The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase CL-PKE (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2007 (19) 2008-2009 (18) 2010-2014 (19) 2015-2017 (15) 2018-2019 (16) 2020-2021 (20) 2022-2023 (20) 2024 (6)
Publication types (Num. hits)
article(62) inproceedings(71)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 52 occurrences of 36 keywords

Results
Found 133 publication records. Showing 133 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
144Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
129Sattam S. Al-Riyami, Kenneth G. Paterson CBE from CL-PKE: A Generic Construction and Efficient Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings
126Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
108Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001 Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, Bilinear Maps, Chosen Ciphertext Security
77Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator
77Jin Li 0002, Fangguo Zhang, Yanming Wang A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key encryption, Identity based, Bilinear groups
72Piyi Yang, Zhenfu Cao, Xiaolei Dong Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack
72Zhaohui Cheng, Liqun Chen 0002, Li Ling, Richard Comley General and Efficient Certificateless Public Key Encryption Constructions. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
54Joonsang Baek, Han Chiang Tan, Jianying Zhou 0001, Jun Wen Wong Realizing Stateful Public Key Encryption in Wireless Sensor Network. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data
54Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability
46Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001 Group Signature Implies PKE with Non-interactive Opening and Threshold PKE. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
41Yang Cui 0001, Kirill Morozov, Kazukuni Kobara, Hideki Imai Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic encryption, code-based encryption, database security, hybrid encryption, searchable encryption
41Eike Kiltz On the Limitations of the Spread of an IBE-to-PKE Transformation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka Security on Hybrid Encryption with the Tag-KEM/DEM Framework. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Yasumasa Nakai, Takahiro Matsuda 0002, Wataru Kitada, Kanta Matsuura A Generic Construction of Timed-Release Encryption with Pre-open Capability. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pre-open capability, public key encryption, identity-based encryption, timed-release encryption, generic construction
36Joonsang Baek, Jianying Zhou 0001, Feng Bao 0001 Generic Constructions of Stateful Public Key Encryption and Their Applications. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Chen Yang, Furong Wang, Xinmei Wang Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Chik How Tan Public-Key Encryption from ID-Based Encryption Without One-Time Signature. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear maps
36Chik How Tan Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear map
36Ron Steinfeld, Yuliang Zheng 0001 On the Security of RSA with Primes Sharing Least-Significant Bits. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Partial Key Exposure, Boneh-Durfee-Frankel Attack, Coppersmith Algorithm, Server-Aided Signature Generation, Cryptanalysis, RSA Cryptosystem, Communication Security, Least-Significant Bits
36Sattam S. Al-Riyami, Kenneth G. Paterson Certificateless Public Key Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 On the Improvement of the BDF Attack on LSBS-RSA. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB)
23Fuyuki Kitagawa, Ryo Nishimaki Watermarking PRFs and PKE Against Quantum Adversaries. Search on Bibsonomy J. Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Shanxiang Lyu, Ling Liu 0003, Cong Ling 0001, Junzuo Lai, Hao Chen 0029 Lattice codes for lattice-based PKE. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Tomoki Moriya LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
23Hiroki Okada 0001, Tsuyoshi Takagi Simulation-Secure Threshold PKE from Standard (Ring-)LWE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
23Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
23Navid Alamati, Varun Maram Quantum CCA-Secure PKE, Revisited. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Yuan Huang, Cheng-Tien Tsao, Kairui Gu, Hee-Hyol Lee PKE-RRT: Efficient Multi-Goal Path Finding Algorithm Driven by Multi-Task Learning Model. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu Quantum Key Leasing for PKE and FHE with a Classical Lessor. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu Quantum Key Leasing for PKE and FHE with a Classical Lessor. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
23Daniele Micciancio, Adam Suhl Simulation-Secure Threshold PKE from LWE with Polynomial Modulus. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
23Tomoki Moriya Adaptive attack for a possible PKE scheme using FESTA trapdoor functions in the wrong way. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
23Shuaishuai Li, Cong Zhang, Dongdai Lin Oblivious Transfer from Rerandomizable PKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
23Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs. Search on Bibsonomy ISMVL The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Shuaishuai Li, Cong Zhang, Dongdai Lin Oblivious Transfer from Rerandomizable PKE. Search on Bibsonomy ICICS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Brian Goncalves, Atefeh Mashatan Tightly Secure PKE Combiner in the Quantum Random Oracle Model. Search on Bibsonomy Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Alfonso B. Labao, Henry N. Adorna A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage. Search on Bibsonomy Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Willy Susilo, Fuchun Guo, Zhen Zhao 0005, Ge Wu 0001 PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing. Search on Bibsonomy IEEE Trans. Cloud Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Shanxiang Lyu, Ling Liu 0003, Junzuo Lai, Cong Ling 0001, Hao Chen 0029 Lattice Codes for Lattice-Based PKE. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Shingo Sato, Junji Shikata SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Hans Heum, Martijn Stam Tightness Subtleties for Multi-user PKE Notions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Shanxiang Lyu, Ling Liu 0001, Junzuo Lai, Cong Ling 0001, Hao Chen 0029 Lattice Codes for Lattice-Based PKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
23Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan RS-PKE: Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms. Search on Bibsonomy CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Israt Jahan Mouri, Muhammad Ridowan, Muhammad Abdullah Adnan MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms. Search on Bibsonomy CODASPY The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security. Search on Bibsonomy ACNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Ruize Wang, Kalle Ngo, Elena Dubrova A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations. Search on Bibsonomy ICISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo On the security of the modified Dual-ouroboros PKE using Gabidulin codes. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Keita Emura On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Yanwei Zhou, Bo Yang 0003, Zhe Xia, Mingwu Zhang, Yi Mu 0001 Novel generic construction of leakage-resilient PKE scheme with CCA security. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Dingding Jia, Benoît Libert SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Shengfeng Xu, Xiangxue Li, Haifeng Qian, Kefei Chen CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23P. Preethi, R. Asokan Modelling LSUTE: PKE Schemes for Safeguarding Electronic Healthcare Records Over Cloud Communication Environment. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Keita Xagawa The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
23Keita Xagawa The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application. Search on Bibsonomy SAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Parhat Abla, Mingsheng Wang Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext Size. Search on Bibsonomy SAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Parhat Abla, Mingsheng Wang An Efficient Post-Quantum PKE from RLWR with Simple Security Proof. Search on Bibsonomy SecureComm (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Hans Heum, Martijn Stam Tightness Subtleties for Multi-user PKE Notions. Search on Bibsonomy IMACC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Jiang Zhang 0001, Yu Yu 0001, Shuqin Fan, Zhenfeng Zhang Improved lattice-based CCA2-secure PKE in the standard model. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Rashad Elhabob, Yanan Zhao, Alzubair Hassan, Hu Xiong PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi SiGamal: A supersingular isogeny-based PKE and its application to a PRF. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
23Yun-Chien Tseng PKE: A Model for Recommender Systems in Online Service Platform. Search on Bibsonomy WWW (Companion Volume) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRF. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Yang Lu, Qi Zeng Cryptanalysis of the existing integrated PKE and PEKS schemes. Search on Bibsonomy Int. J. Embed. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Tatsuya Suzuki 0002, Keita Emura, Toshihiro Ohigashi A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage. Search on Bibsonomy J. Medical Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Ariel Gabizon On the efficiency of pairing-based proofs under the d-PKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Qian Guo 0001, Thomas Johansson 0001, Alexander Nilsson A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Jiang Zhang 0001, Yu Yu 0001, Shuqin Fan, Zhenfeng Zhang Improved Lattice-based CCA2-Secure PKE in the Standard Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
23Xavier Boyen, Qinyi Li Direct CCA-Secure KEM and Deterministic PKE from Plain LWE. Search on Bibsonomy PQCrypto The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Mayank K. Aditia, Fahiem Altaf, Moirangthem R. Singh, Manohar Sai Burra, Chanchal Maurya, Sujit Sangram Sahoo, Soumyadev Maity Optimized CL-PKE with lightweight encryption for resource constrained devices. Search on Bibsonomy ICDCN The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Shifeng Sun 0001, Dawu Gu, Man Ho Au, Shuai Han 0001, Yu Yu 0001, Joseph K. Liu Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. Search on Bibsonomy ACNS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Shingo Sato, Junji Shikata SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. Search on Bibsonomy IMACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Shuai Han 0001, Shengli Liu 0001, Lin Lyu 0001 Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
23Tatsuya Suzuki 0002, Keita Emura, Toshihiro Ohigashi A Generic Construction of Integrated Secure-Channel Free PEKS and PKE. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions. Search on Bibsonomy SCN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. Search on Bibsonomy ICICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Aggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang Auditing for privacy in threshold PKE e-voting. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Suvradip Chakraborty, Goutam Paul 0001, C. Pandu Rangan Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
23Hayo Baan, Sauvik Bhattacharya, Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Jose Luis Torre-Arce, Zhenfei Zhang Round2: KEM and PKE based on GLWR. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
23Vishal Saraswat, Rajeev Anand Sahu Short Integrated PKE+PEKS in Standard Model. Search on Bibsonomy SPACE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Suvradip Chakraborty, Goutam Paul 0001, C. Pandu Rangan Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. Search on Bibsonomy ACISP (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Yu Chen 0003, Jiang Zhang 0001, Dongdai Lin, Zhenfeng Zhang Generic constructions of integrated PKE and PEKS. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Shuai Han 0001, Shengli Liu 0001, Lin Lyu 0001 Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Daniel Apon, Xiong Fan, Feng-Hao Liu Fully-Secure Lattice-Based IBE as Compact as PKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
23Florian Boudin pke: an open source python-based keyphrase extraction toolkit. Search on Bibsonomy COLING (Demos) The full citation details ... 2016 DBLP  BibTeX  RDF
23Shengli Liu 0001, Kenneth G. Paterson Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
23Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Ahmad Almogren, Atif Alamri PKE-AET: Public Key Encryption with Authorized Equality Test. Search on Bibsonomy Comput. J. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Kaibin Huang, Yu-Chi Chen, Raylin Tso Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Francesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu, Vishal Saraswat Practical and Secure Integrated PKE+PEKS with Keyword Privacy. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Shengli Liu 0001, Kenneth G. Paterson Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Zhiwei Wang, Siu-Ming Yiu CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency. Search on Bibsonomy ISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 133 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license