The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Secure communications over insecure channels
Communications of the ACM
Riemann's Hypothesis and tests for primality
STOC '75 Proceedings of seventh annual ACM symposium on Theory of computing
A Mechanical Proof of the Unsolvability of the Halting Problem
Journal of the ACM (JACM)
A randomized protocol for signing contracts
Communications of the ACM
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
How to construct random functions
Journal of the ACM (JACM)
ACM SIGSAC Review
A prototype encryption system using public key
Proceedings of CRYPTO 84 on Advances in cryptology
A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
A public key cryptosystem based on the word problem
Proceedings of CRYPTO 84 on Advances in cryptology
Efficient signature schemes based on polynomial equations
Proceedings of CRYPTO 84 on Advances in cryptology
A knapsack type public key cryptosystem based on arithmetic in finite fields
Proceedings of CRYPTO 84 on Advances in cryptology
Some public key crypto-functions as intractable as factorization
Proceedings of CRYPTO 84 on Advances in cryptology
Generalized linear threshold scheme
Proceedings of CRYPTO 84 on Advances in cryptology
On the cryptographic applications of random functions
Proceedings of CRYPTO 84 on Advances in cryptology
An efficient probabilistic public key encryption scheme which hides all partial information
Proceedings of CRYPTO 84 on Advances in cryptology
RSA/Rabin least significant bits are 1-2- + 1/poly(log N) secure
Proceedings of CRYPTO 84 on Advances in cryptology
Information theory without the finiteness assumption, I: Cryptosystems as group-theoretic objects
Proceedings of CRYPTO 84 on Advances in cryptology
Proceedings of CRYPTO 84 on Advances in cryptology
An update on quantum cryptography
Proceedings of CRYPTO 84 on Advances in cryptology
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Is the data encryption standard a group?
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Algebraical structures of cryptographic transformations
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
RSA-bits are 0.5 + &egr; secure
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
On the number of close-and-equal pairs of bits in a string
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A new trapdoor knapsack public-key cryptosystem
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
RSA chips (past/present/future)
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Status report on factoring (at the Sandia National Labs)
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Strong primes are easy to find
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
User functions for the generation and distribution of encipherment keys
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
On the use of the binary multiplying channel in a private communication system
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
On concurrent identification protocols
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
The parallel complexity of exponentiating polynomials over finite fields
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
An O(lg n) expected rounds randomized Byzantine generals protocol
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
ACM Transactions on Computer Systems (TOCS)
Optimization models for configuring distributed computer systems
IEEE Transactions on Computers
Some variations on RSA signatures and their security
Proceedings on Advances in cryptology---CRYPTO '86
Two remarks concerning the Goldwasser-Micali-Rivest signature scheme
Proceedings on Advances in cryptology---CRYPTO '86
How to prove all NP-statements in zero-knowledge, and a methodology of cryptographic protocol design
Proceedings on Advances in cryptology---CRYPTO '86
Zero-knowledge simulation of Boolean circuits
Proceedings on Advances in cryptology---CRYPTO '86
VLSI implementation of public-key encryption algorithms
Proceedings on Advances in cryptology---CRYPTO '86
Proceedings on Advances in cryptology---CRYPTO '86
Two observations on probabilistic primality testing
Proceedings on Advances in cryptology---CRYPTO '86
Proceedings on Advances in cryptology---CRYPTO '86
THOMAS—A complete single chip RSA device
Proceedings on Advances in cryptology---CRYPTO '86
A model to order the encryption algorithms according to their quality
ACM SIGCOMM Computer Communication Review
An O(log n) expected rounds randomized byzantine generals protocol
Journal of the ACM (JACM)
The parallel complexity of exponentiating polynomials over finite fields
Journal of the ACM (JACM)
A digital multisignature scheme using bijective public-key cryptosystems
ACM Transactions on Computer Systems (TOCS)
Reliable Broadcast in Hypercube Multicomputers
IEEE Transactions on Computers
Security of improved identity-based conference key distribution systems
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A fast modular arithmetic algorithm using a residue table
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Fast RSA-hardware: dream or reality
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Properties of the Euler totient function modulo 24 and some of its cryptographic implications
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A new probabilistic encryption scheme
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Some applications of multiple key ciphers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
How to sign given any trapdoor function
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Fault tolerant distributed services
PODC '88 Proceedings of the seventh annual ACM Symposium on Principles of distributed computing
Secure and verifiable schemes for election and general distributed computing problems
PODC '88 Proceedings of the seventh annual ACM Symposium on Principles of distributed computing
Automatically increasing the fault-tolerance of distributed systems
PODC '88 Proceedings of the seventh annual ACM Symposium on Principles of distributed computing
Decentralizing a global naming service for improved performance and fault tolerance
ACM Transactions on Computer Systems (TOCS)
A hard-core predicate for all one-way functions
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Universal one-way hash functions and their cryptographic applications
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Crytographic limitations on learning Boolean formulae and finite automata
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Constructing replicated systems using processors with point-to-point communication links
ISCA '89 Proceedings of the 16th annual international symposium on Computer architecture
Construction of internet for Japanese academic communities
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
ACM Transactions on Computer Systems (TOCS)
IEEE Transactions on Software Engineering
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
IEEE Transactions on Computers
Implementing Remote Evaluation
IEEE Transactions on Software Engineering
Intractable problems in number theory (invited talk)
CRYPTO '88 Proceedings on Advances in cryptology
Computation of approximate L-th roots modulo n and application to cryptography
CRYPTO '88 Proceedings on Advances in cryptology
On the existence of pseudorandom generators
CRYPTO '88 Proceedings on Advances in cryptology
How to sign given any trapdoor function
CRYPTO '88 Proceedings on Advances in cryptology
A “paradoxical” identity-based signature scheme resulting from zero-knowledge
CRYPTO '88 Proceedings on Advances in cryptology
A modification of the Fiat-Shamir scheme
CRYPTO '88 Proceedings on Advances in cryptology
ACM Transactions on Programming Languages and Systems (TOPLAS)
A basic theory of public and private cryptosystems (invited talk)
CRYPTO '88 Proceedings on Advances in cryptology
CRYPTO '88 Proceedings on Advances in cryptology
A universal problem in secure and verifiable distributed computation
CRYPTO '88 Proceedings on Advances in cryptology
CRYPTO '88 Proceedings on Advances in cryptology
Speeding up secret computations with insecure auxiliary devices
CRYPTO '88 Proceedings on Advances in cryptology
Hardware speedups in long integer multiplication
SPAA '90 Proceedings of the second annual ACM symposium on Parallel algorithms and architectures
Exponentiation cryptosystems on the IBM PC
IBM Systems Journal
The discrete log is very discreet
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Public-key cryptosystems provably secure against chosen ciphertext attacks
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Communications of the ACM
Provably secure key-updating schemes in identity-based systems
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Which new RSA signatures can be computed from some given RSA signatures? (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A cryptographic library for the Motorola DSP56000
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the design of provably-secure cryptographic hash functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
On an implementation of the Mohan-Adiga algorithm
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Journal of the ACM (JACM)
The smart diskette: a universal user token and personal crypto-engine
CRYPTO '89 Proceedings on Advances in cryptology
A chosen text attack on the modified cryptographic checksum algorithm of Cohen and Huang
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
On-line/off-line digital signatures
CRYPTO '89 Proceedings on Advances in cryptology
Flexible access control with master keys
CRYPTO '89 Proceedings on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
A survey of hardware implementations of RSA (abstract)
CRYPTO '89 Proceedings on Advances in cryptology
Modular exponentiation using recursive sums of residues
CRYPTO '89 Proceedings on Advances in cryptology
A fast modular-multiplication algorithm based on a higher radix
CRYPTO '89 Proceedings on Advances in cryptology
Authentication in distributed systems: theory and practice
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Communications of the ACM
Computing A*B (mod N) efficiently in ANSI C
ACM SIGPLAN Notices
A software authentication system for the prevention of computer viruses
CSC '92 Proceedings of the 1992 ACM annual conference on Communications
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
ACM SIGSAC Review
A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation
IEEE Transactions on Computers - Special issue on computer arithmetic
IEEE Transactions on Computers
Message authentication with one-way hash functions
ACM SIGCOMM Computer Communication Review
Principal Features of the VOLTAN Family of Reliable Node Architectures for Distributed Systems
IEEE Transactions on Computers - Special issue on fault-tolerant computing
Open commit protocols tolerating commission failures
ACM Transactions on Database Systems (TODS)
Integration of security in network routing protocols
ACM SIGSAC Review
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Algorithm 719: Multiprecision translation and execution of FORTRAN programs
ACM Transactions on Mathematical Software (TOMS)
Hardware Implementation of Montgomery's Modular Multiplication Algorithm
IEEE Transactions on Computers
Communications of the ACM
An Ada package for multi-precision integer arithmetic
ACM SIGSMALL/PC Notes
Integrating security in inter-domain routing protocols
ACM SIGCOMM Computer Communication Review
On the generation of multivariate polynomials which are hard to factor
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
Lower bounds on messages and rounds for network authentication protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On simple and secure key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Digital signatures: can they be accepted as legal signatures in EDI?
