How to construct random functions
Journal of the ACM (JACM)
Efficient and secure pseudo-random number generation
Proceedings of CRYPTO 84 on Advances in cryptology
On the construction of a random number generator and random function generators
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A new probabilistic encryption scheme
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
How to sign given any trapdoor function
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Non-interactive zero-knowledge and its applications
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
A hard-core predicate for all one-way functions
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Communications of the ACM - Special issue on simulation
On the existence of pseudorandom generators
CRYPTO '88 Proceedings on Advances in cryptology
Efficient, perfect random number generators
CRYPTO '88 Proceedings on Advances in cryptology
How to sign given any trapdoor function
CRYPTO '88 Proceedings on Advances in cryptology
Proving security against chosen cyphertext attacks
CRYPTO '88 Proceedings on Advances in cryptology
The discrete log is very discreet
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Perfect local randomness in pseudo-random sequences
CRYPTO '89 Proceedings on Advances in cryptology
How to predict congruential generators
CRYPTO '89 Proceedings on Advances in cryptology
The longtime behavior of solutions to a quasilinear combustion model
Nonlinear Analysis: Theory, Methods & Applications
Cryptographic hardness of distribution-specific learning
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On randomization in sequential and distributed algorithms
ACM Computing Surveys (CSUR)
Global, unpredictable bit generation without broadcast
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the learnability of discrete distributions
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Commodity-based cryptography (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
A flow-based approach to datagram security
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Uniform random number generators: a review
Proceedings of the 29th conference on Winter simulation
Communications of the ACM
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
Analysis of Iterated Modular Exponentiation: The Orbitsof x^α mod N
Designs, Codes and Cryptography
Uniform random number generators
Proceedings of the 30th conference on Winter simulation
Design and implementation of a scalable encryption processor with embedded variable DC/DC converter
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Proceedings of the 1998 workshop on New security paradigms
Pseudo-random functions and factoring (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Funkspiel schemes: an alternative to conventional tamper resistance
Proceedings of the 7th ACM conference on Computer and communications security
A comparison of two approaches to pseudorandomness
Theoretical Computer Science
On the Linear Complexity of the Power Generator
Designs, Codes and Cryptography
Generalised Cycling Attacks on RSA and Strong RSA Primes
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Computational Alternatives to Random Number Generators
SAC '98 Proceedings of the Selected Areas in Cryptography
A Forward-Secure Digital Signature Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
An Improved Pseudo-random Generator Based on Discrete Log
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Adi Shamir: On the Universality of the Next Bit Test
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Certifying Cryptographic Tools: The Case of Trapdoor Permutations
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Cryptographic Randomness from Air Turbulence in Disk Drives
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Cryptoanalysis Based on 2-Adic Rational Approximation
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
All Bits ax+b mod p are Hard (Extended Abstract)
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
A Practice-Oriented Treatment of Pseudorandom Number Generators
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
The Modular Inversion Hidden Number Problem
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Maximal Periods of x + c in Fq
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Dynamical analysis of a class of Euclidean algorithms
Theoretical Computer Science - Latin American theoretical informatics
A Markov chain sequence generator for power macromodeling
Proceedings of the 2002 IEEE/ACM international conference on Computer-aided design
Design and study of a strong crypto-system model for e-Commerce
ICCC '02 Proceedings of the 15th international conference on Computer communication
Authentication of LZ-77 compressed data
Proceedings of the 2003 ACM symposium on Applied computing
A scalable key-management scheme with minimizing key storage for secure group communications
International Journal of Network Management
Number-theoretic constructions of efficient pseudo-random functions
Journal of the ACM (JACM)
Distributional properties of d-FCSR sequences
Journal of Complexity - Special issue on coding and cryptography
Periodicity and Correlation Properties of d-FCSR Sequences
Designs, Codes and Cryptography
Modified noise for evaluation on graphics hardware
Proceedings of the ACM SIGGRAPH/EUROGRAPHICS conference on Graphics hardware
Zero-knowledge watermark detection resistant to ambiguity attacks
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
An improved BioHashing for human authentication
Pattern Recognition
Private stateful circuits secure against probing attacks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Compact FPGA implementations of QUAD
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Parallel white noise generation on a GPU via cryptographic hash
Proceedings of the 2008 symposium on Interactive 3D graphics and games
On the linear complexity of some new q-ary sequences
Information Sciences: an International Journal
Trace representation of some generalized cyclotomic sequences of length pq
Information Sciences: an International Journal
An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Technique
Computational Intelligence and Security
Cryptography Based on Quadratic Forms: Complexity Considerations
Research in Cryptology
Key Refreshing in Wireless Sensor Networks
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Cryptographic hardness for learning intersections of halfspaces
Journal of Computer and System Sciences
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
On the Linear Complexity of Some Ternary Sequences with Ideal Autocorrelation
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
On Formal Verification of Arithmetic-Based Cryptographic Primitives
Information Security and Cryptology --- ICISC 2008
Practical Chosen Ciphertext Secure Encryption from Factoring
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
A Practical Approach to a Reliable Electronic Election
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
