The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Secret-key (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1988 (15) 1989-1990 (16) 1991-1993 (24) 1994-1995 (15) 1996-1997 (28) 1998 (17) 1999 (20) 2000 (25) 2001 (39) 2002 (43) 2003 (65) 2004 (88) 2005 (95) 2006 (108) 2007 (117) 2008 (134) 2009 (98) 2010 (54) 2011 (44) 2012 (43) 2013 (46) 2014 (69) 2015 (64) 2016 (75) 2017 (79) 2018 (66) 2019 (77) 2020 (62) 2021 (76) 2022 (85) 2023 (73) 2024 (17)
Publication types (Num. hits)
article(642) book(2) data(1) incollection(8) inproceedings(1214) phdthesis(10)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1096 occurrences of 513 keywords

Results
Found 1877 publication records. Showing 1877 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
93Akitoshi Izumi, Yoshifumi Ueshige A proposal of efficient scheme of key management using ID-based encryption and Biometrics. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
90Mihir Bellare, Lenore Cowen, Shafi Goldwasser On the Structure of Secret Key Exchange Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
77Renato Renner, Stefan Wolf 0001 New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF reductions among primitives, information measures, quantum entanglement purification, Information-theoretic security, secret-key agreement
70Woei-Jiunn Tsaur, Shi-Jinn Horng Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems. Search on Bibsonomy ISPAN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Secret Key Sharing Scheme, Distributed Systems, Cryptography, Information Security, Group-Oriented Cryptography
70Chao-Wen Chan, Chin-Chen Chang 0001 Key Exchange Protocols for Multiparty Communication Services. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
66Stefan Wolf 0001 Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement
62Nicolas Gisin, Stefan Wolf 0001 Linking Classical and Quantum Key Agreement: Is There "Bound Information"? Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF intrinsic information, secret-key rate, quantum privacy amplification, purification, entanglement, Secret-key agreement
58Ueli M. Maurer, Stefan Wolf 0001 Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
55Pawel Chodowiec, Po Khuon, Kris Gaj Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fast architectures, secret-key ciphers, pipelining, AES
55Ueli M. Maurer, Stefan Wolf 0001 Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptography, Information theory, Unconditional security, Secret key agreement
50Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha Kumar Kasera, Neal Patwari, Srikanth V. Krishnamurthy On the effectiveness of secret key extraction from wireless signal strength in real environments. Search on Bibsonomy MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multipath, RSSI, radio channel, PHY
50Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang 0001 Supervising Secret-Key Agreements in a Level-Based Hierarchy. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF level-based hierarchy, session key, Secret-key agreement
49Yevgeniy Dodis, Moti Yung Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman
49Jun Muramatsu, Kazuyuki Yoshimura, Kenichi Arai, Peter Davis Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Eun-Jun Yoon, Kee-Young Yoo Robust Secret Key Based Authentication Scheme Using Smart Cards. Search on Bibsonomy PCM (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, Cryptography, smart card, secret key
47YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won A PKI System for Detecting the Exposure of a User's Secret Key. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key-insulated signature, one-time hash chain, NOVOMODO
46Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki Eulerian Secret Key Exchange. Search on Bibsonomy COCOON The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
46Wei-Qi Yan 0001, Mohan S. Kankanhalli Motion trajectory based video authentication. Search on Bibsonomy ISCAS (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Masoud Ghoreishi Madiseh, Michael L. McGuire, Stephen W. Neville, Ali Asghar Beheshti Shirazi Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Subhamoy Maitra, Goutam Paul 0001 New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key Leakage, Cryptanalysis, Stream Cipher, Bias, RC4, Keystream
44Hua Yuan, Xiao-Ping (Steven) Zhang A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Michael J. Fischer, Rebecca N. Wright Multiparty Secret Key Exchange Using a Random Deal of Cards. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
44Ueli M. Maurer, Stefan Wolf 0001 Privacy Amplification Secure Against Active Adversaries. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement
43Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
43Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system overheads trade-off, one-way mapping, key management, broadcast encryption, pseudorandom number generators, erasure channels
42Paulo F. Oliveira, João Barros Network Coding Protocols for Secret Key Distribution. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secret key distribution, sensor networks, network coding