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A protocol for route establishment and packet forwarding across multidomain internets
IEEE/ACM Transactions on Networking (TON)
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
Cryptographic limitations on learning Boolean formulae and finite automata
Journal of the ACM (JACM)
On randomization in sequential and distributed algorithms
ACM Computing Surveys (CSUR)
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Cryptography for PC/workstation security
ACM SIGICE Bulletin
Communications of the ACM
Can O.S.S. be repaired?: proposal for a new practical signature scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untransferable rights in a client-independent server environment
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
One-way accumulators: a decentralized alternative to digital signatures
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A key distribution method for object-based protection
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Meet your destiny: a non-manipulable meeting scheduler
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
How to share a function securely
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Dynamic fault-tolerant clock synchronization
Journal of the ACM (JACM)
Standardizing information technology security
StandardView
A New Public-Key Cipher System Based Upon the Diophantine Equations
IEEE Transactions on Computers
Secure communications in ATM networks
Communications of the ACM
Modulo Reduction in Residue Number Systems
IEEE Transactions on Parallel and Distributed Systems
Bounds on information exchange for Byzantine agreement
Journal of the ACM (JACM)
Authentication protocols for personal communication systems
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Issues 94—public key—trials and tribulations
ACM SIGSAC Review - Special issue: Issues 94 workshop on public key cryptography
Applying cryptographic techniques to problems in media space security
COCS '95 Proceedings of conference on Organizational computing systems
New Hybrid Fault Models for Asynchronous Approximate Agreement
IEEE Transactions on Computers
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
A Secure Group Membership Protocol
IEEE Transactions on Software Engineering
Redundant Integer Representations and Fast Exponentiation
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
25 years of quantum cryptography
ACM SIGACT News
Fundamentals of computing (a cheatlist)
ACM SIGACT News
Achieving Rights Untransferability with Client-Independent Servers
Designs, Codes and Cryptography
Evaluation may be easier than generation (extended abstract)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Adaptively secure multi-party computation
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Unified login with pluggable authentication modules (PAM)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Support for workflows in a ministerial environment
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Strategic directions in research in theory of computing
ACM Computing Surveys (CSUR) - Special ACM 50th-anniversary issue: strategic directions in computing research
Issues '95—electronic commerce
ACM SIGSAC Review - Soecial issues on Issues 95: electronic commerce
Implementing Fail-Silent Nodes for Distributed Systems
IEEE Transactions on Computers
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Space/Time Trade-Offs for Higher Radix Modular Multiplication Using Repeated Addition
IEEE Transactions on Computers
Multisignature algorithms for ISO 9796
ACM SIGSAC Review
Explicit Communication Revisited: Two New Attacks on Authentication Protocols
IEEE Transactions on Software Engineering
ACM SIGOPS Operating Systems Review
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
O(n)-Depth Modular Exponentiation Circuit Algorithm
IEEE Transactions on Computers
A public-key cryptosystem with worst-case/average-case equivalence
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
Proceedings of the 4th ACM conference on Computer and communications security
New blind signatures equivalent to factorization (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
A new on-line cash check scheme
Proceedings of the 4th ACM conference on Computer and communications security
On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
Enhancing workflows by web technology
GROUP '97 Proceedings of the international ACM SIGGROUP conference on Supporting group work: the integration challenge
Transparent filtering of streams in GLADE
Proceedings of the conference on TRI-Ada '97
Using CSP to Detect Errors in the TMN Protocol
IEEE Transactions on Software Engineering
Extended analogy: an alternative lecture method
SIGCSE '98 Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
Multicast security and its extension to a mobile environment
Wireless Networks
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Robust efficient distributed RSA-key generation
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Optimal efficiency of optimistic contract signing
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Atomicity in electronic commerce
netWorker
Computer security by redefining what a computer is
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Surf'N'Sign: client signatures on Web documents
IBM Systems Journal
Key management for encrypted broadcast
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A new public key cryptosystem based on higher residues
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Reducing the Elliptic Curve Cryptosystem of Meyer-Müllerto the Cryptosystem of Rabin-Williams
Designs, Codes and Cryptography
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
On-Line Error Detection for Bit-Serial Multipliers in GF(2m)
Journal of Electronic Testing: Theory and Applications
Design of a High-Speed Square Generator
IEEE Transactions on Computers
Emperor: cheap legal secure cryptography for the Web
Proceedings of the 1999 ACM symposium on Applied computing
Unconditionally Secure Group Authentication
Designs, Codes and Cryptography
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
A new model of security for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
High-confidence design for security: don't trust—verify
Communications of the ACM
The design space layer: supporting early design space exploration for core-based designs
DATE '99 Proceedings of the conference on Design, automation and test in Europe
Model-Based Verification of a Security Protocol for Conditional Access to Services
Formal Methods in System Design
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
On the fly signatures based on factoring
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
A secure distributed capability based system (extended abstract)
ACM '85 Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective: mid-80's perspective
Reaching Agreement in the Presence of Faults
Journal of the ACM (JACM)
Proceedings of the fourth annual ACM symposium on Principles of distributed computing
Strength of two data encryption standard implementations under timing attacks
ACM Transactions on Information and System Security (TISSEC)
HyperNews: a MEDIA application for the commercialization of an electronic newspaper
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
Protecting Java code via code obfuscation
Crossroads - Speical issue on robotics
Complexity and Fast Algorithms for Multiexponentiations
IEEE Transactions on Computers
Information Security, Mathematics, and Public-Key Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Optimal Left-to-Right Binary Signed-Digit Recoding
IEEE Transactions on Computers - Special issue on computer arithmetic
Crossroads
Privacy-preserving global customization
Proceedings of the 2nd ACM conference on Electronic commerce
Key management for encrypted broadcast
ACM Transactions on Information and System Security (TISSEC)
An Efficient One-Way Enciphering Algorithm
ACM Transactions on Mathematical Software (TOMS)
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
On the generation of cryptographically strong pseudorandom sequences
ACM Transactions on Computer Systems (TOCS)
ACM Transactions on Computer Systems (TOCS)
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Digital signatures with RSA and other public-key cryptosystems
Communications of the ACM
Communications of the ACM
An overview of computational complexity
Communications of the ACM
Cryptographic sealing for information secrecy and authentication
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Secure personal computing in an insecure network
Communications of the ACM
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis
IEEE Transactions on Computers
Robust algorithms for restricted domains
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
A secure multicast protocol for the internet's multicast backbone
International Journal of Network Management
Radix-4 modular multiplication and exponentiation algorithms for the RSA public-key cryptosystem
ASP-DAC '00 Proceedings of the 2000 Asia and South Pacific Design Automation Conference
The tangram framework (embedded tutorial): asynchronous circuits for low power
Proceedings of the 2001 Asia and South Pacific Design Automation Conference
RSA cryptosystem design based on the Chinese remainder theorem
Proceedings of the 2001 Asia and South Pacific Design Automation Conference
On the Use of RSA as a Secret Key Cryptosystem
Designs, Codes and Cryptography
On String Replacement Exponentiation
Designs, Codes and Cryptography
A scalable approach for broadcasting data in a wireless network
MSWIM '01 Proceedings of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Technical correspondence: on secure personal computing
Communications of the ACM
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware
IEEE Transactions on Computers
Delegation of cryptographic servers for capture-resilient devices
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Twin signatures: an alternative to the hash-and-sign paradigm
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
FPGA '02 Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays
The SecureRing group communication system
ACM Transactions on Information and System Security (TISSEC)
Towards a world-wide civilization of objects
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Enabling crypto: how radical innovations occur
Communications of the ACM - Supporting community and building social capital
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
On the validity of digital signatures
ACM SIGCOMM Computer Communication Review
Context-agile encryption for high speed communication networks
ACM SIGCOMM Computer Communication Review
A cryptographic solution to implement access control in a hierarchy and more
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Blinded-key signatures: securing private keys embedded in mobile agents
Proceedings of the 2002 ACM symposium on Applied computing
Implementation of fast RSA key generation on smart cards
Proceedings of the 2002 ACM symposium on Applied computing
On the composition of authenticated byzantine agreement
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
A two-level time-stamping system
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
An efficient software protection scheme
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Designs, Codes and Cryptography
Architectural tradeoff in implementing RSA processors
ACM SIGARCH Computer Architecture News
A first step towards providing health-care agent-based services to mobile users
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2
Untraceable off-line electronic cash flow in e-commerce
ACSC '01 Proceedings of the 24th Australasian conference on Computer science
Ticket-based service access scheme for mobile users
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Programmable active memories: reconfigurable systems come of age
Readings in hardware/software co-design
Secure key agreement for group communications
International Journal of Network Management
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
SPINS: security protocols for sensor networks
Wireless Networks
A group signature scheme with strong separability
Journal of Systems and Software
Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm
Information Processing Letters
Defending against redirect attacks in mobile IP
Proceedings of the 9th ACM conference on Computer and communications security
Taming access control security: extending capabilities using the views relationship
Software—Practice & Experience
Cryptography, trusted third parties and escrow
BT Technology Journal
BT Technology Journal
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
Coalition Public-Key Cryptosystems
Cybernetics and Systems Analysis
A New Micro-Payment System Using General Payword Chain
Electronic Commerce Research
Supporting the Distributed German Government with POLITeam
Multimedia Tools and Applications
Approaching Secure Communications in a Message-Oriented Mobile Computing Environment
Multimedia Tools and Applications
Performance-Scalable Array Architectures for Modular Multiplication
Journal of VLSI Signal Processing Systems
A Systolic, High Speed Architecture for an RSA Cryptosystem
Journal of VLSI Signal Processing Systems
With J: public key cryptography
ACM SIGAPL APL Quote Quad
Efficient Rabin-type Digital Signature Scheme
Designs, Codes and Cryptography
How to decrypt or even substitute DES-Encrypted messages in 228 steps
Information Processing Letters
A New \mathcal{NP}-Complete Problem and Public-Key Identification
Designs, Codes and Cryptography
Towards a Reference Model for Surveying Mobile Agent Systems
Autonomous Agents and Multi-Agent Systems
Adaptively secure distributed public-key systems
Theoretical Computer Science
IEEE Internet Computing
A Survey of Encryption Standards
IEEE Micro
IEEE Micro
A Flexible Security System for Using Internet Content
IEEE Software
Systolic Modular Multiplication
IEEE Transactions on Computers
Improved Digital Signature Algorithm
IEEE Transactions on Computers
Improved Digital Signature Suitable for Batch Verification
IEEE Transactions on Computers
The Montgomery Inverse and Its Applications
IEEE Transactions on Computers
GF(2m) Multiplication and Division Over the Dual Basis
IEEE Transactions on Computers
An RNS Montgomery Modular Multiplication Algorithm
IEEE Transactions on Computers
A Protocol for Establishing Secure Communication Channels in a Large Network
IEEE Transactions on Knowledge and Data Engineering
An Architecture for Survivable Coordination in Large Distributed Systems
IEEE Transactions on Knowledge and Data Engineering
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
Interleaved All-to-All Reliable Broadcast on Meshes and Hypercubes
IEEE Transactions on Parallel and Distributed Systems
Applied Mathematics and Computation
Systolic multiplier for Montgomery's algorithm
Integration, the VLSI Journal
An efficient protocol for anonymous and fair document exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proxy signature schemes based on factoring
Information Processing Letters
Convertible authenticated encryption scheme
Journal of Systems and Software
Verifiable Democracy a Protocol to Secure an Electronic Legislature
EGOV '02 Proceedings of the First International Conference on Electronic Government
Using Mobile Agents for Distributed Network Performance Management
IATA '99 Proceedings of the Third International Workshop on Intelligent Agents for Telecommunication Applications
Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
Petri nets in cryptographic protocols
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Soft Constraints for Security Protocol Analysis: Confidentiality
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Simulating the Effect of Decoherence and Inaccuracies on a Quantum Computer
QCQC '98 Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications
A Protocol for Untraceable Electronic Cash
WAIM '00 Proceedings of the First International Conference on Web-Age Information Management
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Search Key Substitution in the Encipherment of B-Trees
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
Using SPIN to Verify Security Properties of Cryptographic Protocols
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Trust Is not Enough: Privacy and Security in ASP and Web Service Environments
ADBIS '02 Proceedings of the 6th East European Conference on Advances in Databases and Information Systems
Generalised Cycling Attacks on RSA and Strong RSA Primes
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Self-Certified Group-Oriented Cryptosystem Without a Combiner
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
RSA Acceleration with Field Programmable Gate Arrays
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Accelerating Key Establishment Protocols for Mobile Communication
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
On the Security of an RSA Based Encryption Scheme
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Practical Key Recovery Schemes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
New Public-Key Cryptosystem Using Divisor Class Groups
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Attacks Based on Small Factors in Various Group Structures
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Signature Schemes Based on 3rd Order Shift Registers
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Requirements for Group Independent Linear Threshold Secret Sharing Schemes
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Note on Fast Computation of Secret RSA Exponents
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Encrypting Java Archives and Its Application to Mobile Agent Security
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
A Secure Electronic Software Distribution (ESD) Protocol Based on PKC
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
A Parallel Dispatch Model with Secure and Robust Routes for Mobile Agents
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Practical Mobile Digital Signatures
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Improving SSL Handshake Performance via Batching
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Using Fewer Qubits in Shor's Factorization Algorithm Via Simultaneous Diophantine Approximation
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Modular Exponentiation on Fine-Grained FPGA
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Distinguishing Exponent Digits by Observing Modular Subtractions
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
From Fixed-Length Messages to Arbitrary-Length Messages Practical RSA Signature Padding Schemes
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Securing "Encryption + Proof of Knowledge" in the Random Oracle Model
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
The Representation Problem Based on Factoring
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Observability Analysis - Detecting When Improved Cryptosystems Fail
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
RSA-Based Undeniable Signatures for General Moduli
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
On Hash Function Firewalls in Signature Schemes
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Extended Notions of Security for Multicast Public Key Cryptosystems
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
A Public Key Cryptosystem Based on the Subgroup Membership Problem
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Two Simple Batch Verifying Multiple Digital Signatures
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Secure Agent-Mediated Payment Protocol
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Characterization of Elliptic Curve Traces under FR-Reduction
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Hash to the Rescue: Space Minimization for PKI Directories
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Practical Security in Public-Key Cryptography
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
An Improved ID-Based Authentication and Key Distribution Protocol
ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II
Dynamic Configuration and Enforcement of Access Control for Mobile Components
NGIT '99 Proceedings of the 4th International Workshop on Next Generation Information Technologies and Systems
