Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2108
search results - page 140 / 422
»
Encrypted
Sort
relevance
views
votes
recent
update
View
thumb
title
105
click to vote
FSE
1994
Springer
145
views
Cryptology
»
more
FSE 1994
»
TEA, a Tiny Encryption Algorithm
15 years 7 months ago
Download
www.cix.co.uk
We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
David J. Wheeler, Roger M. Needham
claim paper
Read More »
91
click to vote
CANS
2007
Springer
142
views
Cryptology
»
more
CANS 2007
»
Strongly Secure Certificateless Public Key Encryption Without Pairing
15 years 7 months ago
Download
www.spms.ntu.edu.sg
Yinxia Sun, Futai Zhang, Joonsang Baek
claim paper
Read More »
103
Voted
CANS
2006
Springer
106
views
Cryptology
»
more
CANS 2006
»
Efficient Identity-Based Encryption with Tight Security Reduction
15 years 7 months ago
Download
eprint.iacr.org
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi,...
claim paper
Read More »
102
Voted
CCS
2006
ACM
233
views
Security Privacy
»
more
CCS 2006
»
Inferring the source of encrypted HTTP connections
15 years 7 months ago
Download
prisms.cs.umass.edu
Marc Liberatore, Brian Neil Levine
claim paper
Read More »
83
Voted
CCS
2006
ACM
91
views
Security Privacy
»
more
CCS 2006
»
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation
15 years 7 months ago
Download
www.shoup.net
Mihir Bellare, Tadayoshi Kohno, Victor Shoup
claim paper
Read More »
« Prev
« First
page 140 / 422
Last »
Next »