|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1021 occurrences of 506 keywords
|
|
|
Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 |
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
double trapdoor decryption mechanism, privacy, public key cryptosystem, semantic security |
83 | Weichi Yu, Dake He, Shixiong Zhu |
Study on NTRU Decryption Failures. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
Decryption Failure, Compensating Algorithm, NTRU |
82 | Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen |
An Efficient Decryption Method for RSA Cryptosystem. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Yang Cui 0001, Kazukuni Kobara, Hideki Imai |
On Achieving Chosen Ciphertext Security with Decryption Errors. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi |
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm |
59 | Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi |
NICE - New Ideal Coset Encryption. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
fast decryption, quadratic order, smart card implementation, public-key cryptosystem |
58 | Peter Phuong Vo, Chau Maggie Vo |
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption using flipping, shifting operations, mapping |
58 | Palash Sarkar 0001 |
HEAD: Hybrid Encryption with Delegated Decryption Capability. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
DHIES, delegated decryption, public key encryption |
58 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
compact encryption/decryption implementation, FPGA, Cryptography, AES, DES |
58 | Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi |
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow |
58 | Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara |
A Timed-Release Key Management Scheme for Backward Recovery. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Cynthia Dwork, Moni Naor, Omer Reingold |
Immunizing Encryption Schemes from Decryption Errors. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Yi Mu 0001, Vijay Varadharajan, Khanh Quoc Nguyen |
Delegated Decryption. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
51 | Sherman S. M. Chow |
Verifiable Pairing and Its Applications. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
verifiable pairing, threshold decryption, cryptographic protocols, Bilinear pairing, signcryption, undeniable signature, ID-based cryptography, cryptographic primitives, ID-based signature, exact security |
51 | Tsuyoshi Takagi |
Fast RSA-Type Cryptosystem Modulo pkq. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Quisquater-Couvreur method, fast decryption, RSA cryptosystem, factoring algorithm |
50 | Guilhem Castagnos, Fabien Laguillaumie |
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography |
50 | Craig Gentry |
Fully homomorphic encryption using ideal lattices. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
fully homomorphic encryption |
50 | Nicolas Gama, Phong Q. Nguyen |
New Chosen-Ciphertext Attacks on NTRU. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park |
Fair Threshold Decryption with Semi-Trusted Third Parties. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Qiu-Hua Lin, Fuliang Yin, Hualou Liang |
A Fast Decryption Algorithm for BSS-Based Image Encryption. |
ISNN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Haeryong Park, Kilsoo Chun |
Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Decryption. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
49 | Jun Furukawa 0001 |
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
Analyzing network traffic to detect self-decrypting exploit code. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
exploit code, static analysis, emulation, detection, polymorphic, decryption |
43 | Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee |
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Proof of equality of discrete logarithms (PEQDL), Threshold decryption, Threshold ElGamal, Threshold RSA, Batch verification |
43 | Ivan Damgård, Mads Jurik |
A Length-Flexible Threshold Cryptosystem with Applications. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
length-flexible, length-invariant, group decryption, self-tallying, perfect ballot secrecy, election, mix-net |
43 | Byoungcheon Lee, Kwangjo Kim |
Secure Matchmaking Protocol. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
proving the equality or inequality of two discrete logarithms, finding collisions without decryption, public commitment, matchmaking, secure multiparty computation, proof of knowledge |
43 | Markus Jakobsson |
A Practical Mix. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
privacy, robustness, error detection, Mix-network, decryption |
42 | Xue-Guang Wang, Zhen-Chuan Chai |
A Provable Security Scheme of ID-Based Threshold Decryption. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Threshold decryption, provable security, ID based cryptography |
42 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Publicly Verifiable Privacy-Preserving Group Decryption. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography |
42 | Feng Bao 0001 |
Introducing Decryption Authority into PKI. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
decryption authority, DA, sensitive messages, asymmetric encryption, Internet, electronic commerce, electronic commerce, digital signature, public key cryptography, public key cryptography, PKI, message authentication, Internet security, telecommunication security, online transactions |
41 | Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy |
Compiler-Assisted Memory Encryption for Embedded Processors. |