QUAD: A multivariate stream cipher with provable security
Journal of Symbolic Computation
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
More efficient DDH pseudorandom generators
Designs, Codes and Cryptography
An efficient pseudo-random generator provably as secure as syndrome decoding
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Stronger security proofs for RSA and rabin bits
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
On the use of interconnection networks in cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Local randomness in candidate one-way functions
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Dial C for cipher: le chiffrement était presque parfait
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Dynamical systems generated by rational functions
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Timed release of standard digital signatures
FC'02 Proceedings of the 6th international conference on Financial cryptography
Fair secure two-party computation
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Nearly one-sided tests and the Goldreich-Levin predicate
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
An improved pseudorandom generator based on hardness of factoring
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Forward-security in private-key cryptography
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Intrusion-resilient public-key encryption
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Robust iris verification for key management
Pattern Recognition Letters
Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine
Journal of Systems and Software
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
An algorithm to fill out a bloc with pseudorandom binary data
CEA'10 Proceedings of the 4th WSEAS international conference on Computer engineering and applications
Towards trustworthy e-voting using paper receipts
Computer Standards & Interfaces
Assessing the Quality of Pseudo-Random Number Generators
Computational Economics
Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms
Proceedings of the 3rd international conference on Security of information and networks
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
GPU random numbers via the tiny encryption algorithm
Proceedings of the Conference on High Performance Graphics
A calculus for game-based security proofs
ProvSec'10 Proceedings of the 4th international conference on Provable security
AONT encryption based application data management in mobile RFID environment
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
Implementation and testing of high-speed CMOS true random number generators based on chaotic systems
IEEE Transactions on Circuits and Systems Part I: Regular Papers - Special section on 2009 IEEE system-on-chip conference
Chosen ciphertext secure encryption under factoring assumption revisited
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Fast pseudorandom generator based on packed matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Provably secure key assignment schemes from factoring
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
E-MACs: towards more secure and more efficient constructions of secure channels
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
A mathematical problem for security analysis of hash functions and pseudorandom generators
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
On the provable security of an efficient RSA-Based pseudorandom generator
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Another look at “provable security”. II
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Questionable encryption and its applications
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
On the possibility of non-invertible watermarking schemes
IH'04 Proceedings of the 6th international conference on Information Hiding
On the role definitions in and beyond cryptography
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
On the randomness of bits generated by sufficiently smooth functions
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Hold your sessions: an attack on java session-id generation
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A bandwidth efficiency of lempel-ziv scheme for data authentication
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
ISC'05 Proceedings of the 8th international conference on Information Security
A new image encryption scheme based on a chaotic function
Image Communication
On the power generator and its multivariate analogue
Journal of Complexity
Cryptanalysis of the energy efficient stream ciphers SSC2
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Periodicity and distribution properties of combined FCSR sequences
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
On pseudorandom sequences and their application
General Theory of Information Transfer and Combinatorics
QUAD: a practical stream cipher with provable security
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Efficient primitives from exponentiation in Zp
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Concrete security of the blum-blum-shub pseudorandom generator
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Resource fairness and composability of cryptographic protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Public key encryption for the forgetful
Cryptography and Security
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Certifying assembly with formal security proofs: The case of BBS
Science of Computer Programming
Improved efficiency of chosen ciphertext secure encryption from factoring
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Linear Complexity of Generalized Cyclotomic Binary Sequences of Order 2
Finite Fields and Their Applications
On the Distribution of the Diffie-Hellman Pairs
Finite Fields and Their Applications
Pseudorandom number generators based on random covers for finite groups
Designs, Codes and Cryptography
Public-Key cryptography from new multivariate quadratic assumptions
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Fast and small nonlinear pseudorandom number generators for computer simulation
PPAM'11 Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part I
Improving the performance of the SYND stream cipher
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A special purpose integer factorization algorithm
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Perfect block ciphers with small blocks
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Improved tradeoff between encapsulation and decapsulation of HK09
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Simple, efficient and strongly KI-Secure hierarchical key assignment schemes
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Predicting masked linear pseudorandom number generators over finite fields
Designs, Codes and Cryptography
Endurance-aware cache line management for non-volatile caches
ACM Transactions on Architecture and Code Optimization (TACO)
Hi-index | 0.02 |