The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase public key cryptography (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1981-1990 (17) 1991-1995 (18) 1996-1997 (25) 1998 (39) 1999 (51) 2000 (56) 2001 (47) 2002 (55) 2003 (68) 2004 (69) 2005 (89) 2006 (99) 2007 (100) 2008 (86) 2009 (72) 2010 (56) 2011 (46) 2012 (56) 2013 (49) 2014 (59) 2015 (49) 2016 (60) 2017 (57) 2018 (74) 2019 (46)
Publication types (Num. hits)
article(185) book(7) incollection(11) inproceedings(1200) phdthesis(9) proceedings(31)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1237 occurrences of 539 keywords

Results
Found 1443 publication records. Showing 1443 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
178Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
169Jonathan Katz Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). Search on Bibsonomy SIGACT News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
125Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography
125Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems
121Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval Distributed Public-Key Cryptography from Weak Secrets. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
112Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
112David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
112Marc Joye, Christophe Tymen Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms
112Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
105Liqun Chen, John Malone-Lee Improved Identity-Based Signcryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
96Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
96Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang Public-Key Cryptography from New Multivariate Quadratic Assumptions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
96Jintai Ding, Christopher Wolf, Bo-Yin Yang l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trapdoor, Encryption, Public Key, Signing
93Jintai Ding, Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate
91Yih Huang, David Rine, Xunhua Wang A JCA-Based Implementation Framework for Threshold Cryptography. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
91Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang Anonymous Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
88Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee Authenticated Public Key Distribution Scheme Without Trusted Third Party. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI)
88Xuhua Ding, Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mediated RSA, revocation, Identity-based encryption
87Jean-François Misarsky How (not) to Design RSA Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
85Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
84Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad hoc network, network security, key management, certificateless public key cryptography
77Eli Biham, Yaron J. Goren, Yuval Ishai Basing Weak Public-Key Cryptography on Strong One-Way Functions. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model
76Phong Q. Nguyen Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP
75Dongdai Lin, Kazue Sako (eds.) Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Dongdai Lin, Kazue Sako (eds.) Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Benoît Libert, Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang Zero-Knowledge Elementary Databases with More Expressive Queries. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Dana Dachman-Soled, Mukul Kulkarni Upper and Lower Bounds for Continuous Non-Malleable Codes. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Geoffroy Couteau, Michael Reichle Non-interactive Keyed-Verification Anonymous Credentials. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Alonso González Shorter Ring Signatures from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Lydia Garms, Anja Lehmann Group Signatures with Selective Linkability. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Aijun Ge, Puwen Wei Identity-Based Broadcast Encryption with Efficient Revocation. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Benoît Libert, Chen Qian 0002 Lossy Algebraic Filters with Short Tags. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Sherman S. M. Chow, Alexander Russell, Qiang Tang 0005, Moti Yung, Yongjun Zhao 0001, Hong-Sheng Zhou Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Eyal Kushilevitz, Tamer Mour Sub-logarithmic Distributed Oblivious RAM with Small Block Size. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Michael Backes 0001, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Takahiro Matsuda 0002, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Xavier Bultel, Pascal Lafourcade 0001, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan Efficient Invisible and Unlinkable Sanitizable Signatures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti Publicly Verifiable Proofs from Blockchains. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Ryo Nishimaki, Takashi Yamakawa Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Roman Langrehr, Jiaxin Pan Tightly Secure Hierarchical Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Michael Clear, Ciaran McGoldrick Additively Homomorphic IBE from Higher Residuosity. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva 0001 Shorter Quadratic QA-NIZK Proofs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Dennis Hofheinz, Ngoc Khanh Nguyen 0001 On Tightly Secure Primitives in the Multi-instance Setting. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Ward Beullens, Hoeteck Wee Obfuscating Simple Functionalities from Knowledge Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Simon-Philipp Merz, Christophe Petit Factoring Products of Braids via Garside Normal Form. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Shuichi Katsumata, Takahiro Matsuda 0002, Atsushi Takayasu Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Tobias Schneider 0002, Clara Paglialonga, Tobias Oder, Tim Güneysu Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak Adaptively Secure Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Alessandra Scafuro Break-glass Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Rishab Goyal, Satyanarayana Vusirikala, Brent Waters Collusion Resistant Broadcast and Trace from Positional Witness Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Zhe Li, Chaoping Xing, Sze Ling Yeo Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Yunhua Wen, Shengli Liu, Dawu Gu Generic Constructions of Robustly Reusable Fuzzy Extractor. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Thomas Pornin, Thomas Prest More Efficient Algorithms for the NTRU Key Generation Using the Field Norm. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar Registration-Based Encryption from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Zhedong Wang, Xiong Fan, Feng-Hao Liu FE for Inner Products and Its Application to Decentralized ABE. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner Decentralizing Inner-Product Functional Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Nuttapong Attrapadung, Takahiro Matsuda 0002, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Jan-Pieter D'Anvers, Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Shuichi Katsumata, Shota Yamada 0001 Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna Function Private Predicate Encryption for Low Min-Entropy Predicates. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Lisa Kohl Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki Towards Non-Interactive Zero-Knowledge for NP from LWE. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Aloni Cohen What About Bob? The Inadequacy of CPA Security for Proxy Reencryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Haodong Jiang, Zhenfeng Zhang, Zhi Ma Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
75Michel Abdalla, Ricardo Dahab (eds.) Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Michel Abdalla, Ricardo Dahab (eds.) Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Craig Gentry, Adam O'Neill, Leonid Reyzin A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe SOFIA: MQ MQ -Based Signatures in the QROM. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz New (and Old) Proof Systems for Lattice Problems. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu Constant-Size Group Signatures from Lattices. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen 0003 On the Security of Classic Protocols for Unique Witness Relations. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Georg Fuchsbauer, Romain Gay Weakly Secure Equivalence-Class Signatures from Standard Assumptions. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Ali El Kaafarani, Shuichi Katsumata Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Pratish Datta, Tatsuaki Okamoto, Junichi Tomida Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp Non-malleability vs. CCA-Security: The Case of Commitments. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Andreas Hülsing, Tanja Lange 0001, Kit Smeets Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy 0003 Improved (Almost) Tightly-Secure Structure-Preserving Signatures. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Jonathan Bootle, Jens Groth Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka Simple and Generic Constructions of Succinct Functional Encryption. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi Local Non-malleable Codes in the Bounded Retrieval Model. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Zvika Brakerski, Elena Kirshanova, Damien Stehlé, Weiqiang Wen Learning with Errors and Extrapolated Dihedral Cosets. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach Hash Proof Systems over Lattices Revisited. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Thomas Agrikola, Dennis Hofheinz Interactively Secure Groups from Obfuscation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena Two-Factor Authentication with End-to-End Password Security. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Chris Peikert, Sina Shiehian Privately Constraining and Programming PRFs, the LWE Way. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Xiong Fan, Qiang Tang 0005 Making Public Key Functional Encryption Function Private, Distributively. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Ivan Damgård, Ji Luo, Sabine Oechsner, Peter Scholl, Mark Simkin Compact Zero-Knowledge Proofs of Small Hamming Weight. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia Graded Encoding Schemes from Obfuscation. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Benedikt Auerbach, Bertram Poettering Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli. Search on Bibsonomy Public Key Cryptography (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Yehuda Lindell, Avishay Yanai Fast Garbling of Circuits over 3-Valued Logic. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Fuyuki Kitagawa, Keisuke Tanaka Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
75Peter Scholl Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1443 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license