Key-Dependent S-Box Manipulations
SAC '98 Proceedings of the Selected Areas in Cryptography
SAC '98 Proceedings of the Selected Areas in Cryptography
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Improving and Extending the Lim/Lee Exponentiation Algorithm
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On Some Attacks on Multi-prime RSA
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
The Group Diffie-Hellman Problems
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Encapsulating Failure Detection: From Crash to Byzantine Failures
Ada-Europe '02 Proceedings of the 7th Ada-Europe International Conference on Reliable Software Technologies
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Some Parallel Algorithms for Integer Factorisation
Euro-Par '99 Proceedings of the 5th International Euro-Par Conference on Parallel Processing
Recent Progress and Prospects for Integer Factorisation Algorithms
COCOON '00 Proceedings of the 6th Annual International Conference on Computing and Combinatorics
Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m)
COCOON '02 Proceedings of the 8th Annual International Conference on Computing and Combinatorics
On the Security Properties of OAEP as an All-or-Nothing Transform
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of ``2 R'' Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
On the Security of RSA Padding
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Separability and Efficiency for Generic Group Signature Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Efficient Non-malleable Commitment Schemes
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
On the Exact Security of Full Domain Hash
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
New Public-Key Cryptosystem Using Braid Groups
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Improved Online/Offline Signature Schemes
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
New Public Key Cryptosystem Using Finite Non Abelian Groups
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Session-Key Generation Using Human Passwords Only
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
RSA-OAEP Is Secure under the RSA Assumption
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
On the Security of RSA Encryption in TLS
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Universal Padding Schemes for RSA
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Security Proof for Partial-Domain Hash Signature Schemes
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Flaws in Applying Proof Methodologies to Signature Schemes
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A Layered Approach to the Design of Private Key Cryptosystems
CRYPTO '85 Advances in Cryptology
The Bit Security of Modular Squaring Given Partial Factorization of the Modulos
CRYPTO '85 Advances in Cryptology
On Using RSA with Low Exponent in a Public Key Network
CRYPTO '85 Advances in Cryptology
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
CRYPTO '85 Advances in Cryptology
On the Security of Ping-Pong Protocols when Implemented using the RSA
CRYPTO '85 Advances in Cryptology
Attacks on Some RSA Signatures
CRYPTO '85 Advances in Cryptology
Symmetric Public-Key Encryption
CRYPTO '85 Advances in Cryptology
A Secure Poker Protocol that Minimizes the Effect of Player Coalitions
CRYPTO '85 Advances in Cryptology
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with
CRYPTO '85 Advances in Cryptology
CRYPTO '85 Advances in Cryptology
CRYPTO '85 Advances in Cryptology
A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes
CRYPTO '85 Advances in Cryptology
How to Make Replicated Data Secure
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Arbitration in Tamper Proof Systems
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Key Distribution Systems Based on Identification Information
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Identity-based Conference Key Distribution Systems
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CORSAIR: A SMART Card for Public Key Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Fast Checkers for Cryptography
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Matrix Extensions of the RSA Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Unconditionally Secure Digital Signatures
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Faster Modular Multiplication by Operand Scaling
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Functional Inversion and Communication Complexity
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Calculus for Access Control in Distributed Systems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Switching Closure Test to Analyze Cryptosystems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
The Use of Interaction in Public Cryptosystems (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Provably Unforgeable Signatures
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Response to Comments of the NIST Proposed Digital Signature Standard
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Making Electronic Refunds Safer
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Certifying Cryptographic Tools: The Case of Trapdoor Permutations
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Efficient Signature Schemes Based on Birational Permutations
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Directed Acyclic Graphs, One-way Functions and Digital Signatures
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
More Flexible Exponentiation with Precomputation
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Fast Generation of Provable Primes Using Search in Arithmetic Progressions
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Existentially Unforgeable Signature Scheme and its Applications
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Cryptoanalysis of the Immunized LL Public Key Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Escrow Encryption Systems Visited: Attacks, Analysis and Designs
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Fast Server-Aided RSA Signatures Secure Against Active Attacks
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Some Remarks on Lucas-Based Cryptosystems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Threshold DSS Signatures without a Trusted Party
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Weakness in Some Threshold Cryptosystems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
New Generation of Secure and Practical RSA-Based Signatures
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Secure Integration of Asymmetric and Symmetric Encryption Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Minimal Addition Chain for Efficient Modular Exponentiation Using Genetic Algorithms
IEA/AIE '02 Proceedings of the 15th international conference on Industrial and engineering applications of artificial intelligence and expert systems: developments in applied artificial intelligence
Computer Aided Systems Theory - EUROCAST 2001-Revised Papers
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
A Coordination Model Agents Based on Secure Spaces
COORDINATION '99 Proceedings of the Third International Conference on Coordination Languages and Models
Enabling Privacy Protection in E-commerce Applications
WELCOM '01 Proceedings of the Second International Workshop on Electronic Commerce
The Bit Security of Paillier's Encryption Scheme and Its Applications
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Security Notions for Unconditionally Secure Signature Schemes
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
An Architecture for Secure Generation and Verification of Electronic Coupons
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Optimal Security Proofs for PSS and Other Signature Schemes
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Efficient "on the Fly" Signature Schemes Based on Integer Factoring
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
An Analysis of Integrity Services in Protocols
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Authentication of Concast Communication
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Towards Logically and Physically Secure Public-Key Infrastructures
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Efficient Fair Exchange with Verifiable Confirmation of Signatures
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Improving the Security of the McEliece Public-Key Cryptosystem
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A Study on the Proposed Korean Digital Signature Algorithm
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Cryptoanalysis in Prime Order Subgroups of Z*n
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
An Attack on RSA Given a Small Fraction of the Private Key Bits
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A Group Signature Scheme with Improved Efficiency
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Adaptively Secure Oblivious Transfer
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Unconditionally Secure Digital Signature Schemes Admitting Transferability
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Password-Authenticated Key Exchange Based on RSA
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Improved Methods to Perform Threshold RSA
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Attacking and Repairing Batch Verification Schemes
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Why Textbook ElGamal and RSA Encryption Are Insecure
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Towards Signature-Only Signature Schemes
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Trapdooring Discrete Logarithms on Elliptic Curves over Rings
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Fully Distributed Threshold RSA under Standard Assumptions
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Unconditionally Secure Anonymous Encryption and Group Authentication
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Revocation Scheme with Minimal Storage at Receivers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
In How Many Ways Can You Write Rijndael?
