|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 59 occurrences of 41 keywords
|
|
|
Results
Found 62 publication records. Showing 62 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
339 | Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim 0001 |
Further Security Analysis of XTR. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR-ISE, differential power analysis |
233 | Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai |
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA |
205 | Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung |
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack |
167 | Zehui Wang, Zhiguo Zhang |
XTR + : A Provable Security Public Key Cryptosystem. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
Public key system, Trace function, IND-CCA2, Provable security, Blind signature, XTR |
167 | Régis Bevan |
Improved Zero Value Attack on XTR. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
MRPA, smart cards, Power Analysis, DFA, XTR |
166 | Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong |
Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
XTR cryptosystem, Gauss period, cubic residue, normal basis, roots of unity |
161 | Ningbo Mu, Yupu Hu, Leyou Zhang |
On the Computational Efficiency of XTR+. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
150 | Dan Page, Martijn Stam |
On XTR and Side-Channel Analysis. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
LUC, finite field, side channel attack, power analysis, XTR |
150 | Martijn Stam, Arjen K. Lenstra |
Speeding Up XTR. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
binary Euclidean algorithm, LUC, ECC, addition chains, XTR, Fibonacci sequences |
144 | Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim 0001, Tsuyoshi Takagi |
Compressed XTR. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
133 | Mathieu Ciet, Christophe Giraud 0001 |
Transient Fault Induction Attacks on XTR. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
public-key system XTR, smart cards, countermeasures, Differential fault analysis |
100 | Eric R. Verheul |
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman problem, Supersingular elliptic curves, Inverting MOV embedding, Tripartite Diffie-Hellman key exchange, Escrow, XTR |
94 | Robert Granger, Dan Page, Martijn Stam |
A Comparison of CEILIDH and XTR. |
ANTS |
2004 |
DBLP DOI BibTeX RDF |
|
94 | Dong-Guk Han, Tetsuya Izu, Jongin Lim 0001, Kouichi Sakurai |
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
94 | Xiaofeng Chen 0001, Fei Feng, Yumin Wang |
New Key Improvements and Its Application to XTR System. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
94 | Arjen K. Lenstra, Eric R. Verheul |
Key Improvements to XTR. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
90 | Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim |
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Trace Projection, LFSR, digital signature scheme, XTR |
77 | Eric Peeters, Michael Neve, Mathieu Ciet |
XTR Implementation on Reconfigurable Hardware. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
77 | Wieb Bosma, James Hutton, Eric R. Verheul |
Looking beyond XTR. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
77 | Arjen K. Lenstra, Eric R. Verheul |
Fast Irreducibility and Subgroup Membership Testing in XTR. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
77 | Eric R. Verheul |
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
77 | Arjen K. Lenstra, Eric R. Verheul |
The XTR Public Key System. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
|
74 | Martijn Stam, Arjen K. Lenstra |
Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
LUC, finite field, XTR, cyclotomic polynomial |
67 | Bin Li |
A Forward-Secrecy WTLS Handshake Protocol Based on XTR. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
WTLS, Intermediator Attack, Forward Secrecy, XTR |
60 | Chaoju Hu, Na Xu |
Application of XTR Public Key System in Certificate Authority System. |
CSSE (5) |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Maciej Grzeskowiak |
New Key Generation Algorithms for the XTR Cryptosytem. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee |
XTR Extended to GF(p6m). |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
57 | Jaewook Chung, M. Anwar Hasan |
More Generalized Mersenne Numbers: (Extended Abstract). |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Generalized Mersenne Numbers, Karatsuba-Ofman, RSA, XTR, Modular Reduction, Montgomery |
56 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
50 | Karl Rubin, Alice Silverberg |
Torus-Based Cryptography. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
50 | Shiming Li, Guohui Zhou, Chunmao Jiang, Yan Zhao 0007, Fengyu Lei |
An Improved Algorithm in XTR. |
MVHI |
2010 |
DBLP DOI BibTeX RDF |
DH, ECC, XTR, Subgroup |
43 | Wen-Ching W. Li, Mats Näslund, Igor E. Shparlinski |
Hidden Number Problem with the Trace and Bit Security of XTR and LUC. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Tanja Lange 0001, Arne Winterhof |
