Computing logarithms in GF(2n)
Proceedings of CRYPTO 84 on Advances in cryptology
Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
The subliminal channel and digital signatures
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Rounding in lattices and its cryptographic applications
SODA '97 Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms
A Secure Subliminal Channel (?)
CRYPTO '85 Advances in Cryptology
Bit-Serial AOP Arithmetic Architectures over GF (2m)
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
Security of the design of time-stamped signatures
Journal of Computer and System Sciences
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
A new convertible authenticated encryption scheme with message linkages
Computers and Electrical Engineering
D-cash: A flexible pre-paid e-cash scheme for date-attachment
Electronic Commerce Research and Applications
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Advances in network smart cards authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
LFSR multipliers over GF(2m) defined by all-one polynomial
Integration, the VLSI Journal
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
Security enhancement for digital signature schemes with fault tolerance in RSA
Information Sciences: an International Journal
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
A provably secure short signature scheme based on discrete logarithms
Information Sciences: an International Journal
An innovative revocation scheme for one-to-many E-services
Electronic Commerce Research and Applications
A new characterization of dual bases in finite fields and its applications
Discrete Applied Mathematics
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
A new electronic traveler's check scheme based on one-way hash function
Electronic Commerce Research and Applications
Cryptanalysis of e-mail protocols providing perfect forward secrecy
Computer Standards & Interfaces
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
Should one always use repeated squaring for modular exponentiation?
Information Processing Letters
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts
Electronic Notes in Theoretical Computer Science (ENTCS)
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
Secure public-key encryption scheme without random oracles
Information Sciences: an International Journal
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences: an International Journal
Practical secrecy-preserving, verifiably correct and trustworthy auctions
Electronic Commerce Research and Applications
A novel approach for bit-serial AB2 multiplication in finite fields GF(2m)
Computers & Mathematics with Applications
Privacy homomorphisms for social networks with private relationships
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scheduling in a dynamic heterogeneous distributed system using estimation error
Journal of Parallel and Distributed Computing
USIM-based EAP-TLS authentication protocol for wireless local area networks
Computer Standards & Interfaces
The ring authenticated encryption scheme - How to provide a clue wisely
Information Sciences: an International Journal
Design of electronic t-out-of-n lotteries on the Internet
Computer Standards & Interfaces
Robust t-out-of-n oblivious transfer mechanism based on CRT
Journal of Network and Computer Applications
New mutual agreement protocol to secure mobile RFID-enabled devices
Information Security Tech. Report
Towards mechanized correctness proofs for cryptographic algorithms
Science of Computer Programming
Information Sciences: an International Journal
Information Sciences: an International Journal
Elliptic curve based hardware architecture using cellular automata
Mathematics and Computers in Simulation
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Design of DL-based certificateless digital signatures
Journal of Systems and Software
Analysis and design of a secure key exchange scheme
Information Sciences: an International Journal
Computer Standards & Interfaces
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Preserving user's privacy in web search engines
Computer Communications
Secured communication protocol for internetworking ZigBee cluster networks
Computer Communications
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces
Improved efficiency of Kiltz07-KEM
Information Processing Letters
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
Secure distributed constraint satisfaction: reaching agreement without revealing private information
Artificial Intelligence - Special issue: Distributed constraint satisfaction
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An ID-based multisignature scheme without reblocking and predetermined signing order
Computer Standards & Interfaces
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Survey on anonymous communications in computer networks
Computer Communications
Comments on the 'm out of n oblivious transfer'
Information Processing Letters
Efficient parallel exponentiation in GF(qn) using normal basis representations
Journal of Algorithms
Simple and efficient hash-based verifiable mixing for remote electronic voting
Computer Communications
Providing data confidentiality against malicious hosts in Shared Data Spaces
Science of Computer Programming
Journal of Parallel and Distributed Computing
An efficient user authentication and key exchange protocol for mobile client-server environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards trustworthy e-voting using paper receipts
Computer Standards & Interfaces
Multi-use and unidirectional identity-based proxy re-encryption schemes
Information Sciences: an International Journal
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Network and Computer Applications
Public-key encryption based on Chebyshev polynomials over GF(q)
