History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 96 total

Group signatures with message-dependent opening in the standard model. (English)
Benaloh, Josh (ed.), Topics in cryptology ‒ CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 286-306 (2014).
WorldCat.org
1
Traceable group encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 592-610 (2014).
WorldCat.org
2
Toward practical group encryption. (English)
Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25‒28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 237-252 (2013).
WorldCat.org
3
A scalable scheme for privacy-preserving aggregation of time-series data. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 111-125 (2013).
WorldCat.org
4
On elliptic curve paillier schemes. (English)
Muntean, Traian (ed.) et al., Algebraic informatics. 5th international conference, CAI 2013, Porquerolles, France, September 3‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40662-1/pbk). Lecture Notes in Computer Science 8080, 6 (2013).
WorldCat.org
5
Linearly homomorphic structure-preserving signatures and their applications. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 289-307 (2013).
WorldCat.org
6
Efficient cryptosystems from $2^{k }$-th power residue symbols. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 76-92 (2013).
WorldCat.org
7
Privacy-preserving matrix factorization. (English)
ACM Conference on Computer and Communications Security, 801-812(2013)
WorldCat.org
8
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. (English)
IEEE Symposium on Security and Privacy, 334-348(2013)
WorldCat.org
9
Partial key exposure on RSA with private exponents larger than $N$. (English)
Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 369-380 (2012).
WorldCat.org
10
Fault analysis in cryptography. Foreword by Dan Boneh. (English)
Information Security and Cryptography. Berlin: Springer (ISBN 978-3-642-29655-0/hbk; 978-3-642-29656-7/ebook). xvi, 354~p. EUR~94.95/net; SFR~126.50; \sterling~85.00/hbk (2012).
WorldCat.org
11
On Quisquater’s multiplication algorithm. (English)
Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 3-7 (2012).
WorldCat.org
12
A Method for Preventing "Skipping" Attacks. (English)
IEEE Symposium on Security and Privacy Workshops, 12-15(2012)
WorldCat.org
13
Security aspects in information technology. First international conference, InfoSecHiComNet 2011, Haldia, India, October 19‒22, 2011. Proceedings. (English)
Lecture Notes in Computer Science 7011. Berlin: Springer (ISBN 978-3-642-24585-5/pbk). xiv, 187~p. EUR~49.22 (2011).
WorldCat.org
14
Memory-constrained implementations of elliptic curve cryptography in co-$Z$ coordinate repre\-sentation. (English)
Nitaj, Abderrahmane (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5‒7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 170-187 (2011).
WorldCat.org
15
Notions and relations for RKA-secure permutation and function families. (English)
Des. Codes Cryptography 60, No. 1, 15-35 (2011).
WorldCat.org
16
How (not) to design strong-RSA signatures. (English)
Des. Codes Cryptography 59, No. 1-3, 169-182 (2011).
WorldCat.org
17
Binary huff curves. (English)
Kiayias, Aggelos (ed.), Topics in cryptology ‒ CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14‒18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 340-355 (2011).
WorldCat.org
18
Memory-Efficient Fault Countermeasures. (English)
CARDIS, 84-101(2011)
WorldCat.org
19
Side-Channel Analysis. (English)
Encyclopedia of Cryptography and Security (2nd Ed.), 1198-1204(2011)
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 96 total

Valid XHTML 1.0 Transitional Valid CSS!