|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25 occurrences of 19 keywords
|
|
|
Results
Found 26 publication records. Showing 26 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
64 | Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang |
Universally Composable Key-Evolving Signature. |
CISIM |
2007 |
DBLP DOI BibTeX RDF |
Ideal functionality, EUF-ACMA, Key-evolving, Digital signature, Forward-security, Universally composable |
61 | Cheng-Fen Lu, Shiuh-Pyng Winston Shieh |
Secure Key-Evolving Protocols for Discrete Logarithm Schemes. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
Key-Evolving, Backward-Secrecy, Key Management, Forward-Secrecy |
57 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
Robust Key-Evolving Public Key Encryption Schemes. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Tal Malkin, Satoshi Obana, Moti Yung |
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Yuefei Zhu, Dan Xu |
An Efficient Key-Evolving Signature Scheme Based on Pairing. |
FTDCS |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Moti Yung |
How to Guard the Guards Themselves. |
FCT |
2009 |
DBLP DOI BibTeX RDF |
Key Evolving Cryptosystems, Proactive Cryptosystems, Public Key cryptography, Attacks, Leakage, Countermeasures, Physical Security, Threshold cryptosystems, Cryptographic Keys |
19 | Mohammad Sadeq Dousti, Rasool Jalili |
FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. |
Adv. Math. Commun. |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Sadeq Dousti, Rasool Jalili |
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
19 | Cheng-Fen Lu, Shiuhpyng Shieh |
Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem. |
J. Inf. Sci. Eng. |
2004 |
DBLP BibTeX RDF |
|
19 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
Robust key-evolving public key encryption schemes. |
IACR Cryptol. ePrint Arch. |
2001 |
DBLP BibTeX RDF |
|
17 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Key Evolution Systems in Untrusted Update Environments. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Hanshu Hong, Xiaokang Zhou, Bing Hu, Zhixin Sun |
A Ciphertext Policy Attribute Based Signcryption Scheme with Secure and Flexible Key Evolving. |
ISPA/BDCloud/SocialCom/SustainCom |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Tassos Dimitriou |
Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags. |
Ad Hoc Networks |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Tao Xiang 0001, Xiaoguo Li, Fei Chen 0003, Yi Mu 0001 |
Bilateral-secure Signature by Key Evolving. |
AsiaCCS |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Cheng-Chi Lee, Chung-Lun Cheng, Yan-Ming Lai, Chun-Ta Li |
Cryptanalysis of Dimitriou's Key Evolving RFID Systems. |
ICNCC |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Yinghui Zhang 0002, Xiaofeng Chen 0001, Hui Li 0006 |
Key-Evolving Hierarchical ID-Based Signcryption. |
Comput. J. |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Jin Zhou, TingMao Chang, YaJuan Zhang, Yuefei Zhu |
Universally Composable Key-evolving Signature. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
14 | Matthew K. Franklin |
A survey of key evolving cryptosystems. |
Int. J. Secur. Networks |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Cheng-Fen Lu, Shiuhpyng Shieh |
Efficient Key-Evolving Protocol for the GQ Signature. |
J. Inf. Sci. Eng. |
2004 |
DBLP BibTeX RDF |
|
14 | Tal Malkin, Satoshi Obana, Moti Yung |
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
14 | Gene Itkis, Peng Xie |
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
14 | Gene Itkis, Peng Xie |
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Duc-Liem Vo, Kwangjo Kim |
Yet Another Forward Secure Signature from Bilinear Pairings. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
key evolution, pairings, Forward security, key exposure |
8 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Efficient Intrusion-Resilient Signatures Without Random Oracles. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Intrusion-resilience, signatures, standard model, pairings |
8 | Benoît Libert, Jean-Jacques Quisquater |
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
PKIs, pairings, identity based cryptography |
6 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
digital signature, provable security, forward security, key exposure |
Displaying result #1 - #26 of 26 (100 per page; Change: )
|
|