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Virtual Software Tokens - A Practical Way to Secure PKI Roaming
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Informatics - 10 Years Back. 10 Years Ahead.
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature
SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security
Improvements in Process Control Dependability through Internet Security Technology
SAFECOMP '00 Proceedings of the 19th International Conference on Computer Safety, Reliability and Security
Unconditional Security in Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
The Search for the Holy Grail in Quantum Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Emerging Standards for Public-Key Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Signing Contracts and Paying Electronically
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
The State of Cryptographic Hash Functions
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Sharing Decryption in the Context of Voting or Lotteries
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
An Experimental Study of Security Vulnerabilities Caused by Errors
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Security Upgrade of Existing ISDN Devices by Using Reconfigurable Logic
FPL '00 Proceedings of the The Roadmap to Reconfigurable Computing, 10th International Workshop on Field-Programmable Logic and Applications
A Software Library for Elliptic Curve Cryptography
ESA '02 Proceedings of the 10th Annual European Symposium on Algorithms
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Networking in a Service Platform Based on Mobile Agents
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Extended Proxy Signatures for Smart Cards
ISW '99 Proceedings of the Second International Workshop on Information Security
An Improvement on a Practical Secret Voting Scheme
ISW '99 Proceedings of the Second International Workshop on Information Security
Spending Programs: A Tool for Flexible Micropayments
ISW '99 Proceedings of the Second International Workshop on Information Security
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Non-interactive Cryptosystem for Entity Authentication
ISW '99 Proceedings of the Second International Workshop on Information Security
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
Weighted One-Way Hash Chain and Its Applications
ISW '00 Proceedings of the Third International Workshop on Information Security
ISC '01 Proceedings of the 4th International Conference on Information Security
Efficient Optimistic N-Party Contract Signing Protocol
ISC '01 Proceedings of the 4th International Conference on Information Security
An Auditable Metering Scheme for Web Advertisement Applications
ISC '01 Proceedings of the 4th International Conference on Information Security
On the Difficulty of Protecting Private Keys in Software
ISC '02 Proceedings of the 5th International Conference on Information Security
A Realistic Protocol for Multi-party Certified Electronic Mail
ISC '02 Proceedings of the 5th International Conference on Information Security
Automated Analysis of Some Security Mechanisms of SCEP
ISC '02 Proceedings of the 5th International Conference on Information Security
Conditional Cryptographic Delegation for P2P Data Sharing
ISC '02 Proceedings of the 5th International Conference on Information Security
A New Public Key Cryptosystem for Constrained Hardware
ISC '02 Proceedings of the 5th International Conference on Information Security
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks
ISC '02 Proceedings of the 5th International Conference on Information Security
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
How to Enhance the Security of Public-Key Encryption at Minimum Cost
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Message Recovery Fair Blind Signature
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
On the Security of RSA Screening
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
The Effectiveness of Lattice Attacks Against Low-Exponent RSA
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Adaptive Security for the Additive-Sharing Based Proactive RSA
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A Novel Systolic Architecture for Efficient RSA Implementation
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Power Analysis Attacks of Modular Exponentiation in Smartcards
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Montgomery's Multiplication Technique: How to Make It Smaller and Faster
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Probing Attacks on Tamper-Resistant Devices
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
A Scalable Architecture for Montgomery Multiplication
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Data Integrity in Hardware for Modular Arithmetic
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Efficient Generation of Prime Numbers
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
High-Speed RSA Hardware Based on Barret's Modular Reduction Method
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Sliding Windows Succumbs to Big Mac Attack
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
High-Radix Design of a Scalable Modular Multiplier
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Increasing the Bitlength of a Crypto-Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Further Results and Considerations on Side Channel Attacks on RSA
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n)
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Improving Lattice Based Cryptosystems Using the Hermite Normal Form
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
The Two Faces of Lattices in Cryptology
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
Low Secret Exponent RSA Revisited
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
On Privacy Issues of Internet Access Services via Proxy Servers
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Extending Wiener's Attack in the Presence of Many Decrypting Exponents
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Data Security for Distributed Meeting Systems
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
Analysis of a Public Key Approach Based on Polynomial Substitution
CRYPTO '85 Advances in Cryptology
Application of Novel Technologies to the Management of a Very Large Date Base
VLDB '83 Proceedings of the 9th International Conference on Very Large Data Bases
Efficient Parallel Modular Exponentiation Algorithm
ADVIS '02 Proceedings of the Second International Conference on Advances in Information Systems
The GH Public-Key Cryptosystem
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Trapdoor Rings and Their Use in Cryptography
CRYPTO '85 Advances in Cryptology
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
Data Encryption Using MRF with an RSA Key
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Authenticating distributed data using Web services and XML signatures
Proceedings of the 2002 ACM workshop on XML security
Achieving NTRU with Montgomery Multiplication
IEEE Transactions on Computers
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis
IEEE Transactions on Computers
Verifying authentication protocol implementations
FMOODS '02 Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V
Fast modular exponentiation of large numbers with large exponents
Journal of Systems Architecture: the EUROMICRO Journal
ACM SIGOPS Operating Systems Review
Technology and Health Care
Security enhancement for anonymous secure e-voting over a network
Computer Standards & Interfaces
Key assignment for enforcing access control policy exceptions in distributed systems
Information Sciences: an International Journal
AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
A flexible payment scheme and its permission-role assignment
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
Design and Implementation of a Coprocessor for Cryptography Applications
EDTC '97 Proceedings of the 1997 European conference on Design and Test
Services and Architectures for Electronic Publishing
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
A High-Throughput Secure Reliable Multicast Protocol
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Network security considerations in BLN
SIGCOMM '83 Proceedings of the eighth symposium on Data communications
Information security issues in an APL application
APL '84 Proceedings of the international conference on APL
Probabilistic encryption & how to play mental poker keeping secret all partial information
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Polynomial algorithms for multiple processor agreement
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
STOC '81 Proceedings of the thirteenth annual ACM symposium on Theory of computing
Digital signature schemes for computer communication networks
SIGCOMM '81 Proceedings of the seventh symposium on Data communications
Some cryptographic principles of authentication in electronic funds transfer systems
SIGCOMM '81 Proceedings of the seventh symposium on Data communications
Some Open Problems In Cryptography
ACM '78 Proceedings of the 1978 annual conference
On the cryptocomplexity of knapsack systems
STOC '79 Proceedings of the eleventh annual ACM symposium on Theory of computing
WFS a simple shared file system for a distributed environment
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Finding safe paths in a faulty environment
