The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptosystem with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1982 (23) 1983-1984 (18) 1985 (16) 1986-1987 (18) 1988 (17) 1989 (18) 1990 (16) 1991 (29) 1992-1993 (19) 1994 (18) 1995-1996 (22) 1997 (28) 1998 (43) 1999 (38) 2000 (30) 2001 (61) 2002 (60) 2003 (86) 2004 (109) 2005 (150) 2006 (144) 2007 (133) 2008 (128) 2009 (114) 2010 (73) 2011 (84) 2012 (65) 2013 (74) 2014 (67) 2015 (97) 2016 (66) 2017 (70) 2018 (115) 2019 (119) 2020 (112) 2021 (112) 2022 (94) 2023 (87) 2024 (24)
Publication types (Num. hits)
article(1164) incollection(28) inproceedings(1396) phdthesis(9)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1345 occurrences of 497 keywords

Results
Found 2597 publication records. Showing 2597 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
122Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
102Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm
84Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi NICE - New Ideal Coset Encryption. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF fast decryption, quadratic order, smart card implementation, public-key cryptosystem
79Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha A Lattice Based Public Key Cryptosystem Using Polynomial Representations. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GGH cryptosystem, lattice based public key cryptosystem, polynomial representation
76Kouichi Sakurai, Tsuyoshi Takagi On the Security of a Modified Paillier Public-Key Primitive. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack
73Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Two-lock cryptosystem, Cryptanalysis, Knapsack problem
73Tsuyoshi Takagi Fast RSA-Type Cryptosystem Modulo pkq. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Quisquater-Couvreur method, fast decryption, RSA cryptosystem, factoring algorithm
71Akihiro Yamamura A Functional Cryptosystem Using a Group Action. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF functional cryptosystem, backward deterministic system, modular group, amalgamated free product, public-key cryptosystem
68Weidong Zhang, Baocang Wang, Yupu Hu A New Knapsack Public-Key Cryptosystem. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
65Yuan Zhou, Zhenfu Cao, Zhenchuan Chai Constructing Secure Proxy Cryptosystem. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Proxy cryptosystem, bilinear Diffie-Hellman, ID-based
63Antoine Scemama A Cryptanalysis of the Double-Round Quadratic Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Double-Round Quadratic Cryptosystem, 2R Cryptosystem, Multivariable Cryptography
63Christian Tobias Security Analysis of the MOR Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem
60Sari Haj Hussein The hush cryptosystem. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF base64, grammatical substitution, randomness degree, redundant data percentage, sentence substitution, word substitution, hidden markov models, statistical tests
60T. M. Barakat, I. I. Ismail, I. A. Ali, N. Abdrabouh Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networks. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
60Toshiki Habutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori A Secret Key Cryptosystem by Iterating a Chaotic Map. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
58Wen Ping Ma, Moon Ho Lee Group Oriented Cryptosystems Based on Linear Access Structures. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Group Oriented Cryptosystem, ElGamal Cryptosystem, Vector Space Access Structure, Cryptography, Secret Sharing
57Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake An Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Section, Public-key Cryptosystem, Algebraic Surface
57Attila Altay Yavuz, Emin Anarim, Fatih Alagöz Improved Merkle Cryptosystem (IMC). Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle Cryptosystem, Cryptography, Encryption, Key Establishment
57Jin-yi Cai, Thomas W. Cusick A Lattice-Based Public-Key Cryptosystem. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cryptographic security, lattice, Public-key cryptosystem
53Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan Hybrid Damgård Is CCA1-Secure under the DDH Assumption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems
53Chik How Tan, Xun Yi, Chee Kheong Siew A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adaptive chosen-ciphertext attack, Public key cryptosystem, shift registers
52Daniel Socek, Dubravko Culibrk On the security of a clipped hopfield neural network-based cryptosystem. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF neural networks, cryptography, randomness, permutations, data security
52Tung-Shou Chen, Chin-Chen Chang 0001, Min-Shiang Hwang A virtual image cryptosystem based upon vector quantization. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
52Phong Q. Nguyen, Jacques Stern Cryptanalysis of the Ajtai-Dwork Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
50YoungJu Choie, Eunjeong Lee Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Tate pairing implementation, elliptic curve cryptosystem, hyperelliptic curve cryptosystem
50Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani Reducing Key Length of the McEliece Cryptosystem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Alternant code, quasi-cyclic, public-key cryptography, McEliece cryptosystem
50Guicheng Shen, Xuefeng Zheng Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Commerce, Information Security, Elliptic Curve Cryptosystem
50Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Mohd Said, Md Nasir Sulaiman Implementation of Parallel Algorithms for LUC Cryptosystem. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LUC Cryptosystem, Parallel and Distributed Computing
50Marco Baldi, Marco Bodrato, Franco Chiaraluce A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF QC-LDPC codes, Toom-Cook, Winograd, Cryptanalysis, McEliece cryptosystem
50Baocang Wang, Yupu Hu Diophantine Approximation Attack on a Fast Public Key Cryptosystem. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Simultaneous Diophantine approximation problem, Cryptanalysis, Public-key cryptosystem, Lattice basis reduction, Diophantine approximation
50Jin Li 0002, Fangguo Zhang, Yanming Wang A Strong Identity Based Key-Insulated Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-insulated cryptosystem, Bilinear pairings, ID-based
50Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems
50In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek On the Security of MOR Public Key Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MOR cryptosystem, group extension, central commutator attack, discrete logarithm problem
50Hui-Feng Huang, Chin-Chen Chang 0001 Cryptanalysis of the WD Public-Key Cryptosystem. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Generalized inverses of matrix, public-key cryptosystem
50Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow
50Thomas A. Berson Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem
47Lorenz Minder, Amin Shokrollahi Cryptanalysis of the Sidelnikov Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sidelnikov cryptosystem, structural attack, error-correcting codes, McEliece cryptosystem
47Renate Scheidler A Public-Key Cryptosystem Using Purely Cubic Fields. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Purely cubic field, Cubic residuacity character, Euclidean division, Purely cubic field, Cubic residuacity character, Euclidean division, Public-key cryptosystem, Public-key cryptosystem, Key words
44Aleksey Koval, Boris S. Verkhovsky Cryptosystem Based on Extraction of Square Roots of Complex Integers. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gaussian integers, Rabin algorithm, extraction of square roots, complex integers, Gaussian primes, Cryptography, RSA
44Shafi Goldwasser, Dmitriy Kharchenko Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Soohyun Oh, Jin Kwak, Dongho Won An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity. Search on Bibsonomy ICOIN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Min-Shiang Hwang, Chin-Chen Chang 0001, Kuo-Feng Hwang An ElGamal-Like Cryptosystem for Enciphering Large Messages. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encryption, data security, public key, cryptosystems
44Jiande Zheng A New Public Key Cryptosystem for Constrained Hardware. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Feng Zhang 0012, Gansen Zhao, Tingyan Xing Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data. Search on Bibsonomy ADMA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy-reserving Data Mining, k -NN Mining, Probabilistic Cryptosystem, Communicative Cryptosystem, Secure Multi-party Computation
42Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu Radix-r Non-Adjacent Form. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF radix-r representation, signed window method, elliptic curve cryptosystem, pairing based cryptosystem, Non-adjacent form
42Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF elliptic curve arithmetic, Elliptic curve cryptosystem, scalar multiplication, pairing-based cryptosystem, ECM
42Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier How to Achieve a McEliece-Based Digital Signature Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Niederreiter cryptosystem, digital signature, short signatures, syndrome decoding, McEliece cryptosystem, Goppa codes
42Guang-Huei Chiou, Wen-Tsuen Chen Secure Broadcasting Using the Secure Lock. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF secure broadcasting protocols, secret key minimization, secure broadcasting, secure lock, deciphering operation, private-key cryptosystem, cryptography, protocols, broadcasting, public-key cryptosystem, Chinese Remainder theorem, satellite, telecommunication channels, session key, radio, broadcast channels, secret keys, ciphertext
42Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann 0001, Fabian Werner Algebraic Attack on the MQQ Public Key Cryptosystem. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MQQ public key cryptosystem, MutantXL algorithm, F4 algorithm, Algebraic Cryptanalysis
42Tomohiro Shintani, Ryuichi Sakai Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF knapsack public key cryptosystem, cryptanalysis, lattice, shortest vector problem
42Eun-Jun Yoon, Kee-Young Yoo Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Mobile network, Impersonation attack, Identity-based cryptosystem, User identification
42Toru Akishita, Tsuyoshi Takagi Zero-Value Point Attacks on Elliptic Curve Cryptosystem. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem
42S. C. Samuel, D. Gnanaraj Thomas, P. J. Abisha, K. G. Subramanian 0001 Tree Replacement and Public Key Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tree replacement system, Church-Rosser tree replacement system, public key cryptosystem (PKC), word problem
42Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park New Public-Key Cryptosystem Using Braid Groups. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem
39Jintai Ding, Dieter Schmidt Cryptanalysis of HFEv and Internal Perturbation of HFE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials
37Dima Grigoriev, Ilia N. Ponomarenko Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Homomorphic cryptosystem, Free product of groups, Encrypting boolean circuits
37Raphael Overbeck Statistical Decoding Revisited. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF general decoding, public key cryptography, coding theory, McEliece Cryptosystem, code based cryptography
37Miklós Ajtai Representing hard lattices with O(n log n) bits. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF algorithm, lattice, public-key cryptosystem
37P. J. Abisha, D. Gnanaraj Thomas, K. G. Subramanian 0001 Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Finitely Presented Groups, Free Partially Commutative Monoids, Thue Systems, Public Key Cryptosystem, Word Problem, Zero Knowledge Protocol
36Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, Falko Strenzke A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. Search on Bibsonomy ASAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Mingyuan Yu, Xianping Huang, Li Jiang, Ronghua Liang Combined Public Key Cryptosystem Based on Conic Curves over the Ring Zn. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin An improvement of an efficient user identification scheme based on ID-based cryptosystem. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Abhishek Nagar, Santanu Chaudhury Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Louis Dupont, Sébastien Roy 0002, Jean-Yves Chouinard A FPGA implementation of an elliptic curve cryptosystem. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Jin-Hua Hong, Bin-Yan Tsai A Fast Bit-Interleaving RSA Cryptosystem Based on Radix-4 Cellular-Array Modular Multiplier. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Cédric Faure, Pierre Loidreau A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Michael Coglianese, Bok-Min Goi MaTRU: A New NTRU-Based Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF lattice attacks, partial polynomial evaluation, Public key cryptosystems, NTRU, lattice based cryptography
36Xinxin Fan, Yumin Wang Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung The dual receiver cryptosystem and its applications. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF useful secure computation, digital signature, elliptic curves, public key, key escrow, puzzles, pairing-based cryptography
36David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
36Ivan Damgård, Mads Jurik A Length-Flexible Threshold Cryptosystem with Applications. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF length-flexible, length-invariant, group decryption, self-tallying, perfect ballot secrecy, election, mix-net
36Maneli Noorkami, Faramarz Fekri An Efficient Finite-Field Convolution to Enhance the Performance of the Wavelet Cryptosystem on Handheld Devices. Search on Bibsonomy ITCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Stefan Lucks A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri Cellular Automata Based Cryptosystem (CAC). Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Pierre Loidreau Strengthening McEliece Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Tatsuaki Okamoto, Shigenori Uchiyama Security of an Identity-Based Cryptosystem and the Related Reductions. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Yeow Meng Chee, Antoine Joux, Jacques Stern The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
36Harald Niederreiter A Public-Key Cryptosystem based on Shift Register Sequences. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
36Neal R. Wagner, Marianne R. Magyarik A Public Key Cryptosystem Based on the Word Problem. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
35Yan Zhu 0010, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang Cryptographic role-based security mechanisms based on role-key hierarchy. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF role-based cryptosystem, role-key hierarchy, access control, pairing-based cryptosystem
35Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF piece in hand concept, perturbation vector, public key cryptosystem, multivariate polynomial, multivariate public key cryptosystem
35Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee Entity Based Message Authentication System. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF entity based cryptosystem, security, authentication, agent, public key cryptosystem
35Thierry P. Berger, Pierre Loidreau How to Mask the Structure of Codes for a Cryptographic Use. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Niederreiter cryptosystem, GPT cryptosystem, Gabidulin codes, Subcodes, Reed-solomon codes
35Kouichi Sakurai, Hiroki Shizuya A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Computational number theory, Computational number theory, Securi, Security, Randomness, Randomness, Public-key cryptography, Public-key cryptography, Elliptic curves, Elliptic curves, Key exchange, Key exchange, Discrete logarithm, Discrete logarithm, Key words, Cryptosystem, Cryptosystem
34Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem
34Yu-Fang Chung, Tzer-Shyong Chen, Yu-Ting Chen, Chiu-Chan Lee, Szu-Wen Wang An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF English auction protocol, Mobile agent, anonymity, elliptic curve cryptosystem, public verifiability
34Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters Attacking and Defending the McEliece Cryptosystem. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stern attack, minimal weight code word, list decoding binary Goppa codes, security analysis, McEliece cryptosystem
34Bhaskar Biswas, Nicolas Sendrier McEliece Cryptosystem Implementation: Theory and Practice. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF McEliece encryption scheme, cryptographic implementation, public-key cryptosystem, code-based cryptography
34Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner Cryptanalysis of the TRMC-4 Public Key Cryptosystem. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TRMC, linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
34Daewan Han, Myung-Hwan Kim, Yongjin Yeom Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack
34Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy cryptosystem, certificate-based encryption (CBE), pairing
34Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF double trapdoor decryption mechanism, privacy, public key cryptosystem, semantic security
34Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF (t, n) threshold signature, Authenticated Encryption Scheme, Message Linkage, Elliptic Curve Cryptosystem, Division of labor
34Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold proxy signature, RSA cryptosystem, Lagrange interpolating polynomial
34Guang Gong, Lein Harn, Huapeng Wu The GH Public-Key Cryptosystem. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF third-order linear feedback shift register sequences over finite fields, digital signature, Public-key cryptosystem
31Zhiguo Wan, Kui Ren 0001, Wenjing Lou, Bart Preneel Anonymous ID-Based Group Key Agreement for Wireless Networks. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Aggelos Kiayias, Moti Yung Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
31Ki Hyoung Ko, Jang-Won Lee, Tony Thomas Towards generating secure keys for braid cryptography. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 20F36, 20F10, AMS Classifications 94A60
31Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang t-Out-of-n String/Bit Oblivious Transfers Revisited. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Aggelos Kiayias, Moti Yung Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2597 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license