Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
550
search results - page 23 / 110
»
Public Key Encryption and Encryption Emulation Attacks
Sort
relevance
views
votes
recent
update
View
thumb
title
50
click to vote
TISSEC
2008
77
views
more
TISSEC 2008
»
Provably Secure Timed-Release Public Key Encryption
14 years 11 months ago
Download
www-users.cs.umn.edu
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
claim paper
Read More »
83
click to vote
AFRICACRYPT
2010
Springer
129
views
Cryptology
»
more
AFRICACRYPT 2010
»
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
14 years 10 months ago
Download
www.manulis.eu
David Galindo, Benoît Libert, Marc Fischlin,...
claim paper
Read More »
77
click to vote
SCN
2010
Springer
113
views
Communications
»
more
SCN 2010
»
Public-Key Encryption with Efficient Amortized Updates
14 years 9 months ago
Download
www.cs.ucla.edu
Nishanth Chandran, Rafail Ostrovsky, William E. Sk...
claim paper
Read More »
90
click to vote
ISCI
2011
211
views
Natural Language Processing
»
more
ISCI 2011
»
Self-generated-certificate public key encryption without pairing and its application
14 years 3 months ago
Download
www.iacr.org
Junzuo Lai, Weidong Kou, Kefei Chen
claim paper
Read More »
99
click to vote
CORR
2010
Springer
112
views
Education
»
more
CORR 2010
»
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
14 years 12 months ago
Download
eprint.iacr.org
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma
claim paper
Read More »
« Prev
« First
page 23 / 110
Last »
Next »