PODC '82 Proceedings of the first ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Bounds on information exchange for Byzantine Agreement
PODC '82 Proceedings of the first ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Fault-tolerant clock synchronization
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
Asynchronous Byzantine consensus
PODC '84 Proceedings of the third annual ACM symposium on Principles of distributed computing
An efficient signature scheme based on quadratic equations
STOC '84 Proceedings of the sixteenth annual ACM symposium on Theory of computing
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
On breaking generalized knapsack public key cryptosystems
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
On the cryptographic security of single RSA bits
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
A Secure Distributed Search System
HPDC '02 Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Hierarchical Organization of Certification Authorities for Secure Environments
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
VLSI Implementation of Modulo Multiplication Using Carry Free Addition
VLSID '97 Proceedings of the Tenth International Conference on VLSI Design: VLSI in Multimedia Applications
Enterprise security infrastructure
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Network Access and Data Security Design for Telemedicine Applications
ISCC '97 Proceedings of the 2nd IEEE Symposium on Computers and Communications (ISCC '97)
Probabilistic algorithmic knowledge
Proceedings of the 9th conference on Theoretical aspects of rationality and knowledge
On Multiple Precision Based Montgomery Multiplication without Precomputation of N0' = -N0-1 mod W
ICCD '00 Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
Teaching secure communication protocols using a game representation
ACE '03 Proceedings of the fifth Australasian conference on Computing education - Volume 20
Selecting the Advanced Encryption Standard
IEEE Security and Privacy
Hardware architectures for public key cryptography
Integration, the VLSI Journal
An asynchronous protocol for distributed computation of RSA inverses and its applications
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Oblivious signature-based envelope
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Efficient protocols secure against guessing and replay attacks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Backoff Protocols for Distributed Mutual Exclusion and Ordering
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Payment technologies for E-commerce
Payment technologies for E-commerce
Payment technologies for E-commerce
On the simulation of quantum Turing machines
Theoretical Computer Science
Threshold signature scheme using self-certified public keys
Journal of Systems and Software
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
Detecting and restoring the tampered images based on iteration-free fractal compression
Journal of Systems and Software
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Security and robustness enhanced route structures for mobile agents
Mobile Networks and Applications
A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm
IEEE Transactions on Computers
IEEE Transactions on Very Large Scale Integration (VLSI) Systems - Special section on the 2001 international conference on computer design (ICCD)
Implementing an untrusted operating system on trusted hardware
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Separating agreement from execution for byzantine fault tolerant services
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Digital rights management in a 3G mobile phone and beyond
Proceedings of the 3rd ACM workshop on Digital rights management
How to fake an RSA signature by encoding modular root finding as a SAT problem
Discrete Applied Mathematics - The renesse issue on satisfiability
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
On the performance, feasibility, and use of forward-secure signatures
Proceedings of the 10th ACM conference on Computer and communications security
Automatic generation of two-party computations
Proceedings of the 10th ACM conference on Computer and communications security
Secure hybrid robust watermarking resistant against tampering and copy attack
Signal Processing - Special section: Security of data hiding technologies
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Authenticity in a reliable protocol for mobile computing
Proceedings of the 2003 ACM symposium on Applied computing
Asymmetric Cryptographic Algorithms
Cybernetics and Systems Analysis
A Timeout-Based Message Ordering Protocol for a Lightweight Software Implementation of TMR Systems
IEEE Transactions on Parallel and Distributed Systems
A flexible and scalable authentication scheme for JPEG2000 image codestreams
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Untraceable blind signature schemes based on discrete logarithm problem
Fundamenta Informaticae
Improvement of the Miyazaki--Takaragi threshold digital signature scheme
Information Processing Letters
Efficient algorithms for NMR quantum computers with small qubits
New Generation Computing - Quantum computing
How to construct optimal one-time signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
Some definitions, protocols and proofs about secure authentication
CASCON '92 Proceedings of the 1992 conference of the Centre for Advanced Studies on Collaborative research - Volume 2
Security protocols for 2G and 3G wireless communications
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
An efficient and practical (t, n) threshold proxy signature scheme with known signers
Fundamenta Informaticae
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders
Designs, Codes and Cryptography
Cryptography and cryptographic protocols
Distributed Computing - Papers in celebration of the 20th anniversary of PODC
Fair certified e-mail delivery
Proceedings of the 2004 ACM symposium on Applied computing
A secure method for signature delegation to mobile agents
Proceedings of the 2004 ACM symposium on Applied computing
Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware
Proceedings of the conference on Design, automation and test in Europe - Volume 3
A Global Ticket-Based Access Scheme for Mobile Users
Information Systems Frontiers
The security of all RSA and discrete log bits
Journal of the ACM (JACM)
Root Kits: an operating systems viewpoint
ACM SIGOPS Operating Systems Review
Visually sealed and digitally signed documents
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Anonymous access scheme for electronic-services
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Verifiable encryption of digital signatures and applications
ACM Transactions on Information and System Security (TISSEC)
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
ACM Transactions on Information and System Security (TISSEC)
Modeling and evaluating the security threats of transient errors in firewall software
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
Cryptanalysis of short secret exponents modulo RSA primes
Information Sciences—Informatics and Computer Science: An International Journal
Proposal of a framework for internet based licensing of learning objects
Computers & Education
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
IEEE Transactions on Computers
A Full RNS Implementation of RSA
IEEE Transactions on Computers
Toward an automated verification of certificates of authenticity
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
An FPGA implementation of an elliptic curve processor GF(2m)
Proceedings of the 14th ACM Great Lakes symposium on VLSI
Robust algorithms for restricted domains
Journal of Algorithms - Special issue: Twelfth annual ACM-SIAM symposium on discrete algorithms
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Role-based access control in ambient and remote space
Proceedings of the ninth ACM symposium on Access control models and technologies
Role-based cascaded delegation
Proceedings of the ninth ACM symposium on Access control models and technologies
A server assisted authentication protocol for detecting error vectors
ACM SIGOPS Operating Systems Review
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
Computer Security in the Real World
Computer
Leveraging the "Multi" in secure multi-party computation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Fair blind threshold signatures in wallet with observers
Journal of Systems and Software
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient scalable VLSI architecture for Montgomery inversion in GF(p)
Integration, the VLSI Journal
FPGA based hardware acceleration for elliptic curve public key cryptosystems
Journal of Systems and Software - Special issue: Rapid system prototyping
Cryptographic technology: fifteen year forecast
ACM SIGACT News
Coin flipping by telephone a protocol for solving impossible problems
ACM SIGACT News - A special issue on cryptography
An optimally secure relativized cryptosystem
ACM SIGACT News - A special issue on cryptography
A public key extension to the common Cryptographic Architecture
IBM Systems Journal
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
An HMAC processor with integrated SHA-1 and MD5 algorithms
Proceedings of the 2004 Asia and South Pacific Design Automation Conference
SPV: secure path vector routing for securing BGP
