|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
136 | Jonathan Katz |
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). |
SIGACT News |
2005 |
DBLP DOI BibTeX RDF |
|
83 | Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto |
Security-Mediated Certificateless Cryptography. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
security-mediated cryptography, certificateless cryptography |
68 | Junzuo Lai, Weidong Kou |
Self-Generated-Certificate Public Key Encryption Without Pairing. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography |
66 | Yih Huang, David Rine, Xunhua Wang |
A JCA-Based Implementation Framework for Threshold Cryptography. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
60 | Cryptography Editorial Office |
Acknowledgment to the Reviewers of Cryptography in 2022. |
Cryptogr. |
2023 |
DBLP DOI BibTeX RDF |
|
55 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
52 | Craig Gentry, Alice Silverberg |
Hierarchical ID-Based Cryptography. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
hierarchical identity-based cryptography, elliptic curves, identity-based cryptography, pairing-based cryptography |
51 | Marc Joye, Christophe Tymen |
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
smart-cards, Public-key cryptography, elliptic curves, non-adjacent forms |
51 | Ian Grigg |
Financial Cryptography in 7 Layers. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
49 | Shafi Goldwasser |
New Directions in Cryptography: Twenty Some Years Later. |
FOCS |
1997 |
DBLP DOI BibTeX RDF |
probabilistic proof systems, cryptography, cryptography, complexity theory, interactive proof systems, pseudo random number generation |
49 | Tom Tedrick |
On the History of Cryptography during WW2, and Possible New Directions for Cryptograpic Research. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
History of Cryptography, History of War, Theory of War, Abstract Protocol Theory, Game Theoretic Cryptography, Rommel, ULTRA, Cryptographic Protocols |
49 | Phong Q. Nguyen |
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP |
48 | Mary Ellen Zurko, Andrew S. Patrick |
Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
User-centered security, cryptography |
48 | Walid Bagga, Refik Molva |
Policy-Based Cryptography and Applications. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Privacy, Authorization, Policy, Credentials, ID-based Cryptography |
48 | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai |
Toward Fair International Key Escrow. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party |
47 | Eli Biham, Yaron J. Goren, Yuval Ishai |
Basing Weak Public-Key Cryptography on Strong One-Way Functions. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model |
46 | Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson |
What can identity-based cryptography offer to web services? |
SWS |
2007 |
DBLP DOI BibTeX RDF |
message-level security, web services, identity-based cryptography |
46 | Lei Zhang 0009, Futai Zhang, Wei Wu 0001 |
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography |
46 | Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
Superscalar Coprocessor for High-Speed Curve-Based Cryptography. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
curve-based cryptography, HECC, ECC, instruction-level parallelism, scalar multiplication, Superscalar, coprocessor |
45 | Jean-Claude Bajard, Laurent Imbert, Thomas Plantard |
Modular Number Systems: Beyond the Mersenne Family. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
Generalized Mersenne numbers, Elliptic curve cryptography, Montgomery multiplication |
43 | Wil Michiels |
Opportunities in White-Box Cryptography. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
black-box cryptography, gray-box cryptography, white-box cryptography, crypto corner, cryptography, security & privacy |
43 | Krzysztof Piotrowski, Peter Langendörfer, Steffen Peter |
How public key cryptography influences wireless sensor node lifetime. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
wireless sensor networks, performance, complexity, cryptography, RSA, elliptic curve cryptography |
43 | Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff |
Practical Cryptography in High Dimensional Tori. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
torus-based cryptography, discrete-log based cryptography |
43 | Giovanni Di Crescenzo, Renwei Ge, Gonzalo R. Arce |
Improved topology assumptions for threshold cryptography in mobile ad hoc networks. |
SASN |
2005 |
DBLP DOI BibTeX RDF |
distributed cryptography, mobile ad hoc networks, threshold cryptography, threshold signatures |
43 | Zhi Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo |
Halftone visual cryptography. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Xuhua Ding, Gene Tsudik |
Simple Identity-Based Cryptography with Mediated RSA. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
mediated RSA, revocation, Identity-based encryption |
43 | Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson |
Constructions and Bounds for Visual Cryptography. |
ICALP |
1996 |
DBLP DOI BibTeX RDF |
|
43 | Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval |
Distributed Public-Key Cryptography from Weak Secrets. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Kiyomichi Araki, Takakazu Satoh, Shinji Miura |
Overview of Elliptic Curve Cryptography. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
43 | Jacques Stern |
Lattices and Cryptography: An Overview. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Vivien Dubois, Louis Granboulan, Jacques Stern |
Cryptanalysis of HFE with Internal Perturbation. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
internal perturbation, binary vector spaces, differential cryptanalysis, multivariate cryptography, HFE |
42 | Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 |
Generic On-Line/Off-Line Threshold Signatures. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic |
42 | Jintai Ding, Jason E. Gower |
Inoculating Multivariate Schemes Against Differential Attacks. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate |
42 | Christophe Doche, Thomas Icart, David R. Kohel |
Efficient Scalar Multiplication by Isogeny Decompositions. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
fast arithmetic, efficiently computable isogenies, efficient tripling, ?-adic, Elliptic curve cryptography |
42 | Christian Wieschebrink |
An Attack on a Modified Niederreiter Encryption Scheme. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography |
42 | Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel |
Cryptanalysis of the Tractable Rational Map Cryptosystem. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems |
42 | Kaoru Kurosawa, Swee-Huay Heng |
From Digital Signature to ID-based Identification/Signature. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
GDH group, signature scheme, ID-based cryptography, identification scheme |
42 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
42 | Louis Goubin |
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards |
42 | Nicolas T. Courtois, Magnus Daum, Patrick Felke |
On the Security of HFE, HFEv- and Quartz. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields |
42 | Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin |
A Fast and Secure Implementation of Sflash. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE |
42 | Nicolas T. Courtois |
Generic Attacks and the Security of Quartz. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Asymmetric cryptography, Hidden Field Equations (HFE), MQ, HFEv-, Quartz, finite fields, Flash, short signatures, Nessie, Sflash |
42 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
40 | Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede |
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. |
ESAS |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, authentication, pervasive computing, Elliptic Curve Cryptography, key-distribution, hardware implementation |
40 | Carlos Roberto Moratelli, Érika F. Cota, Marcelo Lubaszewski |
A cryptography core tolerant to DFA fault attacks. |
SBCCI |
2006 |
DBLP DOI BibTeX RDF |
cryptography, smart cards, fault attacks |
39 | Benoît Libert, Jean-Jacques Quisquater |
On Constructing Certificateless Cryptosystems from Identity Based Encryption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
provable security, bilinear maps, Certificateless encryption |
39 | Liqun Chen 0002, John Malone-Lee |
Improved Identity-Based Signcryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Nick Mathewson, Roger Dingledine |
Mixminion: Strong Anonymity for Financial Cryptography. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Florian Hess, Gadiel Seroussi, Nigel P. Smart |
Two Topics in Hyperelliptic Cryptography. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
39 | Frédéric Amiel, Benoit Feix, Karine Villegas |
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
arithmetic coprocessors, reverse engineering, Public key cryptography, side-channel analysis, exponentiation |
39 | Jaap-Henk Hoepman |
Secret Key Authentication with Software-Only Verification. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
symmetric key cryptography, authentication, smart cards |
39 | Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan |
Simultaneous Hardcore Bits and Cryptography against Memory Attacks. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Silvio Micali, Leonid Reyzin |
Physically Observable Cryptography (Extended Abstract). |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Gunnar Gaubatz, Berk Sunar |
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
homomorphic embedding, modulus scaling, fault tolerance, error detection, public-key cryptography, arithmetic codes, Finite field arithmetic, cyclic codes, idempotency |
38 | M. R. Oberman |
Communication Security in Remote controlled Computer Systems. |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
cryptography, remote control, Communication security |
38 | Alexander Klimm, Oliver Sander, Jürgen Becker 0001, Sylvain Subileau |
A Hardware/Software Codesign of a Co-processor for Real-Time Hyperelliptic Curve Cryptography on a Spartan3 FPGA. |
ARCS |
2008 |
DBLP DOI BibTeX RDF |
Hyperelliptic Curve Cryptography (HECC), FPGA, embedded systems, Public Key Cryptography (PKC), reconfigurable hardware |
38 | Olivier Billet, Henri Gilbert |
Cryptanalysis of Rainbow. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow |
38 | Wei Ming Lim, Mohammed Benaissa |
Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and cryptography. |
CODES+ISSS |
2003 |
DBLP DOI BibTeX RDF |
GF(2m) arithmetic, forward error control coding, galois field processor, cryptography, advanced encryption standard, elliptic curve cryptography, design space exploration, Reed-Solomon code, hardware-software co-design, BCH code |
38 | Rajni Goel, Moses Garuba, Anteneh Girma |
Research Directions in Quantum Cryptography. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
38 | James L. Massey |
Whither Cryptography? |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya |
Secret Key Cryptography with Cellular Automata. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Chin-Chen Chang 0001, Tai-Xing Yu |
Sharing a Secret Gray Image in Multiple Images. |
CW |
2002 |
DBLP DOI BibTeX RDF |
secret sharing, Visual cryptography |
37 | Shuai Han 0001, Shengli Liu 0001, Dawu Gu |
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. |
Public Key Cryptography (4) |
2024 |
DBLP DOI BibTeX RDF |
|
37 | Dennis Hofheinz, Kristina Hostáková, Roman Langrehr, Bogdan Ursu |
On Structure-Preserving Cryptography and Lattices. |
Public Key Cryptography (3) |
2024 |
DBLP DOI BibTeX RDF |
|
37 | Yuyu Wang 0001, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka |
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. |
Public Key Cryptography (1) |
2021 |
DBLP DOI BibTeX RDF |
|
37 | Carsten Baum, Ariel Nof |
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography. |
Public Key Cryptography (1) |
2020 |
DBLP DOI BibTeX RDF |
|
37 | Nicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter 0001 |
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography. |
Public Key Cryptography (1) |
2020 |
DBLP DOI BibTeX RDF |
|
37 | Jiang Zhang 0001, Yu Yu 0001, Shuqin Fan, Zhenfeng Zhang, Kang Yang 0002 |
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. |
Public Key Cryptography (2) |
2020 |
DBLP DOI BibTeX RDF |
|
37 | Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud |
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
37 | Mihir Bellare, Viet Tung Hoang |
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
37 | Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia |
Cryptography Using Captcha Puzzles. |
Public Key Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
37 | Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang |
Public-Key Cryptography from New Multivariate Quadratic Assumptions. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
37 | Ali Juma, Yevgeniy Vahlis, Moti Yung |
Multi-location Leakage Resilient Cryptography. |
Public Key Cryptography |
2012 |
DBLP DOI BibTeX RDF |
|
37 | Vinod Vaikuntanathan |
New Developments in Leakage-Resilient Cryptography. |
Public Key Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Jintai Ding, Christopher Wolf, Bo-Yin Yang |
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Trapdoor, Encryption, Public Key, Signing |
37 | Yair Frankel, Philip D. MacKenzie, Moti Yung |
"Psyeudorandom Intermixing": A Tool for Shared Cryptography. |
Public Key Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai |
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Byoungcheon Lee |
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Unified public key infrastructure, Private key issuing protocol, Key generation and certification authority, Key privacy agent, Certificate-based cryptography, Hybrid cryptography, Bilinear pairing, ID-based cryptography |
35 | Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab |
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. |
EWSN |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, implementation, Elliptic Curve Cryptography, pairings, cryptographic primitives |
35 | Alasdair McAndrew |
Teaching cryptography with open-source software. |
SIGCSE |
2008 |
DBLP DOI BibTeX RDF |
cryptography, computer science education, open-source software, discrete mathematics, exploratory learning |
35 | Ambrose Chu, Scott Miller, Mihai Sima |
Reconfigurable solutions for very-long arithmetic with applications in cryptography. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
field-programmable gate arrays, embedded systems, cryptography, reconfigurable computing |
35 | Dagmar Bruß, Gábor Erdélyi, Tim Meyer, Tobias Riege, Jörg Rothe |
Quantum cryptography: A survey. |
ACM Comput. Surv. |
2007 |
DBLP DOI BibTeX RDF |
Quantum bit commitment, quantum cryptography, quantum key distribution |
35 | Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi |
Security Mediated Certificateless Signatures. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
security mediated, SMC cryptography, certificateless |
35 | Jean-Sébastien Coron |
What Is Cryptography? |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
security, cryptography, PKI, public key |
35 | Jacques J. A. Fournier, Simon W. Moore |
A Vector Approach to Cryptography Implementation. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, AES, RSA, vector architecture, Montgomery Modular Multiplication |
35 | Stefan Tillich, Johann Großschädl |
A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m). |
Asia-Pacific Computer Systems Architecture Conference |
2004 |
DBLP DOI BibTeX RDF |
application-specific instruction set extension, binary finite fields, SPARC V8, multiply step instruction, Elliptic curve cryptography |
35 | Gwo-Chin Tai, Long-Wen Chang |
Visual Cryptography for Digital Watermarking in Still Images. |
PCM (2) |
2004 |
DBLP DOI BibTeX RDF |
wavelet packet transform, digital watermarking, Visual cryptography |
35 | Chip Elliott, David Pearson, Gregory D. Troxel |
Quantum cryptography in practice. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
secure networks, cryptographic protocols, error correction, IPsec, quantum cryptography, key agreement protocols, privacy amplification, quantum key distribution |
35 | Mohamed Al-Ibrahim, Anton Cerný |
Proxy and Threshold One-Time Signatures. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature |
34 | Kazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. |
ARC |
2006 |
DBLP DOI BibTeX RDF |
RSA, Elliptic Curve Cryptography (ECC), Public-Key Cryptography (PKC), Reconfigurable architecture, FPGA implementation |
34 | Yoshinori Aono |
A New Lattice Construction for Partial Key Exposure Attack for RSA. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction |
34 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Parallel Key-Insulated Public Key Encryption Without Random Oracles. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
parallel key-insulated encryption, standard model, pairings |
34 | Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang |
Anonymous Signature Schemes. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Kaoru Kurosawa, Swee-Huay Heng |
The Power of Identification Schemes. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
trapdoor commitment scheme, on-line/off-line, signature scheme, Identification scheme, identity-based |
34 | Endre Bangerter, Jan Camenisch, Ueli M. Maurer |
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Edith Elkind, Helger Lipmaa |
Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Andris Ambainis, Markus Jakobsson, Helger Lipmaa |
Cryptographic Randomized Response Techniques. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
randomized response technique, privacy, privacy-preserving data-mining, oblivious transfer, polling, binary symmetric channel |
34 | Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Efficient ID-based Group Key Agreement with Bilinear Maps. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Dahlia Malkhi, Elan Pavlov |
Anonymity without 'Cryptography'. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
|
34 | Wenbo Mao |
Timed-Release Cryptography. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 18658 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|