|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1345 occurrences of 497 keywords
|
|
|
Results
Found 2597 publication records. Showing 2597 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
122 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
102 | Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi |
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm |
84 | Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi |
NICE - New Ideal Coset Encryption. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
fast decryption, quadratic order, smart card implementation, public-key cryptosystem |
79 | Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha |
A Lattice Based Public Key Cryptosystem Using Polynomial Representations. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
GGH cryptosystem, lattice based public key cryptosystem, polynomial representation |
76 | Kouichi Sakurai, Tsuyoshi Takagi |
On the Security of a Modified Paillier Public-Key Primitive. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack |
73 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 |
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Two-lock cryptosystem, Cryptanalysis, Knapsack problem |
73 | Tsuyoshi Takagi |
Fast RSA-Type Cryptosystem Modulo pkq. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Quisquater-Couvreur method, fast decryption, RSA cryptosystem, factoring algorithm |
71 | Akihiro Yamamura |
A Functional Cryptosystem Using a Group Action. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
functional cryptosystem, backward deterministic system, modular group, amalgamated free product, public-key cryptosystem |
68 | Weidong Zhang, Baocang Wang, Yupu Hu |
A New Knapsack Public-Key Cryptosystem. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
65 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Constructing Secure Proxy Cryptosystem. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Proxy cryptosystem, bilinear Diffie-Hellman, ID-based |
63 | Antoine Scemama |
A Cryptanalysis of the Double-Round Quadratic Cryptosystem. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Double-Round Quadratic Cryptosystem, 2R Cryptosystem, Multivariable Cryptography |
63 | Christian Tobias |
Security Analysis of the MOR Cryptosystem. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem |
60 | Sari Haj Hussein |
The hush cryptosystem. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
base64, grammatical substitution, randomness degree, redundant data percentage, sentence substitution, word substitution, hidden markov models, statistical tests |
60 | T. M. Barakat, I. I. Ismail, I. A. Ali, N. Abdrabouh |
Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networks. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
60 | Toshiki Habutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori |
A Secret Key Cryptosystem by Iterating a Chaotic Map. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
58 | Wen Ping Ma, Moon Ho Lee |
Group Oriented Cryptosystems Based on Linear Access Structures. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Group Oriented Cryptosystem, ElGamal Cryptosystem, Vector Space Access Structure, Cryptography, Secret Sharing |
57 | Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake |
An Algebraic Surface Cryptosystem. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Section, Public-key Cryptosystem, Algebraic Surface |
57 | Attila Altay Yavuz, Emin Anarim, Fatih Alagöz |
Improved Merkle Cryptosystem (IMC). |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
Merkle Cryptosystem, Cryptography, Encryption, Key Establishment |
57 | Jin-yi Cai, Thomas W. Cusick |
A Lattice-Based Public-Key Cryptosystem. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
cryptographic security, lattice, Public-key cryptosystem |
53 | Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan |
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems |
53 | Chik How Tan, Xun Yi, Chee Kheong Siew |
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
adaptive chosen-ciphertext attack, Public key cryptosystem, shift registers |
52 | Daniel Socek, Dubravko Culibrk |
On the security of a clipped hopfield neural network-based cryptosystem. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
neural networks, cryptography, randomness, permutations, data security |
52 | Tung-Shou Chen, Chin-Chen Chang 0001, Min-Shiang Hwang |
A virtual image cryptosystem based upon vector quantization. |
IEEE Trans. Image Process. |
1998 |
DBLP DOI BibTeX RDF |
|
52 | Phong Q. Nguyen, Jacques Stern |
Cryptanalysis of the Ajtai-Dwork Cryptosystem. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
50 | YoungJu Choie, Eunjeong Lee |
Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Tate pairing implementation, elliptic curve cryptosystem, hyperelliptic curve cryptosystem |
50 | Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani |
Reducing Key Length of the McEliece Cryptosystem. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Alternant code, quasi-cyclic, public-key cryptography, McEliece cryptosystem |
50 | Guicheng Shen, Xuefeng Zheng |
Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Electronic Commerce, Information Security, Elliptic Curve Cryptosystem |
50 | Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Mohd Said, Md Nasir Sulaiman |
Implementation of Parallel Algorithms for LUC Cryptosystem. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
LUC Cryptosystem, Parallel and Distributed Computing |
50 | Marco Baldi, Marco Bodrato, Franco Chiaraluce |
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
QC-LDPC codes, Toom-Cook, Winograd, Cryptanalysis, McEliece cryptosystem |
50 | Baocang Wang, Yupu Hu |
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Simultaneous Diophantine approximation problem, Cryptanalysis, Public-key cryptosystem, Lattice basis reduction, Diophantine approximation |
50 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A Strong Identity Based Key-Insulated Cryptosystem. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
Key-insulated cryptosystem, Bilinear pairings, ID-based |
50 | Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel |
Cryptanalysis of the Tractable Rational Map Cryptosystem. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems |
50 | In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek |
On the Security of MOR Public Key Cryptosystem. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
MOR cryptosystem, group extension, central commutator attack, discrete logarithm problem |
50 | Hui-Feng Huang, Chin-Chen Chang 0001 |
Cryptanalysis of the WD Public-Key Cryptosystem. |
CW |
2002 |
DBLP DOI BibTeX RDF |
Generalized inverses of matrix, public-key cryptosystem |
50 | Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi |
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow |
50 | Thomas A. Berson |
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem |
47 | Lorenz Minder, Amin Shokrollahi |
Cryptanalysis of the Sidelnikov Cryptosystem. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Sidelnikov cryptosystem, structural attack, error-correcting codes, McEliece cryptosystem |
47 | Renate Scheidler |
A Public-Key Cryptosystem Using Purely Cubic Fields. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Purely cubic field, Cubic residuacity character, Euclidean division, Purely cubic field, Cubic residuacity character, Euclidean division, Public-key cryptosystem, Public-key cryptosystem, Key words |
44 | Aleksey Koval, Boris S. Verkhovsky |
Cryptosystem Based on Extraction of Square Roots of Complex Integers. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Gaussian integers, Rabin algorithm, extraction of square roots, complex integers, Gaussian primes, Cryptography, RSA |
44 | Shafi Goldwasser, Dmitriy Kharchenko |
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Soohyun Oh, Jin Kwak, Dongho Won |
An Efficient Hybrid Cryptosystem Providing Authentication for Sender?S Identity. |
ICOIN |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Min-Shiang Hwang, Chin-Chen Chang 0001, Kuo-Feng Hwang |
An ElGamal-Like Cryptosystem for Enciphering Large Messages. |
IEEE Trans. Knowl. Data Eng. |
2002 |
DBLP DOI BibTeX RDF |
encryption, data security, public key, cryptosystems |
44 | Jiande Zheng |
A New Public Key Cryptosystem for Constrained Hardware. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
42 | Feng Zhang 0012, Gansen Zhao, Tingyan Xing |
Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data. |
ADMA |
2009 |
DBLP DOI BibTeX RDF |
Privacy-reserving Data Mining, k -NN Mining, Probabilistic Cryptosystem, Communicative Cryptosystem, Secure Multi-party Computation |
42 | Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu |
Radix-r Non-Adjacent Form. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
radix-r representation, signed window method, elliptic curve cryptosystem, pairing based cryptosystem, Non-adjacent form |
42 | Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery |
Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
elliptic curve arithmetic, Elliptic curve cryptosystem, scalar multiplication, pairing-based cryptosystem, ECM |
42 | Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier |
How to Achieve a McEliece-Based Digital Signature Scheme. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Niederreiter cryptosystem, digital signature, short signatures, syndrome decoding, McEliece cryptosystem, Goppa codes |
42 | Guang-Huei Chiou, Wen-Tsuen Chen |
Secure Broadcasting Using the Secure Lock. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
secure broadcasting protocols, secret key minimization, secure broadcasting, secure lock, deciphering operation, private-key cryptosystem, cryptography, protocols, broadcasting, public-key cryptosystem, Chinese Remainder theorem, satellite, telecommunication channels, session key, radio, broadcast channels, secret keys, ciphertext |