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Quantum computing without entanglement
Theoretical Computer Science
The internet public key infrastructure
IBM Systems Journal - End-to-end security
An architecture for the internet key exchange protocol
IBM Systems Journal - End-to-end security
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
The IBM PCIXCC: a new cryptographic coprocessor for the IBM eServer
IBM Journal of Research and Development
Collaborative Automated Trust Negotiation in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
FPGA-Based Implementation of a Serial RSA Processor
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
A Multi-Agent System's Approach to Communication Security in the Web
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
CODEX: A Robust and Secure Secret Distribution System
IEEE Transactions on Dependable and Secure Computing
Fingerprinting and forensic analysis of multimedia
Proceedings of the 12th annual ACM international conference on Multimedia
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
TARK '94 Proceedings of the 5th conference on Theoretical aspects of reasoning about knowledge
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Minx: a simple and efficient anonymous packet format
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Off-the-record communication, or, why not to use PGP
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Reasoning about knowledge: an overview
TARK '86 Proceedings of the 1986 conference on Theoretical aspects of reasoning about knowledge
An escrow electronic cash system with limited traceability
Information Sciences—Informatics and Computer Science: An International Journal
A Hardware Algorithm for Modular Multiplication/Division
IEEE Transactions on Computers
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
ACM Computing Surveys (CSUR)
Secure reliable multicast protocols in a WAN
Distributed Computing
Distributed Computing
Quantum networks: from quantum cryptography to quantum architecture
ACM SIGCOMM Computer Communication Review
Journal of the ACM (JACM)
A note on quadratic residuosity and UP
Information Processing Letters
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
On improvements to password security
ACM SIGOPS Operating Systems Review
Proceedings of the 2nd annual conference on Mid-south college computing
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
Information hiding based on search-order coding for VQ indices
Pattern Recognition Letters
An efficient digital signature using self-certified public keys
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Tree Parity Machine Rekeying Architectures
IEEE Transactions on Computers
A Flexible Payment Scheme and Its Role-Based Access Control
IEEE Transactions on Knowledge and Data Engineering
A Novel Unified Architecture for Public-Key Cryptography
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Design and Evaluation of a Security Scheme for Sensor Networks
ISQED '05 Proceedings of the 6th International Symposium on Quality of Electronic Design
A tamper resistant hardware accelerator for RSA cryptographic applications
Journal of Systems Architecture: the EUROMICRO Journal
Implementation of the SHA-2 Hash Family Standard Using FPGAs
The Journal of Supercomputing
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Protecting cryptographic keys and computations via virtual secure coprocessing
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
A hardware version of the RSA using the Montgomery's algorithm with systolic arrays
Integration, the VLSI Journal
Information Processing Letters
Two-prime RSA immune cryptosystem and its FPGA implementation
GLSVLSI '05 Proceedings of the 15th ACM Great Lakes symposium on VLSI
Data encryption protocols for electronic mail
ACM SIGSAC Review - Resources: part II
Elliptic curve cryptography: Java implementation
Proceedings of the 1st annual conference on Information security curriculum development
Key agreement from weak bit agreement
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
An abuse-free fair contract signing protocol based on the RSA signature
WWW '05 Proceedings of the 14th international conference on World Wide Web
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
A Management Perspective on Risk of Security Threats to Information Systems
Information Technology and Management
Delegation of cryptographic servers for capture-resilient devices
Distributed Computing
Image authentication based on digital signature and semi-fragile watermarking
Journal of Computer Science and Technology
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Revocation of privacy-enhanced public-key certificates
Journal of Systems and Software - Special issue: Software engineering education and training
SERAT: SEcure role mApping technique for decentralized secure interoperability
Proceedings of the tenth ACM symposium on Access control models and technologies
Verifying completeness of relational query results in data publishing
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Architecture for Protecting Critical Secrets in Microprocessors
Proceedings of the 32nd annual international symposium on Computer Architecture
IEEE Transactions on Computers
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
IEEE Transactions on Knowledge and Data Engineering
A crisscross checking technique for tamper detection in halftone images
Journal of Systems and Software
A Public Key Cryptosystem Based On A Subgroup Membership Problem
Designs, Codes and Cryptography
Encyclopedia of Computer Science
Encyclopedia of Computer Science
ACM SIGOPS Operating Systems Review
ACM Transactions on Algorithms (TALG)
On-demand design service innovations
IBM Journal of Research and Development
Efficient key establishment for group-based wireless sensor deployments
Proceedings of the 4th ACM workshop on Wireless security
Current mask generation: a transistor level security against DPA attacks
SBCCI '05 Proceedings of the 18th annual symposium on Integrated circuits and system design
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
How (and why) to introduce Monte Carlo randomized algorithms into a basic algorithms course?
Journal of Computing Sciences in Colleges
Modifying YCN key assignment scheme to resist the attack from Hwang
Information Processing Letters
Secure collaboration in mediator-free environments
Proceedings of the 12th ACM conference on Computer and communications security
Password authenticated key exchange using hidden smooth subgroups
Proceedings of the 12th ACM conference on Computer and communications security
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Distribution of digital contents based on public key considering execution speed and security
Information Sciences: an International Journal
Alternative Schemes for Dynamic Secure VPN Deployment in UMTS
Wireless Personal Communications: An International Journal
Index Calculation Attacks on RSA Signature and Encryption
Designs, Codes and Cryptography
Data Integration for Medical Information Management
Journal of VLSI Signal Processing Systems
Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System
Information Systems Frontiers
Efficient pre-processing for large window-based modular exponentiation using genetic algorithms
IEA/AIE'2003 Proceedings of the 16th international conference on Developments in applied artificial intelligence
IEEE Security and Privacy
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme
IEEE Transactions on Dependable and Secure Computing
Improving the compression and encryption of images using FPGA-based cryptosystems
Multimedia Tools and Applications
Design of a scalable RSA and ECC crypto-processor
ASP-DAC '03 Proceedings of the 2003 Asia and South Pacific Design Automation Conference
Certifying authenticity via fiber-infused paper
ACM SIGecom Exchanges
The maturity of open systems for B2B
ACM SIGecom Exchanges
Speeding up Exponentiation using an Untrusted Computational Resource
Designs, Codes and Cryptography
Teaching the power of randomization using a simple game
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Performance analysis of TLS Web servers
ACM Transactions on Computer Systems (TOCS)
Practical and efficient fair document exchange over networks
Journal of Network and Computer Applications
Challenging projects and virtual labs in web-enhanced networking technology classes
Journal of Computing Sciences in Colleges
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
Improving secure server performance by re-balancing SSL/TLS handshakes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Provably secure password-based authentication in TLS
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
An 830mW, 586kbps 1024-bit RSA chip design
Proceedings of the conference on Design, automation and test in Europe: Designers' forum
To secure XML documents with the extension function of XSLT
Software—Practice & Experience - Research Articles
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
The Journal of Supercomputing
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Spatial domain image hiding scheme using pixel-values differencing
Fundamenta Informaticae
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Static validation of security protocols
Journal of Computer Security
Oblivious signature-based envelope
Distributed Computing
How fast can a very robust read be?
