Sciweavers

2967 search results - page 17 / 594
» Cryptology
Sort
View
AFRICACRYPT
2009
Springer
15 years 12 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
CTRSA
2009
Springer
205views Cryptology» more  CTRSA 2009»
15 years 12 months ago
Key Insulation and Intrusion Resilience over a Public Channel
Mihir Bellare, Shanshan Duan, Adriana Palacio
ASIACRYPT
2009
Springer
15 years 11 months ago
On the Power of Two-Party Quantum Cryptography
Louis Salvail, Christian Schaffner, Miroslava Sot&...
ASIACRYPT
2009
Springer
15 years 11 months ago
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé, Ron Steinfeld, Keisuke Tanak...
CANS
2009
Springer
115views Cryptology» more  CANS 2009»
15 years 11 months ago
Private-Key Hidden Vector Encryption with Key Confidentiality
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano