Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2967
search results - page 17 / 594
»
Cryptology
Sort
relevance
views
votes
recent
update
View
thumb
title
126
click to vote
AFRICACRYPT
2009
Springer
140
views
Cryptology
»
more
AFRICACRYPT 2009
»
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
15 years 12 months ago
Download
eprint.iacr.org
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
claim paper
Read More »
128
click to vote
CTRSA
2009
Springer
205
views
Cryptology
»
more
CTRSA 2009
»
Key Insulation and Intrusion Resilience over a Public Channel
15 years 12 months ago
Download
eprint.iacr.org
Mihir Bellare, Shanshan Duan, Adriana Palacio
claim paper
Read More »
100
click to vote
ASIACRYPT
2009
Springer
118
views
Cryptology
»
more
ASIACRYPT 2009
»
On the Power of Two-Party Quantum Cryptography
15 years 11 months ago
Download
www.cs.au.dk
Louis Salvail, Christian Schaffner, Miroslava Sot&...
claim paper
Read More »
137
click to vote
ASIACRYPT
2009
Springer
121
views
Cryptology
»
more
ASIACRYPT 2009
»
Efficient Public Key Encryption Based on Ideal Lattices
15 years 11 months ago
Download
www.cryptrec.go.jp
Damien Stehlé, Ron Steinfeld, Keisuke Tanak...
claim paper
Read More »
84
click to vote
CANS
2009
Springer
115
views
Cryptology
»
more
CANS 2009
»
Private-Key Hidden Vector Encryption with Key Confidentiality
15 years 11 months ago
Download
www.win.tue.nl
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
claim paper
Read More »
« Prev
« First
page 17 / 594
Last »
Next »