Information Processing Letters
Fair exchange of valuable information: A generalised framework
Journal of Computer and System Sciences
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
Practical electronic auction scheme with strong anonymity and bidding privacy
Information Sciences: an International Journal
Threshold signature schemes for ElGamal variants
Computer Standards & Interfaces
Contract signature in e-commerce
Computers and Electrical Engineering
Discrete logarithm based additively homomorphic encryption and secure data aggregation
Information Sciences: an International Journal
New identity-based key-insulated convertible multi-authenticated encryption scheme
Journal of Network and Computer Applications
Meetings through the cloud: Privacy-preserving scheduling on mobile devices
Journal of Systems and Software
Restricted adaptive oblivious transfer
Theoretical Computer Science
Auctions in do-not-track compliant internet advertising
Proceedings of the 18th ACM conference on Computer and communications security
Two-server password-only authenticated key exchange
Journal of Computer and System Sciences
Journal of Network and Computer Applications
Achieving key privacy without losing CCA security in proxy re-encryption
Journal of Systems and Software
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
Computing elliptic curve discrete logarithms with the negation map
Information Sciences: an International Journal
Public key cryptography sans certificates in ad hoc networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Privacy Preserving Aggregation of Secret Classifiers
Transactions on Data Privacy
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
Novel Approach for fast Compressed Hybrid color image Cryptosystem
Advances in Engineering Software
Efficient multiple-collision trapdoor hash family
Security and Communication Networks
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
Security and Communication Networks
Pairing-based strong designated verifier proxy signature scheme with low cost
Security and Communication Networks
Research notes: Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem
Computer Communications
Secure distribution of electronic documents in a hostile environment
Computer Communications
Secure end-to-end delegations in distributed systems
Computer Communications
I: Basic technologies: Modern key agreement techniques
Computer Communications
I: Basic technologies: TESS: A security system based on discrete exponentiation
Computer Communications
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
Research note: Key authentication scheme for cryptosystems based on discrete logarithms
Computer Communications
Secure broadcasting in large networks
Computer Communications
Research note: ID-based group-oriented cryptosystem and its digital signature scheme
Computer Communications
Research note: Authenticity of public keys in asymmetric cryptosystems
Computer Communications
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
Prêt à Voter with Paillier encryption
Mathematical and Computer Modelling: An International Journal
A traceable group signature scheme
Mathematical and Computer Modelling: An International Journal
The design of a secure and fair sealed-bid auction service
Mathematical and Computer Modelling: An International Journal
Non-repudiation protocols for multiple entities
Computer Communications
Partially blind threshold signatures based on discrete logarithm
Computer Communications
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
CSP-DHIES: a new public-key encryption scheme from matrix conjugation
Security and Communication Networks
Finite field arithmetic using quasi-normal bases
Finite Fields and Their Applications
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
Redactable Signatures for Signed CDA Documents
Journal of Medical Systems
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Improved Pollard rho method for computing discrete logarithms over finite extension fields
Journal of Computational and Applied Mathematics
An ID-based cryptographic mechanisms based on GDLP and IFP
Information Processing Letters
Practical private information aggregation in large networks
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Insider attacks and privacy of RFID protocols
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
A secure IRB system for assisting the development of intelligent medical devices
Expert Systems with Applications: An International Journal
Lossy trapdoor functions from homomorphic reproducible encryption
Information Processing Letters
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
A simultaneous members enrollment and revocation protocol for secret sharing schemes
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Taking proof-based verified computation a few steps closer to practicality
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Generic constructions for verifiable signcryption
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
A note on asynchronous multi-exponentiation algorithm using binary representation
Information Processing Letters
An efficient IND-CCA2 secure Paillier-based cryptosystem
Information Processing Letters
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Experimenting with fast private set intersection
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Homonyms with forgeable identifiers
SIROCCO'12 Proceedings of the 19th international conference on Structural Information and Communication Complexity
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Fundamenta Informaticae
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem
Fundamenta Informaticae
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Candidate-resolved online voting protocol using distributed ElGamal Cryptosystem
