|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3467 occurrences of 1071 keywords
|
|
|
Results
Found 10508 publication records. Showing 10508 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
105 | Olivier Billet, Henri Gilbert |
A Traceable Block Cipher. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance |
92 | Man Y. Rhee |
Research Activities on Cryptology in Korea. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
69 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
69 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
67 | Xiaomin Wang, Jiashu Zhang, Wenfang Zhang |
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Nonlinear digital filter, Chaos, Cryptology, Keystream |
61 | Selim G. Akl, Henk Meijer |
A Fast Pseudo Random Permutation Generator With Applications to Cryptology. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
59 | Phong Q. Nguyen |
The Two Faces of Lattices in Cryptology. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
59 | Phong Q. Nguyen, Jacques Stern |
The Two Faces of Lattices in Cryptology. |
CaLC |
2001 |
DBLP DOI BibTeX RDF |
|
59 | Michael Portz |
On the Use of Interconnection Networks in Cryptography. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
53 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox |
53 | Friedrich L. Bauer |
Cryptology - Methods and Maxims. |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
cipher systems, computational complexity.Computing Reviews Classification: D.3, cryptography, cryptanalysis, encryption, Cryptology |
49 | Ross J. Anderson |
Cryptology: Where Is the New Frontier? |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
49 | Karl Rubin, Alice Silverberg |
Supersingular Abelian Varieties in Cryptology. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Cees J. A. Jansen, Dick E. Boekee |
On the Significance of the Directed Acyclic Word Graph in Cryptology. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
48 | Andrew Chmora, Stephen B. Wicker (eds.) |
Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers |
Error Control, Cryptology, and Speech Compression |
1994 |
DBLP DOI BibTeX RDF |
|
48 | Mohssen Alabbadi, Stephen B. Wicker |
Susceptibility of Digital Signature Schemes Based on Error-Correcting Codes to Universal Forgery. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | I. L. Asnis, Sergei V. Fedorenko, E. A. Krouk, E. T. Mironchikov |
Tables of Coverings for Decoding by S-Sets. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Vladimir Sidorenko |
Periodicity of One-Dimensional Tilings. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | G. R. Blakley, Gregory Kabatianskii |
Linear Algebra Approach to Secret Sharing Schemes. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Irina E. Bocharova, Boris D. Kudryashov |
Fast Infinite Response Filtering for Speech Processing. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Miodrag J. Mihaljevic |
On Message Protection in Cryptosystems Modelled as the Generalized Wire-Tap Channel II. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Uwe Dettmar, Ulrich K. Sorger, Victor V. Zyablov |
Concatenated Codes with Convolutional Inner and Outer Codes. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Ernst M. Gabidulin, Vitaly V. Zanin |
Codes that Correct Two-Dimensional Burst Errors. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Felix A. Taubin |
Reduced-State Decoding for Trellis Coded Modulation on Nonlinear Intersymbol Interference Channels. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Ernst M. Gabidulin, Olaf Kjelsen |
How to Avoid the Sidel'nikov-Shestakov Attack. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Irina E. Bocharova, Victor D. Kolesnik, Victor Yu. Krachkovsky, Boris D. Kudryashov, Eugeny P. Ovsjannikov, Boris K. Troyanovsky |
On Trellis Codes for Linear Predictive Speech Compression. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Tor Helleseth, Torleiv Kløve, Øyvind Ytrehus |
Generalizations of the Griesmer Bound. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Victor V. Zyablov, Alexei E. Ashikhmin |
Partial Unit Memory Codes on the Base of Subcodes of Hadamard Codes. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | Victor V. Zyablov, Vladimir Sidorenko |
On Periodic (Partial) Unit Memory Codes with Maximum Free Distance. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | V. A. Artamonov, A. A. Klyachko, V. M. Sidelnikov, V. V. Yashchenko |
Algebraic Aspects of Key Generation Systems. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
48 | I. M. Boyarinov |
Self-Checking Decoding Algorithm for Reed-Solomon Codes. |
Error Control, Cryptology, and Speech Compression |
1993 |
DBLP DOI BibTeX RDF |
|
47 | Mahabir Prasad Jhanwar, Rana Barua |
Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
RSA Group, Free Group, Quadratic Residues |
47 | Shahram Khazaei, Willi Meier |
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Self-synchronizing Stream Ciphers, T-functions, Key Recovery |
47 | Souradyuti Paul, Bart Preneel |
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Claus Diem |
The XL-Algorithm and a Conjecture from Commutative Algebra. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Salil P. Vadhan |
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Shujun Li, Xuanqin Mou, Yuanlong Cai |
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
47 | John O. Pliam |
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
47 | Martín Abadi |
Taming the Adversary. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
47 | Gilles Brassard |
Quantum Information Processing: The Good, the Bad and the Ugly. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
47 | Jürgen Bierbrauer, K. Gopalakrishnan 0001, Douglas R. Stinson |
Bounds for Resilient Functions and Orthogonal Arrays. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
47 | Ernest F. Brickell |
A Survey of Hardware Implementation of RSA (Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
47 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
47 | Wyn L. Price |
Progress in Data Security Standardization. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
45 | Arto Salomaa |
Caesar and DNA. Views on Cryptology. |
FCT |
1999 |
DBLP DOI BibTeX RDF |
|
45 | Ernst S. Selmer |
From the Memoirs of a Norwegian Cryptologist. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
45 | James L. Massey |
In Memoriam Tore Herlestam (1929 - 1986). |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
44 | Jean-Charles Faugère, Ludovic Perret |
High order derivatives and decomposition of multivariate polynomials. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
gröbner basis, multivariate cryptology, public key cryptography, cryptology, algebraic cryptanalysis, f5 algorithm |
43 | Junfeng Fan, Lejla Batina, Ingrid Verbauwhede |
Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Bart Preneel |
The Future of Cryptographic Algorithms. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Jean-Charles Faugère |
Interactions between computer algebra (Gröbner bases) and cryptology. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
gröbner basis, public key, cryptology, algebraic cryptanalysis, multivariate cryptography, f5 algorithm |
38 | Marie-Jeanne Toussaint |
Separating the Specification and Implementation Phases in Cryptology. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
knowledge state, protocol execution tree, security, formal verification, cryptographic protocol, cryptology |
36 | Changxiang Shen, Huanguo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang |
Survey of information security. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
network security, information security, information hiding, trusted computing, cryptology |
36 | Jesús Adolfo García-Pasquel, José Galaviz |
Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers. |
ACM J. Educ. Resour. Comput. |
2006 |
DBLP DOI BibTeX RDF |
classical cryptography, Cryptology |
36 | Wontae Hwang, Dongseung Kim |
Load Balanced Block Lanczos Algorithm over GF(2) for Factorization of Large Keys. |
HiPC |
2006 |
DBLP DOI BibTeX RDF |
parallel/cluster computing, RSA key, load balancing, sparse matrix, cryptology |
36 | Jiqiang Lu |
Security Weaknesses in Two Proxy Signature Schemes. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Public key cryptology, Proxy signature, Forgery attack |
33 | Hwajeong Seo, Suhri Kim (eds.) |
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I |
ICISC (1) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Hwajeong Seo, Suhri Kim (eds.) |
Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II |
ICISC (2) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro (eds.) |
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I |
INDOCRYPT (1) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro (eds.) |
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II |
INDOCRYPT (2) |
2024 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VII |
ASIACRYPT (7) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I |
ASIACRYPT (1) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III |
ASIACRYPT (3) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V |
ASIACRYPT (5) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II |
ASIACRYPT (2) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jian Guo 0001, Ron Steinfeld (eds.) |
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VIII |
ASIACRYPT (8) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Abdelrahaman Aly, Mehdi Tibouchi (eds.) |
Progress in Cryptology - LATINCRYPT 2023 - 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings |
LATINCRYPT |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Nadia El Mrabet, Luca De Feo, Sylvain Duquesne (eds.) |
Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings |
AFRICACRYPT |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV |
CRYPTO (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part I |
CRYPTO (1) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III |
CRYPTO (3) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part V |
CRYPTO (5) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Helena Handschuh, Anna Lysyanskaya (eds.) |
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II |
CRYPTO (2) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Vasily Mikhalev, Nils Kopal, Bernhard Esslinger, Michelle Waldispühl, Benedek Láng, Beáta Megyesi |
What is the Code for the Code? Historical Cryptology Terminology. |
HistoCrypt |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Eunice Kim, Christian Millichap |
Deciphering Secrets Throughout History: An Interdisciplinary Linguistics and Cryptology Course. |
HistoCrypt |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Qian Guo 0001, Denis Nabokov, Alexander Nilsson, Thomas Johansson 0001 |
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Andre Esser 0001, Rahul Girme, Arindam Mukherjee 0003, Santanu Sarkar 0001 |
Memory-Efficient Attacks on Small LWE Keys. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont |
Quantitative Fault Injection Analysis. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Alain Couvreur, Rocco Mora, Jean-Pierre Tillich |
A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jonas Meers, Julian Nowakowski |
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Alexander May 0001, Julian Nowakowski |
Too Many Hints - When LLL Breaks LWE. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody |
On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Haodong Jiang, Zhi Ma 0001, Zhenfeng Zhang |
Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Dominique Unruh |
Towards Compressed Permutation Oracles. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Jiaxin Pan, Benedikt Wagner, Runzhi Zeng |
Tighter Security for Generic Authenticated Key Exchange in the QROM. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Maxime Plançon |
Exploiting Algebraic Structures in Probing Security. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Felix Dörre, Jeremias Mechler, Jörn Müller-Quade |
Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Kaijie Jiang, Anyu Wang 0001, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang |
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner |
We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve. |
ASIACRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No |
Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption. |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Yi Wang 0055, Rongmao Chen, Xinyi Huang 0001, Moti Yung |
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp 0001 |
The Pre-Shared Key Modes of HPKE. |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Srinivasan Raghuraman, Yibin Yang 0001 |
Just How Fair is an Unreactive World? |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Brice Minaud, Michael Reichle |
Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption. |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Long Chen 0018, Hui Guo, Ya-Nan Li, Qiang Tang 0005 |
Efficient Secure Storage with Version Control and Key Rotation. |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Antonio Guimarães, Hilder V. L. Pereira, Barry Van Leeuwen |
Amortized Bootstrapping Revisited: Simpler, Asymptotically-Faster, Implemented. |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Hiroki Okada 0001, Rachel Player, Simon Pohmann |
Homomorphic Polynomial Evaluation Using Galois Structure and Applications to BFV Bootstrapping. |
ASIACRYPT (6) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 10508 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|