Polynomial Interpolation of the Elliptic Curve and XTR Discrete Logarithm. |
COCOON |
2002 |
DBLP DOI BibTeX RDF |
|
43 | Igor E. Shparlinski |
On the Generalised Hidden Number Problem and Bit Security of XTR. |
AAECC |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Jaemoon Kim, Ikkwon Yie, Seung Ik Oh, Hyung-Don Kim, Jado Ryu |
Fast Generation of Cubic Irreducible Polynomials for XTR. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Roberto Maria Avanzi |
The Complexity of Certain Multi-Exponentiation Techniques in Cryptography. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Integer recoding, Elliptic and hyperelliptic curves, Trace zero varieties, Groups with automorphisms, Scalar multiplication, Exponentiation, XTR |
39 | Maciej Grzeskowiak |
On Generating Elements of Orders Dividing p2k±pk+1. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
The Gong-Harn Public Key System, The XTR Public Key System, primes of a special form, solving polynomial equations modulo p |
34 | Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff |
Practical Cryptography in High Dimensional Tori. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
torus-based cryptography, discrete-log based cryptography |
27 | Jing Yang 0035, Fang-Wei Fu 0001 |
New (k, l, m)-verifiable multi-secret sharing schemes based on XTR public key system. |
Theor. Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Martijn Stam |
XTR and Tori. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
27 | Jing Yang 0035, Fang-Wei Fu 0001 |
New (k, l, m)-verifiable multi-secret sharing schemes based on XTR public key system. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
27 | Jing Yang 0035, Fang-Wei Fu 0001 |
New (k, l, m)-verifiable multi-secret sharing schemes based on XTR public key system. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
27 | S. Vatchala, S. Ravimaran 0001, A. Sathish |
Auto Sec SDN-XTR: A Hybrid End to End Security Mechanism with Efficient Trace Representation on Open Stack Cloud. |
J. Inf. Sci. Eng. |
2019 |
DBLP BibTeX RDF |
|
27 | Kewei Lv, Si-Wei Ren, Wenjie Qin |
The Security of Individual Bit for XTR. |
ICICS |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Sedat Akleylek, Baris Bülent Kirlar |
New methods for public key cryptosystems based on XTR. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Yuki Kono, Yasuyuki Nogami |
An Application of XTR for the Discrete Logarithm Problem on Barreto - Naehrig Curve. |
CANDAR |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Qiaoying Tang, Fengxian Shen |
Identity-Based Xtr Blind Signature Scheme. |
Intell. Autom. Soft Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Liping Zhang, Fengyu Lei, Jin Chen |
The Larger Integer Library and the Diffie-Hellman Protocol based on XTR. |
J. Digit. Content Technol. its Appl. |
2010 |
DBLP BibTeX RDF |
|
27 | Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Howon Kim 0001, Tsuyoshi Takagi |
A More Compact Representation of XTR Cryptosystem. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Katrin Hoeper, Guang Gong |
Integrated DH-like Key Exchange Protocols from LUC, GH and XTR. |
ISIT |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Dong-Guk Han, Tetsuya Izu, Jongin Lim 0001, Kouichi Sakurai |
Side Channel Cryptanalysis on XTR Public Key Cryptosystem. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Ho Won Kim 0001, Kyoil Chung |
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
27 | Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai |
On security of XTR public key cryptosystems against Side Channel Attacks. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
27 | Dong-Guk Han, Ki Soon Yoon, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 |
Optimal Extension Fields for XTR. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert |
An Efficient and Scalable Quasi-Aggregate Signature Scheme Based on LFSR Sequences. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Benedikt Driessen, Axel Poschmann, Christof Paar |
Comparison of innovative signature algorithms for WSNs. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Dan Page, Frederik Vercauteren |
A Fault Attack on Pairing-Based Cryptography. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, identity based encryption, fault attack, Tate pairing |
17 | Isabelle Déchène |
Arithmetic of Generalized Jacobians. |
ANTS |
2006 |
DBLP DOI BibTeX RDF |
generalized Jacobians, semi-abelian varieties, Public-key cryptography, elliptic curves, discrete logarithm problem |
17 | Antoine Joux, Reynald Lercier |
The Function Field Sieve in the Medium Prime Case. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Robert Granger, Frederik Vercauteren |
On the Discrete Logarithm Problem on Algebraic Tori. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Marten van Dijk, David P. Woodruff |
Asymptotically Optimal Communication for Torus-Based Cryptography. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Philip D. MacKenzie |
More Efficient Password-Authenticated Key Exchange. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #62 of 62 (100 per page; Change: )
|
|