42 | Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann 0001, Fabian Werner |
Algebraic Attack on the MQQ Public Key Cryptosystem. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
MQQ public key cryptosystem, MutantXL algorithm, F4 algorithm, Algebraic Cryptanalysis |
42 | Tomohiro Shintani, Ryuichi Sakai |
Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
knapsack public key cryptosystem, cryptanalysis, lattice, shortest vector problem |
42 | Eun-Jun Yoon, Kee-Young Yoo |
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Security, Mobile network, Impersonation attack, Identity-based cryptosystem, User identification |
42 | Toru Akishita, Tsuyoshi Takagi |
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem |
42 | S. C. Samuel, D. Gnanaraj Thomas, P. J. Abisha, K. G. Subramanian 0001 |
Tree Replacement and Public Key Cryptosystem. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
tree replacement system, Church-Rosser tree replacement system, public key cryptosystem (PKC), word problem |
42 | Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park |
New Public-Key Cryptosystem Using Braid Groups. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem |
39 | Jintai Ding, Dieter Schmidt |
Cryptanalysis of HFEv and Internal Perturbation of HFE. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials |
37 | Dima Grigoriev, Ilia N. Ponomarenko |
Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Homomorphic cryptosystem, Free product of groups, Encrypting boolean circuits |
37 | Raphael Overbeck |
Statistical Decoding Revisited. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
general decoding, public key cryptography, coding theory, McEliece Cryptosystem, code based cryptography |
37 | Miklós Ajtai |
Representing hard lattices with O(n log n) bits. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
algorithm, lattice, public-key cryptosystem |
37 | P. J. Abisha, D. Gnanaraj Thomas, K. G. Subramanian 0001 |
Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Finitely Presented Groups, Free Partially Commutative Monoids, Thue Systems, Public Key Cryptosystem, Word Problem, Zero Knowledge Protocol |
36 | Abdulhadi Shoufan, Thorsten Wink, H. Gregor Molter, Sorin A. Huss, Falko Strenzke |
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. |
ASAP |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Mingyuan Yu, Xianping Huang, Li Jiang, Ronghua Liang |
Combined Public Key Cryptosystem Based on Conic Curves over the Ring Zn. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin |
An improvement of an efficient user identification scheme based on ID-based cryptosystem. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Abhishek Nagar, Santanu Chaudhury |
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme. |
ICPR (4) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Louis Dupont, Sébastien Roy 0002, Jean-Yves Chouinard |
A FPGA implementation of an elliptic curve cryptosystem. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Jin-Hua Hong, Bin-Yan Tsai |
A Fast Bit-Interleaving RSA Cryptosystem Based on Radix-4 Cellular-Array Modular Multiplier. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Cédric Faure, Pierre Loidreau |
A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials. |
WCC |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Michael Coglianese, Bok-Min Goi |
MaTRU: A New NTRU-Based Cryptosystem. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
lattice attacks, partial polynomial evaluation, Public key cryptosystems, NTRU, lattice based cryptography |
36 | Xinxin Fan, Yumin Wang |
Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung |
The dual receiver cryptosystem and its applications. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
useful secure computation, digital signature, elliptic curves, public key, key escrow, puzzles, pairing-based cryptography |
36 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
36 | Ivan Damgård, Mads Jurik |
A Length-Flexible Threshold Cryptosystem with Applications. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
length-flexible, length-invariant, group decryption, self-tallying, perfect ballot secrecy, election, mix-net |
36 | Maneli Noorkami, Faramarz Fekri |
An Efficient Finite-Field Convolution to Enhance the Performance of the Wavelet Cryptosystem on Handheld Devices. |
ITCC |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Stefan Lucks |
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri |
Cellular Automata Based Cryptosystem (CAC). |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Pierre Loidreau |
Strengthening McEliece Cryptosystem. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Tatsuaki Okamoto, Shigenori Uchiyama |
Security of an Identity-Based Cryptosystem and the Related Reductions. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Yeow Meng Chee, Antoine Joux, Jacques Stern |
