Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2108
search results - page 143 / 422
»
Encrypted
Sort
relevance
views
votes
recent
update
View
thumb
title
115
click to vote
IFIPTCS
2000
89
views
Theoretical Computer Science
»
more
IFIPTCS 2000
»
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
15 years 7 months ago
Download
www.lsv.ens-cachan.fr
Martín Abadi, Phillip Rogaway
claim paper
Read More »
97
click to vote
CCS
2008
ACM
112
views
Security Privacy
»
more
CCS 2008
»
Towards automated proofs for asymmetric encryption schemes in the random oracle model
15 years 5 months ago
Download
www.rcis.aist.go.jp
Judicaël Courant, Marion Daubignard, Cristian...
claim paper
Read More »
96
click to vote
DRM
2005
Springer
99
views
Artificial Intelligence
»
more
DRM 2005
»
New broadcast encryption scheme using tree-based circle
15 years 5 months ago
Download
www.math.snu.ac.kr
Nam-Su Jho, Eun Sun Yoo, Jung Hee Cheon, Myung-Hwa...
claim paper
Read More »
95
Voted
CRYPTO
2008
Springer
83
views
Cryptology
»
more
CRYPTO 2008
»
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
15 years 5 months ago
Download
eprint.iacr.org
Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas...
claim paper
Read More »
92
Voted
CRYPTO
2008
Springer
80
views
Cryptology
»
more
CRYPTO 2008
»
Dynamic Threshold Public-Key Encryption
15 years 5 months ago
Download
www.di.ens.fr
Cécile Delerablée, David Pointcheval
claim paper
Read More »
« Prev
« First
page 143 / 422
Last »
Next »