Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1834
search results - page 84 / 367
»
Public Key Cryptography
Sort
relevance
views
votes
recent
update
View
thumb
title
85
click to vote
ESORICS
2007
Springer
141
views
Security Privacy
»
more
ESORICS 2007
»
Efficient Password-Based Authenticated Key Exchange Without Public Information
15 years 3 months ago
Download
eprint.iacr.org
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
claim paper
Read More »
87
click to vote
ASIAN
2006
Springer
103
views
Algorithms
»
more
ASIAN 2006
»
Breaking and Fixing Public-Key Kerberos
15 years 2 months ago
Download
www.qatar.cmu.edu
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
claim paper
Read More »
102
click to vote
CTRSA
2006
Springer
176
views
Cryptology
»
more
CTRSA 2006
»
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
15 years 2 months ago
Download
crypto.stanford.edu
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
claim paper
Read More »
62
click to vote
ICALP
2000
Springer
114
views
Programming Languages
»
more
ICALP 2000
»
Extended Notions of Security for Multicast Public Key Cryptosystems
15 years 2 months ago
Download
www.di.ens.fr
Olivier Baudron, David Pointcheval, Jacques Stern
claim paper
Read More »
78
click to vote
SACRYPT
2000
Springer
75
views
Cryptology
»
more
SACRYPT 2000
»
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders
15 years 2 months ago
Download
pages.cpsc.ucalgary.ca
Detlef Hühnlein, Michael J. Jacobson Jr., Dam...
claim paper
Read More »
« Prev
« First
page 84 / 367
Last »
Next »