The Cryptanalysis of a New Public-Key Cryptosystem Based on Modular Knapsacks. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
36 | Harald Niederreiter |
A Public-Key Cryptosystem based on Shift Register Sequences. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
36 | Neal R. Wagner, Marianne R. Magyarik |
A Public Key Cryptosystem Based on the Word Problem. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
35 | Yan Zhu 0010, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang |
Cryptographic role-based security mechanisms based on role-key hierarchy. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
role-based cryptosystem, role-key hierarchy, access control, pairing-based cryptosystem |
35 | Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii |
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
piece in hand concept, perturbation vector, public key cryptosystem, multivariate polynomial, multivariate public key cryptosystem |
35 | Young-Soo Kim, Sung-Ja Choi, Gang-Soo Lee, Geuk Lee |
Entity Based Message Authentication System. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
entity based cryptosystem, security, authentication, agent, public key cryptosystem |
35 | Thierry P. Berger, Pierre Loidreau |
How to Mask the Structure of Codes for a Cryptographic Use. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
Niederreiter cryptosystem, GPT cryptosystem, Gabidulin codes, Subcodes, Reed-solomon codes |
35 | Kouichi Sakurai, Hiroki Shizuya |
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Computational number theory, Computational number theory, Securi, Security, Randomness, Randomness, Public-key cryptography, Public-key cryptography, Elliptic curves, Elliptic curves, Key exchange, Key exchange, Discrete logarithm, Discrete logarithm, Key words, Cryptosystem, Cryptosystem |
34 | Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang |
A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem |
34 | Yu-Fang Chung, Tzer-Shyong Chen, Yu-Ting Chen, Chiu-Chan Lee, Szu-Wen Wang |
An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
English auction protocol, Mobile agent, anonymity, elliptic curve cryptosystem, public verifiability |
34 | Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters |
Attacking and Defending the McEliece Cryptosystem. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
Stern attack, minimal weight code word, list decoding binary Goppa codes, security analysis, McEliece cryptosystem |
34 | Bhaskar Biswas, Nicolas Sendrier |
McEliece Cryptosystem Implementation: Theory and Practice. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
McEliece encryption scheme, cryptographic implementation, public-key cryptosystem, code-based cryptography |
34 | Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner |
Cryptanalysis of the TRMC-4 Public Key Cryptosystem. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
TRMC, linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
34 | Daewan Han, Myung-Hwan Kim, Yongjin Yeom |
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack |
34 | Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
proxy cryptosystem, certificate-based encryption (CBE), pairing |
34 | Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 |
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
double trapdoor decryption mechanism, privacy, public key cryptosystem, semantic security |
34 | Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung |
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
(t, n) threshold signature, Authenticated Encryption Scheme, Message Linkage, Elliptic Curve Cryptosystem, Division of labor |
34 | Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin |
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
threshold proxy signature, RSA cryptosystem, Lagrange interpolating polynomial |
34 | Guang Gong, Lein Harn, Huapeng Wu |
The GH Public-Key Cryptosystem. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
third-order linear feedback shift register sequences over finite fields, digital signature, Public-key cryptosystem |
31 | Zhiguo Wan, Kui Ren 0001, Wenjing Lou, Bart Preneel |
Anonymous ID-Based Group Key Agreement for Wireless Networks. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Aggelos Kiayias, Moti Yung |
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. |
Des. Codes Cryptogr. |
2007 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
31 | Ki Hyoung Ko, Jang-Won Lee, Tony Thomas |
Towards generating secure keys for braid cryptography. |
Des. Codes Cryptogr. |
2007 |
DBLP DOI BibTeX RDF |
20F36, 20F10, AMS Classifications 94A60 |
31 | Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang |
t-Out-of-n String/Bit Oblivious Transfers Revisited. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Aggelos Kiayias, Moti Yung |
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2597 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|