Trans. High Perform. Embed. Archit. Compil. |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
41 | Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy |
Compiler-Assisted Memory Encryption for Embedded Processors. |
HiPEAC |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai |
Parallel Key-Insulated Public Key Encryption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Detlef Hühnlein |
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
40 | Yi-Ru Liu, Wen-Guey Tzeng |
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
Broadcast encryption, collusion, polynomial interpolation |
40 | Zhang Dinghui, Gu Qiujie, Pan Yonghua, Zhang Xinghua |
Discrete Chaotic Encryption and Decryption of Digital Images. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Chien-Pen Chuang, Tin-Ying Huang, Li-Chi Yeh |
Encryption and Decryption with Space Transformation for Bi-directional Association. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Fuchun Guo, Yi Mu 0001, Zhide Chen, Li Xu 0002 |
Multi-Identity Single-Key Decryption without Random Oracles. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
ID-based Systems, Encryption, Pairing |
40 | Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang |
Joint Fingerprint Embedding and Decryption for Video Distribution. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai |
Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2D Von Neumann cellular automata. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild |
Distributing the Encryption and Decryption of a Block Cipher. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
thereshold cryptography, block cipher, secret sharing, shared computation |
40 | John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee |
A Traitor Tracing Scheme Based on RSA for Fast Decryption. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Ciaran McIvor, Máire McLoone, John V. McCanny |
A high-speed, low latency RSA decryption silicon core. |
ISCAS (4) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte |
The Impact of Decryption Failures on the Security of NTRU Encryption. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption |
34 | G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha |
Performance Enhancement of CAST-128 Algorithm by modifying its function. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext |
34 | Jen-Chieh Lai, Chia-Hui Wang |
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. |
PSIVT |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD |
34 | Johann Großschädl |
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency |
34 | Eberhard von Faber, R. Hammelrath, F.-P. Heider |
The Secure Distribution of Digital Contents. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems |
33 | Joseph H. Silverman, William Whyte |
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Richard M. Dansereau, S. Jin, Rafik A. Goubran |
Reducing Packet Loss in CBC Secured VoIP using Interleaved Encryption. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague |
GBD Threshold Cryptography with an Application to RSA Key Recovery. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
33 | T. M. Barakat, I. I. Ismail, I. A. Ali, N. Abdrabouh |
Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networks. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Kyu B. Doh, Kyeongwha Kim, Jungho Ohn, Ting-C. Poon |
Information Security Based on Fourier Plane Random Phase Coding and Optical Scanning. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Kyu B. Doh, Kyeongwha Kim, Ting-C. Poon |
Computer Generated Holographic Image Processing for Information Security. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
33 | David A. Barr |
Copy Protection for High-Definition Baseband Video. |
ITCC |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata |
Stateful identity-based encryption scheme: faster encryption and decryption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
IBE, stateful encryption, cryptography, provable security, ROM |
32 | Charlie Obimbo, Behzad Salami 0002 |
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. |
J. Supercomput. |
2007 |
DBLP DOI BibTeX RDF |
Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations |
32 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. |
Trans. Data Hiding Multim. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Chameleon encryption, frame-proofness, stream cipher, fingerprinting, broadcast encryption, collusion resistance, spread-spectrum watermarking |
32 | Fouz Sattar, Muid Mufti |
On Modeling Post Decryption Error Processes in UMTS Air Interface. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
3G Security, Wireless Confidentiality, UMTS Encryption, Markov Modeling, Error probability |
32 | Cécile Delerablée, Pascal Paillier, David Pointcheval |
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Weidong Shi, Hsien-Hsin S. Lee |
Accelerating memory decryption and authentication with frequent value prediction. |
Conf. Computing Frontiers |
2007 |
DBLP DOI BibTeX RDF |
message authentication, value prediction, secure processors |
32 | Shengli Liu 0001, Kefei Chen, Weidong Qiu |
Identity-Based Threshold Decryption Revisited. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Chao-Shen Chen, Rong-Jian Chen |
Image Encryption and Decryption Using SCAN Methodology. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Peter Linder |
DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
31 | Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu |
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. |
SecureComm |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Kannan Karthik, Dimitrios Hatzinakos |
Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection. |
Int. J. Netw. Secur. |
2007 |
DBLP BibTeX RDF |
|
26 | Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee |
Collect and broadcast news in security. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
cipher text, plaintext, algorithm, encryption, decryption |
26 | Kun Peng, Colin Boyd, Ed Dawson |
Batch zero-knowledge proof and verification and its applications. |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Batch proof and verification of reencryption, batch proof and verification of decryption, mix network |
26 | Ayman Alfalou, Alain Loussert, Abdulsalam Alkholidi, Rami El Sawda |
System for Image Compression and Encryption by Spectrum Fusion in Order to Optimize Image Transmission. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Signal and Image Processing, Image Compres- sion/Decompression, Image Encryption/Decryption, Trans- mission, FFT, DCT |
26 | Deholo Nali, Carlisle M. Adams, Ali Miri |
Hierarchical time-based information release. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Time-Based access control, Constant-length ciphertext, Constant-time Decryption, Forward security, Hierarchical identity-Based encryption |
26 | Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 |
An Implementation and Evaluation of Online Disk Encryption for Windows Systems. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security |
26 | Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh |
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. |
ICPADS (2) |
2006 |
DBLP DOI BibTeX RDF |
ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow |
26 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, Authenticated encryption, security proofs |
26 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, authenticated encryption, security proofs, SSH |
26 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
26 | Markus Jakobsson, Ari Juels |
Addition of ElGamal Plaintexts. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
directed decryption, fast-track, repetition robustness, addition, elgamal |
26 | Kanji Hirabayashi |
A Method of Formal Verification of Cryptographic Circuits. |
J. Electron. Test. |
1998 |
DBLP DOI BibTeX RDF |
formal verification, encryption, decryption |
26 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi |
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system |
26 | George I. Davida, David L. Wells, John B. Kam |
A Database Encryption System with Subkeys. |
ACM Trans. Database Syst. |
1981 |
DBLP DOI BibTeX RDF |
subkeys, databases, encryption, data security, decryption |
25 | Shay Gueron |
Intel's New AES Instructions for Enhanced Performance and Security. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
new instructions set, computer architecture, Advanced Encryption Standard |
25 | Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng |
Conditional Proxy Broadcast Re-Encryption. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption |
25 | Petros Mol, Moti Yung |
Recovering NTRU Secret Key from Inversion Oracles. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis |
25 | Sherman S. M. Chow, Volker Roth 0002, Eleanor Gilbert Rieffel |
General Certificateless Encryption and Timed-Release Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Security-mediated certificateless encryption, standard model, timed-release encryption |
25 | MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin |
Symmetric-key cryptosystem with DNA technology. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
symmetric-key encryption, DNA cryptography, DNA computing |
25 | Ben Adida, Douglas Wikström |
How to Shuffle in Public. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Eun-Jun Yoon, Kee-Young Yoo |
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
Three-party, Authentication, Cryptography, Password, Key agreement, Token |
25 | Chih-Hsu Yen, Bing-Fei Wu |
Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
differential fault attacks, Advanced encryption standard, error control code, CRC |
25 | Peter Y. A. Ryan, Steve A. Schneider |
Prêt à Voter with Re-encryption Mixes. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Bin B. Zhu, Chun Yuan, Yidong Wang, Shipeng Li 0001 |
Scalable protection for MPEG-4 fine granularity scalability. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Ran Canetti, Shai Halevi, Jonathan Katz |
Adaptively-Secure, Non-interactive Public-Key Encryption. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Youngho Park 0004, Jung-Hwa Shin, Kyung Hyune Rhee |
Design of a Secure Digital Contents Delivery System in P2P Networks. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Escrow Service, Key Issuing, P2P, Contents Distribution |
25 | Frank K. Gürkaynak, Andreas Burg, Norbert Felber, Wolfgang Fichtner, D. Gasser, Franco Hug, Hubert Kaeslin |
A 2 Gb/s balanced AES crypto-chip implementation. |
ACM Great Lakes Symposium on VLSI |
2004 |
DBLP DOI BibTeX RDF |
AES, rijndael, ASIC implementation |
25 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES |
25 | Ulrich Kühn 0001 |
Side-Channel Attacks on Textbook RSA and ElGamal Encryption. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
RSA encryption, Side-channel attack, ElGamal encryption |
25 | Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater |
Cerebral Cryptography. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Koji Nakano, Kensuke Kawakami, Koji Shigemoto |
RSA encryption and decryption using the redundant number system on the FPGA. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1470 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|