The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Provably-secure (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-1990 (20) 1991-1995 (17) 1996-1997 (16) 1998 (17) 1999-2000 (28) 2001 (25) 2002 (33) 2003 (45) 2004 (62) 2005 (87) 2006 (101) 2007 (85) 2008 (80) 2009 (71) 2010 (28) 2011 (28) 2012 (41) 2013 (44) 2014 (48) 2015 (42) 2016 (59) 2017 (66) 2018 (70) 2019 (53) 2020 (49) 2021 (58) 2022 (59) 2023 (61) 2024 (16)
Publication types (Num. hits)
article(681) incollection(1) inproceedings(711) phdthesis(16)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 666 occurrences of 307 keywords

Results
Found 1409 publication records. Showing 1409 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
72Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, signcryption, Identity based cryptography
67Xiaoming Hu, Shangteng Huang A Provably Secure Blind Signature Scheme. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Polynomial reduction, Security arguments, Provably secure, Blind signature
58Emmanuel Prouff, Christophe Giraud 0001, Sébastien Aumônier Provably Secure S-Box Implementation Based on Fourier Transform. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box
58Tatsuaki Okamoto Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
57Huafei Zhu, Feng Bao 0001, Tieyan Li, Ying Qiu More on Shared-Scalar-Product Protocols. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Malicious model, shared-scalar-product protocol, provably secure
51Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Provably-secure time-bound hierarchical key assignment schemes. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, provable security, key assignment
51Shuhua Wu, Yuefei Zhu Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, key exchange, password authenticated, dynamic group
48Nicholas J. Hopper, Luis von Ahn, John Langford 0001 Provably Secure Steganography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Provably Secure Timed-Release Public Key Encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-insulated encryption, timed-release, authenticated encryption
48Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang Provably Secure and ID-Based Group Signature Scheme. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Birgit Pfitzmann, Matthias Schunter, Michael Waidner How to Break Another Provably Secure Payment System. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
44Mike Burmester, Breno de Medeiros, Rossana Motta Robust, anonymous RFID authentication with constant key-lookup. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure protocols, privacy, scalability, RFID, availability, unlinkability
44Yuichi Komano, Kazuo Ohta Taxonomic Consideration to OAEP Variants and Their Security. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SAEP, provably secure, reduction, Padding, OAEP
44Marc Joye, Jean-Jacques Quisquater, Moti Yung On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Richard Berger, René Peralta 0001, Tom Tedrick A Provably Secure Oblivious Transfer Protocol. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
41Shuhua Wu, Yuefei Zhu Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, Password, authenticated key exchange, cross-realm
41Yi Mu 0001, Willy Susilo, Huafei Zhu Compact sequential aggregate signatures. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA problem, communication, computer, provably secure, signatures
41Haifeng Qian, Zhenfu Cao A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, provably secure, random oracle model, proxy signature, identity-based signature
41Shaoquan Jiang Efficient Primitives from Exponentiation in Zp. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Huafei Zhu, Feng Bao 0001 Oblivious Keyword Search Protocols in the Public Database Model. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Weijia Wang, Lei Hu, Yong Li 0002 Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
39Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability
36Kazuhiko Minematsu, Yukiyasu Tsunoo Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Differentially-uniform permutation, MAC, Block cipher, AES
36Young-Seol Kim, Jik-Hyun Chang Provably Secure Proxy Blind Signature Scheme. Search on Bibsonomy ISM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm
36David Pointcheval, Jacques Stern Provably Secure Blind Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
35Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow Secure Hierarchical Identity Based Signature and Its Application. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hierarchical identity-based signature, forward-secure signature, bilinear pairings
34Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong Generic Security-Amplifying Methods of Ordinary Digital Signatures. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability
34Jin Li 0002, Yuen-Yan Chan, Yanming Wang A Generic Construction of Secure Signatures Without Random Oracles. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weak Chosen Message Attack, Signature, Standard Model
32María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Johannes Blömer, Jorge Guajardo, Volker Krummel Provably Secure Masking of AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Jinho Kim, Kwangjo Kim, Chulsoo Lee An Efficient and Provably Secure Threshold Blind Signature. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Alfredo De Santis, Moti Yung On the Design of Provably Secure Cryptographic Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
32Cas J. F. Cremers Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Session- state reveal, Ephemeral Key reveal, Provably-secure, Authenticated Key Exchange
32Shuhua Wu, Yuefei Zhu Efficient Hybrid Password-Based Authenticated Group Key Exchange. Search on Bibsonomy APWeb/WAIM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provably secure, password authenticated, group key exchange
32Khaled Ouafi, Raphael C.-W. Phan Privacy of Recent RFID Authentication Protocols. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, RFID, provably secure, authentication protocols, untraceability
32Markku-Juhani Olavi Saarinen Linearization Attacks Against Syndrome Based Hashes. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack
32Chik How Tan A secure signature scheme. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF strong RSA, cryptography, digital signature, factorization
29Claude Castelluccia, Aldar C.-F. Chan, Einar Mykletun, Gene Tsudik Efficient and provably secure aggregation of encrypted data in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secure data aggregation, wireless sensor networks, privacy, Authentication, cryptography, stream ciphers, pseudorandom functions
29Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis A Provably Secure One-Pass Two-Party Key Establishment Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation
29Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro Provably Secure Electronic Cash Based on Blind Multisignature Schemes. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Blind multisignature, provable security, random oracle model, electronic cash
29Sanggon Lee, Yvonne Hitchcock, Youngho Park 0005, Sang-Jae Moon Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tripartite key agreement, bilinear Diffie-Hellman problem, Joux’s protocol, provable security, password-based authentication
29Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock On Session Key Construction in Provably-Secure Key Establishment Protocols. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Yuliang Zheng 0001, Yongge Wang Efficient and provably secure ciphers for storage device block level encryption. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF storage device encryption, hash function, symmetric cipher
29Ahto Buldas, Märt Saarepera On Provably Secure Time-Stamping Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Shouhuai Xu, Ravi S. Sandhu Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Victor Boyko, Philip D. MacKenzie, Sarvar Patel Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes
29Eiichiro Fujisaki, Tatsuaki Okamoto A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Stefan Lucks A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Yan Zong Ding, Michael O. Rabin Hyper-Encryption and Everlasting Security. Search on Bibsonomy STACS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Jonathan Katz, Moti Yung Scalable Protocols for Authenticated Group Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Jin Li 0002, Fangguo Zhang, Yanming Wang A Strong Identity Based Key-Insulated Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-insulated cryptosystem, Bilinear pairings, ID-based
28Jonathan Katz, Moti Yung Scalable Protocols for Authenticated Group Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Ivan Damgård, Jesper Buus Nielsen Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Jianhong Zhang, Hua Chen, Qin Geng Efficient and Provably Secure Self-certified Signature Scheme. Search on Bibsonomy AMT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Léonard Dallot, Damien Vergnaud Provably Secure Code-Based Threshold Ring Signatures. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Yassin M. Hasan From stream to provably secure block ciphers based on pseudorandom matrix transformations. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Emmanuel Bresson, Olivier Chevassut, David Pointcheval Provably secure authenticated group Diffie-Hellman key exchange. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptography, Diffie-Hellman, Group Key Exchange
26Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Efficient Provably-Secure Hierarchical Key Assignment Schemes. Search on Bibsonomy MFCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci New constructions for provably-secure time-bound hierarchical key assignment schemes. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, provable security, key assignment
26Lei Zhang 0009, Futai Zhang, Wei Wu 0001 A Provably Secure Ring Signature Scheme in Certificateless Cryptography. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography
26Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval Provably secure password-based authentication in TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted key exchange, password authentication, TLS
26Anna Lysyanskaya, Mira Meyerovich Provably Secure Steganography with Imperfect Sampling. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital signatures, Markov processes, steganography, Information hiding
26Shanshan Duan, Zhenfu Cao Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Martin Boesgaard, Thomas Christensen, Erik Zenner Badger - A Fast and Provably Secure MAC. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tree, MAC, universal hash, pseudo-random generator
26Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang Practical and Provably-Secure Multicasting over High-Delay Networks. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26David A. Wagner 0001 Cryptanalysis of a provably secure CRT-RSA algorithm. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, chinese remainder theorem, fault attacks
26Lan Nguyen, Reihaneh Safavi-Naini Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar A Provably Secure Elliptic Curve Scheme with Fast Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Ratna Dutta, Rana Barua, Palash Sarkar 0001 Provably Secure Authenticated Tree Based Group Key Agreement. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF provable security, bilinear pairing, group key agreement, authenticated key agreement
26Nikolay P. Varnovsky, Vladimir A. Zakharov On the Possibility of Provably Secure Obfuscating Programs. Search on Bibsonomy Ershov Memorial Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hard-core predicate, security, program transformation, mutual information, obfuscation, one-way function
26Mario Di Raimondo, Rosario Gennaro Provably Secure Threshold Password-Authenticated Key Exchange. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Greg Maitland, Colin Boyd A Provably Secure Restrictive Partially Blind Signature Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Chan H. Lee, Xiaotie Deng, Huafei Zhu An Identification Scheme Provably Secure against Reset Attack. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Wakaha Ogata, Kaoru Kurosawa Provably Secure Metering Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Ronald Cramer, Victor Shoup A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Shai Halevi, Silvio Micali Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
26Victor Shoup On Fast and Provably Secure Message Authentication Based on Universal Hashing. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
26Ueli M. Maurer A Provably-Secure Strongly-Randomized Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
26Shinji Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii Provably Secure Key-Updating Schemes in Identity-Based Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
26Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
25Yair Frankel, Yiannis Tsiounis, Moti Yung Fair Off-Line e-cash Made Easy. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo Towards a Theory of White-Box Security. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Raphael C.-W. Phan, Serge Vaudenay Security-Preserving Asymmetric Protocol Encapsulation. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee 0001 One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Kaoru Kurosawa, Katja Schmidt-Samoa New Online/Offline Signature Schemes Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption
25Kaoru Kurosawa, Swee-Huay Heng Identity-Based Identification Without Random Oracles. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ID-based cryptography, identification scheme
25Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong Pairing-Based Provable Blind Signature Scheme Without Random Oracles. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Alexander W. Dent A Designer's Guide to KEMs. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Xavier Boyen, Qixiang Mei, Brent Waters Direct chosen ciphertext security from identity-based techniques. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identity-based encryption, chosen ciphertext security
25Luis von Ahn, Nicholas J. Hopper, John Langford 0001 Covert two-party computation. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF covert computation, fair two-party computation, two-party computation, steganography
25Chiu-Yuen Koo Broadcast in radio networks tolerating byzantine adversarial behavior. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fault tolerance, broadcast, radio networks
22Xing-Lan Zhang Authenticated Key Exchange Protocol in One-Round. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity
22Xavier Boyen, Brent Waters Compact Group Signatures Without Random Oracles. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Michael Backes 0001, Markus Dürmuth A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1409 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license