42Xiangyi Hu, Guifen Zhao, Guanning Xu Security Scheme for Online Banking Based on Secret Key Encryption. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Reina Yoshikawa, Shimin Guo, Kazuhiro Motegi, Yoshihide Igarashi Secret Key Exchange Using Random Deals of Cards on Hierarchical Structures. Search on Bibsonomy ISAAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hierarchical groups, key exchange graphs, secret bit transmission, information-theoretically secure, card games
42Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
41Hung-Min Sun, King-Hang Wang Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random deal of cards, Secret key exchange, Key set protocol, Transformation protocol, Card games
41Seok-Lae Lee, Bo-Sung Hwang, Joo-Seok Song A Secure Communication Scheme for Mobile Wireless Sensor Networks Using Hamming Distance. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sensor Network, Public-Key Cryptography, Hamming Distance, Symmetric cryptography
41Thomas Holenstein, Renato Renner One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Zhide Chen, Li Xu 0002 Anti-Collusion Anonymous Credentials Scheme. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Caimei Wang, Zhengmao Li Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Stefan Brands Restrictive Blinding of Secret-Key Certificates. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
39Yan Zong Ding, Michael O. Rabin Hyper-Encryption and Everlasting Security. Search on Bibsonomy STACS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Chih-Hsuan Tzeng, Zhi-Fang Yang, Wen-Hsiang Tsai Adaptive data hiding in palette images by color ordering and mapping with security protection. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro Secret Sharing Schemes with Veto Capabilities. Search on Bibsonomy Algebraic Coding The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
39Goutam Paul 0001, Subhamoy Maitra Permutation After RC4 Key Scheduling Reveals the Secret Key. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Permutation, Bias, RC4, Key Scheduling
38Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure
37Ronald Cramer, Ivan Damgård Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Chae Hoon Lim, Pil Joong Lee A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
37Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin Fault Analysis of Rabbit: Toward a Secret Key Leakage. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF carry analysis, Stream cipher, fault attacks, Rabbit
37Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya Secret Key Cryptography with Cellular Automata. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Paul Camion, Jacques Patarin t-resilient functions and the partial exposure problem. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Exposure-Resilient Function, Wire-tapping, Correlation-immune functions, Nonlinear codes, Binary channel, Symmetric encryption scheme, (n, k, t)-scheme, Linear codes, Orthogonal arrays, Resilient function, Secret key
37Seok-Lae Lee, Inkyung Jeun, Joo-Seok Song Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ad-hoc Network, Certificate, Hamming Distance, Public-key, Secret Key
36Claude Castelluccia, Pars Mutaf Shake them up!: a movement-based pairing protocol for CPU-constrained devices. Search on Bibsonomy MobiSys The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Eiji Okamoto, K. Nakamura Lifetimes of Keys in Cryptographic Key Management Systems. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
36Riddhipratim Basu, Subhamoy Maitra, Goutam Paul 0001, Tanmoy Talukdar On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Filter, Permutation, Sequence, Bias, RC4, Key Recovery
36Hao Li, Peishun Liu An Identification System Combined with Fingerprint and Cryptography. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Hala A. Farouk, Magdy Saeb Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FPGA, architecture, Steganography, data hiding, subliminal channel, covert communications
35Hala A. Farouk, Magdy Saeb Design and implementation of a secret key steganographic micro-architecture employing FPGA. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Gilles Brassard, Louis Salvail Secret-Key Reconciliation by Public Discussion. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
35Ueli M. Maurer Protocols for Secret Key Agreement by Public Discussion Based on Common Information. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
35Joël Alwen, Yevgeniy Dodis, Daniel Wichs Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai Exposure-Resilient Functions and All-or-Nothing Transforms. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Vanesa Daza, Josep Domingo-Ferrer On Partial Anonymity in Secret Sharing. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy, Protocols, Secret sharing
35Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
34Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
34Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
33Alexandra Boldyreva, Markus Jakobsson Theft-Protected Proprietary Certificates. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33R. Aparna, B. B. Amberker Authenticated Secure Group Communication using Broadcast Encryption Key Computation. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key
33Bin Ni, Naveen Santhapuri, Srihari Nelakuditi Wireless network coding and concurrent MAC: are these approaches complementary? Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
33Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung Key-Insulated Public Key Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Ernest F. Brickell, Daniel M. Davenport On the Classification of Idea Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
32Emily Shen, Elaine Shi, Brent Waters Predicate Privacy in Encryption Systems. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Akbar M. Sayeed, Adrian Perrig Secure wireless communications: Secret keys through multipath. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Eun-Jun Yoon, Kee-Young Yoo A Secret-Key Exponential Key Agreement Protocol with Smart Cards. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Edna Milgo A secure unidirectional proxy re-encryption using identity and secret key exchange. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cipher attacks, proxy, cryptosystems, ciphertexts
32Ueli M. Maurer Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
32Eli Biham, Adi Shamir Differential Fault Analysis of Secret Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
31Shengli Liu 0001, Henk C. A. van Tilborg, Marten van Dijk A Practical Protocol for Advantage Distillation and Information Reconciliation. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF advantage distillation, unconditional security, secret key agreement, information reconciliation
31Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki A complete characterization of a family of key exchange protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key exchange graph, Key set protocol, Secret key exchange, Information-theoretically secure, Card game
31Chih-Hung Wang, Tzonelih Hwang Threshold and Generalized DSS Signatures without a Trusted Party. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF (t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography
31Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng Certificateless signature: a new security model and an improved generic construction. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
31Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi The Carry Leakage on the Randomized Exponent Countermeasure. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Russell Impagliazzo, Steven Rudich Limits on the Provable Consequences of One-way Permutations. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
30Toru Nakanishi 0001, Yuta Hira, Nobuo Funabiki Forward-Secure Group Signatures from Pairings. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, group signatures, pairings, forward-security
30Stefan Dziembowski, Ueli M. Maurer The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Paulo F. Oliveira, João Barros A Network Coding Approach to Secret Key Distribution. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Petros Mol, Moti Yung Recovering NTRU Secret Key from Inversion Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis
30Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng Key Replacement Attack Against a Generic Construction of Certificateless Signature. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Jin Li 0002, Fangguo Zhang, Yanming Wang A Strong Identity Based Key-Insulated Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-insulated cryptosystem, Bilinear pairings, ID-based
30Toshiki Matsumine, Hideki Ochiai, Junji Shikata A Data-Driven Analysis of Secret Key Rate for Physical Layer Secret Key Generation From Wireless Channels. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
30Daniel Jost 0001, Ueli Maurer, João L. Ribeiro 0001 Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio. Search on Bibsonomy TCC (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Daniel Jost 0001, Ueli Maurer, João L. Ribeiro 0001 Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
29Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung Strong Key-Insulated Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Mathias Herrmann, Gregor Leander A Practical Key Recovery Attack on Basic TCHo. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCHo, stream cipher, chosen ciphertext attack
29Yi-Bo Zhao, You-Zhen Gui, Jin-Jian Chen, Zheng-Fu Han, Guang-Can Guo Computational Complexity of Continuous Variable Quantum Key Distribution. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29 Public Key vs. Secret Key Encryption. Search on Bibsonomy Encyclopedia of Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Frank Thomson Leighton, Silvio Micali Secret-Key Agreement without Public-Key Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
28Jingmei Liu, Xiangguo Cheng, Xinmei Wang Methods to Forge ElGamal Signatures and Determine Secret Key. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Signature, ElGamal
28Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen Zero-Knowledge Authentication Scheme with Secret Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Authentication, Authentication, Key exchange, Key exchange, Zero-knowledge, Zero-knowledge, Key words
28Jørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
28Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
28Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li Key-Insulated Group Signature Scheme with Selective Revocation. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1877 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license