|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | Pooya Farshim, Bogdan Warinschi |
Certified Encryption Revisited. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption |
75 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng |
Conditional Proxy Broadcast Re-Encryption. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption |
69 | Yang Cui 0001, Kirill Morozov, Kazukuni Kobara, Hideki Imai |
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. |
AAECC |
2009 |
DBLP DOI BibTeX RDF |
Deterministic encryption, code-based encryption, database security, hybrid encryption, searchable encryption |
68 | Walid Bagga, Refik Molva, Stefano Crosta |
Policy-based encryption schemes from bilinear pairings. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
68 | Shiguo Lian |
Quasi-commutative watermarking and encryption for secure media content distribution. |
Multim. Tools Appl. |
2009 |
DBLP DOI BibTeX RDF |
Commutative watermarking and encryption (CWE), Watermarking, Digital rights management (DRM), Video encryption |
67 | Phillip Rogaway, Don Coppersmith |
A Software-Optimized Encryption Algorithm. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Cryptography, Cryptography, Stream cipher, Stream cipher, Encryption, Encryption, Key words |
65 | Phillip Rogaway |
Nonce-Based Symmetric Encryption. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
Initialization vector, provable security, modes of operation, symmetric encryption, nonces |
63 | Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 |
An Implementation and Evaluation of Online Disk Encryption for Windows Systems. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security |
60 | Xu An Wang 0001, Xiaoyuan Yang 0002 |
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
60 | Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya |
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
ID-Based encryption, broadcast encryption, forward security |
59 | Jonathan Katz, Arkady Yerukhimovich |
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
58 | Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki |
A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems |
58 | Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu |
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. |
CASES |
2003 |
DBLP DOI BibTeX RDF |
security, sensor networks, embedded systems, encryption |
58 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
56 | Jonathan Katz, Moti Yung |
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
55 | Chik How Tan |
Public-Key Encryption from ID-Based Encryption Without One-Time Signature. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear maps |
55 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption |
55 | Toshihiko Matsuo |
Proxy Re-encryption Systems for Identity-Based Encryption. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
proxy re-encryption system, public key encryption, identity-based encryption |
54 | Ribao Wei, Dingfeng Ye |
Delegate predicate encryption and its application to anonymous authentication. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
predicate encryption, anonymous authentication |
54 | Shay Gueron |
Intel's New AES Instructions for Enhanced Performance and Security. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
new instructions set, computer architecture, Advanced Encryption Standard |
53 | Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi |
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Cost/performance, Security, Simulation, Optimization, Algorithms, Dynamic programming, Wireless communication, Emerging technologies, Wireless systems, Data encryption, Data Encryption, Security and Privacy Protection, integrity and protection |
53 | Giovanni Di Crescenzo, Vishal Saraswat |
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption |
53 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Timed-Release and Key-Insulated Public Key Encryption. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
timed-release, key-insulated encryption, authenticated encryption |
53 | Dan Boneh, Jonathan Katz |
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Public-key encryption, Identity-based encryption, Chosen-ciphertext security |
53 | Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette |
Authenticated On-Line Encryption. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks |
53 | Mihir Bellare, Alexandra Boldyreva, Jessica Staddon |
Randomness Re-use in Multi-recipient Encryption Schemeas. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Encryption, provable security, randomness, broadcast encryption |
53 | Yasumasa Nakai, Takahiro Matsuda 0002, Wataru Kitada, Kanta Matsuura |
A Generic Construction of Timed-Release Encryption with Pre-open Capability. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
pre-open capability, public key encryption, identity-based encryption, timed-release encryption, generic construction |
53 | Ivan Damgård, Lars R. Knudsen |
Two-Key Triple Encryption. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
The Data Encryption Standard, The Data Encryption Standard, Block ciphers, Block ciphers, Pseudorandom generators, Pseudorandom generators, Key words, Multiple encryption, Multiple encryption |
52 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
51 | Yuliang Zheng 0001 |
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption |
49 | Osamu Watanabe 0002, Akiko Nakazaki, Hitoshi Kiya |
A scalable encryption method allowing backward compatibility with JPEG2000 images. |
ISCAS (6) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen |
Authenticated Broadcast Encryption Scheme. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, broadcast encryption, bilinear map |
49 | Dragos Trinca |
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption |
49 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Universally Anonymizable Public-Key Encryption. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy |
