap-Henk Hoepman Secret Key Authentication with Software-Only Verification. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF symmetric key cryptography, authentication, smart cards
37Shujun Li, Li Qi, Li Wenmin, Xuanqin Mou, Cai Yuanlong Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Ambrose Chu, Scott Miller, Mihai Sima Reconfigurable solutions for very-long arithmetic with applications in cryptography. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF field-programmable gate arrays, embedded systems, cryptography, reconfigurable computing
37Alasdair McAndrew Teaching cryptography with open-source software. Search on Bibsonomy SIGCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptography, computer science education, open-source software, discrete mathematics, exploratory learning
37Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. Search on Bibsonomy EWSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, implementation, Elliptic Curve Cryptography, pairings, cryptographic primitives
37Dagmar Bruß, Gábor Erdélyi, Tim Meyer, Tobias Riege, Jörg Rothe Quantum cryptography: A survey. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Quantum bit commitment, quantum cryptography, quantum key distribution
37Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi Security Mediated Certificateless Signatures. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security mediated, SMC cryptography, certificateless
37Jean-Sébastien Coron What Is Cryptography? Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, cryptography, PKI, public key
37Jacques J. A. Fournier, Simon W. Moore A Vector Approach to Cryptography Implementation. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, AES, RSA, vector architecture, Montgomery Modular Multiplication
37Gwo-Chin Tai, Long-Wen Chang Visual Cryptography for Digital Watermarking in Still Images. Search on Bibsonomy PCM (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wavelet packet transform, digital watermarking, Visual cryptography
37Stefan Tillich, Johann Großschädl A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m). Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF application-specific instruction set extension, binary finite fields, SPARC V8, multiply step instruction, Elliptic curve cryptography
37Chip Elliott, David Pearson, Gregory D. Troxel Quantum cryptography in practice. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure networks, cryptographic protocols, error correction, IPsec, quantum cryptography, key agreement protocols, privacy amplification, quantum key distribution
37Mohamed Al-Ibrahim, Anton Cerný Proxy and Threshold One-Time Signatures. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature
36Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation
36Stelvio Cimato, Roberto De Prisco, Alfredo De Santis Optimal Colored Threshold Visual Cryptography Schemes. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF visual crytography, secret sharing schemes
35Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF thereshold cryptography, block cipher, secret sharing, shared computation
35Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
35Mihir Bellare, Viet Tung Hoang Adaptive Witness Encryption and Asymmetric Password-Based Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
35Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia Cryptography Using Captcha Puzzles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang Public-Key Cryptography from New Multivariate Quadratic Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Ali Juma, Yevgeniy Vahlis, Moti Yung Multi-location Leakage Resilient Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Vinod Vaikuntanathan New Developments in Leakage-Resilient Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Jintai Ding, Christopher Wolf, Bo-Yin Yang l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trapdoor, Encryption, Public Key, Signing
35Yair Frankel, Philip D. MacKenzie, Moti Yung "Psyeudorandom Intermixing": A Tool for Shared Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Byoungcheon Lee Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Unified public key infrastructure, Private key issuing protocol, Key generation and certification authority, Key privacy agent, Certificate-based cryptography, Hybrid cryptography, Bilinear pairing, ID-based cryptography
34Zhen Cao, Zhi Guan, Zhong Chen 0001, Jian-bin Hu, Liyong Tang An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Y. Eslami, Ali Sheikholeslami, P. Glenn Gulak, S. Masui, K. Mukaida An area-efficient universal cryptography processor for smart cards. Search on Bibsonomy IEEE Trans. VLSI Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Pim Tuyls Grey-Box Cryptography: Physical Unclonable Functions. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie Integration of Quantum Cryptography in 802.11 Networks. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther, Rajkumar Buyya GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Miljan Vuletic, Laura Pozzi, Paolo Ienne Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Junhyung Um, Sangwoo Lee, Youngsoo Park, Sungik Jun, Taewhan Kim An efficient inverse multiplier/divider architecture for cryptography systems. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. Search on Bibsonomy ICNP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34David F. J. George, Susan E. George Cellular Automata Cryptography Using Reconfigurable Computing. Search on Bibsonomy IEA/AIE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya Cellular Programming and Symmetric Key Cryptography Systems. Search on Bibsonomy GECCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
34Gerald Gilbert, Michael Hamrick Secrecy, Computational Loads and Rates in Practical Quantum Cryptography. Search on Bibsonomy Algorithmica The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Paul D. Townsend Quantum Cryptography on Optical Fiber Networks. Search on Bibsonomy Euro-Par The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Louis Salvail The Search for the Holy Grail in Quantum Cryptography. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
34Naya Nagy, Marius Nagy, Selim G. Akl Quantum Wireless Sensor Networks. Search on Bibsonomy UC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quantum teleportation, entanglement swapping, wireless sensor networks, quantum cryptography
Displaying result #1 - #100 of 16459 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license