Proceedings of the CUBE International Information Technology Conference
Genodroid: are privacy-preserving genomic tests ready for prime time?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Cross-VM side channels and their use to extract private keys
Proceedings of the 2012 ACM conference on Computer and communications security
A Secure Integrated Medical Information System
Journal of Medical Systems
An improved discrete logarithm-based multisignature scheme
Security and Communication Networks
Efficient password-based authenticated key exchange without public information
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
On the privacy of concealed data aggregation
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Public key encryption with conjunctive keyword search and its extension to a multi-user system
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
General and efficient certificateless public key encryption constructions
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
ICALP'07 Proceedings of the 34th international conference on Automata, Languages and Programming
An efficient certified email protocol
ISC'07 Proceedings of the 10th international conference on Information Security
Towards a DL-based additively homomorphic encryption scheme
ISC'07 Proceedings of the 10th international conference on Information Security
An enhanced biometrics-based remote user authentication scheme using mobile devices
International Journal of Computational Intelligence Studies
Cryptanalysis of Álvarez et al. key exchange scheme
Information Sciences: an International Journal
Internet voting system with cast as intended verification
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
An efficient and highly sound voter verification technique and its implementation
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
One-Move convertible nominative signature in the standard model
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Practical Internet voting system
Journal of Network and Computer Applications
A new algorithm for computing triple-base number system
ACM SIGARCH Computer Architecture News
Anonymous password-based key exchange with low resources consumption and better user-friendliness
Security and Communication Networks
Decentralized dynamic broadcast encryption
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
An innovative electronic group-buying system for mobile commerce
Electronic Commerce Research and Applications
Short and efficient convertible undeniable signature schemes without random oracles
Theoretical Computer Science
A novel text and image encryption method based on chaos theory and DNA computing
Natural Computing: an international journal
A robust and plaintext-aware variant of signed elgamal encryption
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Succinct non-interactive arguments via linear interactive proofs
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
Wireless Personal Communications: An International Journal
Towards secure mobile cloud computing: A survey
Future Generation Computer Systems
Private data warehouse queries
Proceedings of the 18th ACM symposium on Access control models and technologies
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
International Journal of Information and Communication Technology
Resolving the conflict between generality and plausibility in verified computation
Proceedings of the 8th ACM European Conference on Computer Systems
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Private proximity detection for convex polygons
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
Efficient online/offline signcryption without key exposure
International Journal of Grid and Utility Computing
On construction of a library of formally verified low-level arithmetic functions
Innovations in Systems and Software Engineering
A Privacy Preserving Markov Model for Sequence Classification
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
MrCrypt: static analysis for secure cloud computations
Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications
Secure genomic testing with size- and position-hiding private substring matching
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Anonymously sharing Flickr pictures with facebook friends
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Efficient and robust data aggregation using untrusted infrastructure
Proceedings of the 6th International Conference on Security of Information and Networks
Privacy-preserving Kruskal-Wallis test
Computer Methods and Programs in Biomedicine
On the security of two improved authenticated encryption schemes
International Journal of Security and Networks
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Journal of Medical Systems
Sharing DSS by the Chinese Remainder Theorem
Journal of Computational and Applied Mathematics
IND-CCA secure encryption based on a Zheng-Seberry scheme
Journal of Computational and Applied Mathematics
Message transmission for GH-public key cryptosystem
Journal of Computational and Applied Mathematics
Limits of a conjecture on a leakage-resilient cryptosystem
Information Processing Letters
Protecting privacy through distributed computation in multi-agent decision making
Journal of Artificial Intelligence Research
A New Secure Authenticated Group Key Transfer Protocol
Wireless Personal Communications: An International Journal
The Journal of Supercomputing
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Attacking and fixing Helios: An analysis of ballot secrecy
Journal of Computer Security
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 754.85 |
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem. The security of both systems relies on the difficulty of computing discrete logarithms over finite fields.