49 | Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu |
Analyzing and modeling encryption overhead for sensor network nodes. |
Wireless Sensor Networks and Applications |
2003 |
DBLP DOI BibTeX RDF |
encryption overhead, model, sensor networks, embedded systems, analysis |
49 | Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto |
Multi-recipient Public-Key Encryption from Simulators in Security Proofs. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption |
49 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Provably Secure Timed-Release Public Key Encryption. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
key-insulated encryption, timed-release, authenticated encryption |
49 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity-based encryption, Random-oracle model, Foundations, Searchable encryption |
49 | Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa |
Tag-KEM/DEM: A New Framework for Hybrid Encryption. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption |
49 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
49 | Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
Identity-Based Encryption, Proxy re-encryption, Personal Health Record |
49 | Shih-Ching Ou, Hung-Yuan Chung, Wen-Tsai Sung |
Improving the compression and encryption of images using FPGA-based cryptosystems. |
Multim. Tools Appl. |
2006 |
DBLP DOI BibTeX RDF |
Significance-linked connected component analysis (SLCCA), Image compression encryption scheme (ICES), Advance encryption standard (AES), Discrete wavelet transform (DWT) |
49 | George Danezis |
Breaking Four Mix-Related Schemes Based on Universal Re-encryption. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Universal re-encryption, re-encryption mix networks, traffic analysis, anonymous communications |
49 | Dominik Engel, Andreas Uhl |
Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
lightweight encryption, parameterized biorthogonal wavelet lifting, transparent encryption, JPEG 2000 |
49 | Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters |
Attribute-based encryption for fine-grained access control of encrypted data. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption |
49 | Jeremy Epstein, Tim Williams |
Using Fortezza For Transparent File Encryption. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development |
47 | Josef Pieprzyk, David Pointcheval |
Josef Pieprzyk, David Pointcheval. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, parallelization, Signcryption |
47 | Rosario Gennaro, Shai Halevi |
More on Key Wrapping. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Deterministic Encryption, Key Wrapping, Modes of Operation, Symmetric Encryption |
46 | Ronald L. Rivest |
All-or-Nothing Encryption and the Package Transform. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
46 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
44 | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Bounded CCA2-Secure Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Thomas Stütz, Andreas Uhl |
Transparent Image Encryption Using Progressive JPEG. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Ran Canetti, Shai Halevi, Jonathan Katz |
Adaptively-Secure, Non-interactive Public-Key Encryption. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yevgeniy Dodis, Jonathan Katz |
Chosen-Ciphertext Security of Multiple Encryption. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Soichi Furuya, Kouichi Sakurai |
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
real-or-random security, Stream cipher, provable security, message authentication, mode of operation |
44 | Thomas Kunkelmann, Uwe Horn |
Video Encryption Based on Data Partitioning and Scalable Coding - A Comparison. |
IDMS |
1998 |
DBLP DOI BibTeX RDF |
|
44 | Peter Gazi, Ueli M. Maurer |
Cascade Encryption Revisited. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cascade encryption, random system, indistinguishability, ideal cipher model |
44 | Alexander W. Dent |
A survey of certificateless encryption schemes and security models. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Cryptography, Public-key cryptography, Certificateless cryptography, Certificateless encryption |
44 | Shiguo Lian, Jinsheng Sun, Guangjie Liu, Zhiquan Wang |
Efficient video encryption scheme based on advanced video coding. |
Multim. Tools Appl. |
2008 |
DBLP DOI BibTeX RDF |
Multimedia content protection, Digital right management, AVC, Video encryption |
44 | Saurabh Panjwani |
Tackling Adaptive Corruptions in Multicast Encryption Protocols. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
Adaptive Corruptions, Selective Decryption, Multicast, Encryption |
44 | Yibo Fan, Jidong Wang, Takeshi Ikenaga, Yukiyasu Tsunoo, Satoshi Goto |
A New Video Encryption Scheme for H.264/AVC. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
Video, Encryption, H.264/AVC |
44 | Giuseppe Ateniese, Kevin Fu, Matthew Green 0001, Susan Hohenberger |
Improved proxy re-encryption schemes with applications to secure distributed storage. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
double decryption, key translation, bilinear maps, Proxy re-encryption |
44 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
44 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
44 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
compact encryption/decryption implementation, FPGA, Cryptography, AES, DES |
44 | Rosario Gennaro, Yael Gertner, Jonathan Katz |
Lower bounds on the efficiency of encryption and digital signature schemes. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
lower bounds, digital signatures, encryption, black-box |
44 | Eiichiro Fujisaki, Tatsuaki Okamoto |
Secure Integration of Asymmetric and Symmetric Encryption Schemes. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
Adaptive chosen-ciphertext attack, Random oracle model, Indistinguishability, Hybrid encryption |
44 | Oliver Jung, Christoph Ruland |
Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. |
CHES |
1999 |
DBLP DOI BibTeX RDF |
SDH/SONET, Cryptography, Encryption, Confidentiality, Modes of Operation, Broadband Networks, Self-Synchronization |
44 | Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Practical ID-based encryption for wireless sensor network. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
online/offline encryption, identity-based encryption, wireless sensor network security |
44 | Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa |
Encryption over Semi-trusted Database. |
DASFAA Workshops |
2009 |
DBLP DOI BibTeX RDF |
Database cryptography, server-based encryption, client-based encryption, semi-trusted database, mixed cryptography |
44 | Kristen Dietiker |
PGP whole disk encryption: blazing trails in IT security at UW Medicine. |
SIGUCCS |
2008 |
DBLP DOI BibTeX RDF |
protected health information, whole disk encryption, encryption, compliance, Macintosh, software deployment, HIPAA, PGP, Windows XP |
44 | Mihir Bellare, Adriana Palacio |
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Key update, Encryption, Identity-based encryption, Key exposure |
44 | David Galindo |
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
tag-based encryption, identity-based encryption, Foundations |
44 | Ulrich Kühn 0001 |
Side-Channel Attacks on Textbook RSA and ElGamal Encryption. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
RSA encryption, Side-channel attack, ElGamal encryption |
44 | Markus Jakobsson |
On Quorum Controlled Asymmetric Proxy Re-encryption. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
asymmetric proxy re-encryption, translation certificate, El Gamal encryption, quorum control, privacy, robustness |
44 | Dominik Engel, Thomas Stütz, Andreas Uhl |
Format-compliant jpeg2000 encryption with combined packet header and packet body protection. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
format-compliant encryption, packet body encryption, packet header encryption, JPEG2000 |
44 | Jonathan K. Millen, Hai-Ping Ko |
Narrowing terminates for encryption. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
term replacement rules, reduction properties, symbolic encryption operations, narrowing steps, infinite sequence, popular abstract encryption operators, terminating algorithm, cryptography, encryption, access protocols, protocol analysis |
43 | Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic |
MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Adam L. Young, Moti Yung |
Hiding Information Hiding. |
Information Hiding |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
42 | Yang Ou, Chul Sur, Kyung Hyune Rhee |
A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams. |
MMM |
2009 |
DBLP DOI BibTeX RDF |
Joint Compression and Encryption, Packet Header Encryption, JPEG2000, Arithmetic Coding |
41 | Jiang Delei, Bai Sen, Dong Wenming |
An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-Filter. |
CSSE (1) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda |
Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Adam L. Young, Moti Yung |
Sliding Encryption: A Cryptographic Tool for Mobile Agents. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
41 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Practical Symmetric On-Line Encryption. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversary, Symmetric encryption, chosen plaintext attacks |
41 | Sherman S. M. Chow, Volker Roth 0002, Eleanor Gilbert Rieffel |
General Certificateless Encryption and Timed-Release Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
Security-mediated certificateless encryption, standard model, timed-release encryption |
40 | Hung-Min Sun, Muh-Chyi Leu |
A Real-Time Selective Video Encryption Using Context-Key Control. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Haifeng Qian, Yuan Zhou 0008, Zhibin Li 0005, Zecheng Wang, Bing Zhang 0008 |
Efficient public key encryption with smallest ciphertext expansion from factoring. |
Des. Codes Cryptogr. |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
40 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Online/Offline Encryption. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Tingjian Ge, Stanley B. Zdonik |
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Min-Sung Koh, Esteban Rodriguez-Marek, Claudio Talarico |
A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen-Plaintext Attacks. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Kwangjin Hong, Keechul Jung |
Partial Encryption of Digital Contents Using Face Detection Algorithm. |
PRICAI |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Chung-Ping Wu, C.-C. Jay Kuo |
Design of integrated multimedia compression and encryption systems. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Ulf T. Mattsson |
A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases: Protection against External and Internal Attacks on Databases. |
CEC |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard |
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Andris Ambainis, Adam D. Smith |
Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption. |
APPROX-RANDOM |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Antonio Servetti, Juan Carlos De Martin |
Perception-based partial encryption of compressed speech. |
IEEE Trans. Speech Audio Process. |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Craig Gentry |
Fully homomorphic encryption using ideal lattices. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
fully homomorphic encryption |
39 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Confidentiality. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
private-key predicate encryption, key confidentiality |
Displaying result #1 - #100 of 21739 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|