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Security of the design of time-stamped signatures
Journal of Computer and System Sciences
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Authentication and integrity in outsourced databases
ACM Transactions on Storage (TOS)
Perspectives for cryptographic long-term security
Communications of the ACM - Privacy and security in highly dynamic systems
A new approach to intelligent text filtering based on novelty detection
ADC '06 Proceedings of the 17th Australasian Database Conference - Volume 49
Optimum Digit Serial GF(2^m) Multipliers for Curve-Based Cryptography
IEEE Transactions on Computers
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Secure evolvable hardware for public-key cryptosystems
New Generation Computing - Evolutionary computation
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
On two DES implementations secure against differential power analysis in smart-cards
Information and Computation
A novel color image hiding scheme using block truncation coding
Fundamenta Informaticae
Three architectures for trusted data dissemination in edge computing
Data & Knowledge Engineering - Special issue: ER 2004
Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
Foundations of cryptography: a primer
Foundations and Trends® in Theoretical Computer Science
A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion
Neural Processing Letters
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Scalable and secure group rekeying in wireless sensor networks
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
A proposal of encoded computations for distributed massively multiplayer online services
Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology
User centricity: a taxonomy and open issues
Proceedings of the second ACM workshop on Digital identity management
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Optimizing BGP security by exploiting path stability
Proceedings of the 13th ACM conference on Computer and communications security
Bridging a gap in the proposed personal health record
HIKM '06 Proceedings of the international workshop on Healthcare information and knowledge management
Prototyping a novel platform for free-trade of digital content
WebMedia '06 Proceedings of the 12th Brazilian Symposium on Multimedia and the web
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Equipping smart devices with public key signatures
ACM Transactions on Internet Technology (TOIT)
Low-Weight Polynomial Form Integers for Efficient Modular Multiplication
IEEE Transactions on Computers
A New Systolic Architecture for Modular Division
IEEE Transactions on Computers
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
On the composition of authenticated Byzantine Agreement
Journal of the ACM (JACM)
New Vistas in elliptic curve cryptography
Information Security Tech. Report
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring
Theoretical Computer Science
Fast hardware for modular exponentiation with efficient exponent pre-processing
Journal of Systems Architecture: the EUROMICRO Journal
Implementing regular cash with blind fixed-value electronic coins
Computer Standards & Interfaces
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
On the semantics of Alice&Bob specifications of security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
An Adaptive Steganographic Scheme for Color Images
Fundamenta Informaticae
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Fundamenta Informaticae
Parallel Computing - Algorithmic skeletons
Design of an UHF RFID transponder for secure authentication
Proceedings of the 17th ACM Great Lakes symposium on VLSI
Efficient pipelining for modular multiplication architectures in prime fields
Proceedings of the 17th ACM Great Lakes symposium on VLSI
Cybernetics and Systems Analysis
The Journal of Supercomputing
Scalability and security in biased many-to-one communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
Proxy-protected signature secure against the undelegated proxy signature attack
Computers and Electrical Engineering
D-cash: A flexible pre-paid e-cash scheme for date-attachment
Electronic Commerce Research and Applications
Hybrid commitments and their applications to zero-knowledge proof systems
Theoretical Computer Science
A zero-stop authentication system for sensor-based embedded real-time applications
Journal of Embedded Computing - Real-Time and Embedded Computing Systems
Secure route structures for parallel mobile agents based systems using fast binary dispatch
Mobile Information Systems
Efficient and Adaptive Threshold Signatures for Ad hoc networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Reversible hiding in DCT-based compressed images
Information Sciences: an International Journal
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptographic system enhancements for the IBM System z9
IBM Journal of Research and Development
Cheat-proof playout for centralized and peer-to-peer gaming
IEEE/ACM Transactions on Networking (TON)
Quantum cryptography: A survey
ACM Computing Surveys (CSUR)
Compact sequential aggregate signatures
Proceedings of the 2007 ACM symposium on Applied computing
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
Public Authentication of 3D Mesh Models
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Provably secure chipcard personalization, or, how to fool malicious insiders
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
MICROCAST: smart card based (micro)pay-per-view for multicast services
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
Lightweight encryption for email
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Kerberized credential translation: a solution to web access control
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Fairplay—a secure two-party computation system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Hand-held computers can be better smart cards
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Addressing Credential Revocation in Grid Environments
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Efficient Routing and Broadcasting in Recursive Interconnection Networks
ICPP '94 Proceedings of the 1994 International Conference on Parallel Processing - Volume 01
Providing Certified Mail Services on the Internet
IEEE Security and Privacy
Special-Purpose Hardware in Cryptanalysis: The Case of 1,024-Bit RSA
IEEE Security and Privacy
Detecting hit shaving in click-through payment schemes
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Towards a framework for handling disputes in payment systems
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
A set of protocols for micropayments in distributed systems
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Developing and deploying corporate cryptographic systems
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
DigiBox: a self-protecting container for information commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Kerberos plus RSA for world wide web security
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Key management in an encrypting file system
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
SNP: an interface for secure network programming
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
SSH: secure login connections over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Implementing a secure rlogin environment: a case study of using a secure network layer protocol
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Kerberized credential translation: a solution to web access control
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Resource access control for an internet user agent
COOTS'97 Proceedings of the 3rd conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3
Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices
Wireless Personal Communications: An International Journal
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment
Wireless Personal Communications: An International Journal
An End-To-End Approach to Distributed Policy Language Implementation
Electronic Notes in Theoretical Computer Science (ENTCS)
A digital watermark for images using the wavelet transform
Integrated Computer-Aided Engineering
Protecting source privacy in federated search
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
Security enhancement for digital signature schemes with fault tolerance in RSA
Information Sciences: an International Journal
Threshold cryptography based on Asmuth-Bloom secret sharing
Information Sciences: an International Journal
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
An efficient CSA architecture for montgomery modular multiplication
Microprocessors & Microsystems
On securing real-time speech transmission over the internet: an experimental study
EURASIP Journal on Applied Signal Processing
Key management for secure multicast over IPv6 wireless networks
EURASIP Journal on Wireless Communications and Networking
An overview of computational complexity
ACM Turing award lectures
A unified and reconfigurable Montgomery Multiplier architecture without four-to-two CSA
Proceedings of the 20th annual conference on Integrated circuits and systems design
Privacy and Anonymity Protection with Blind Threshold Signatures
International Journal of Electronic Commerce
An Efficient Blind Signature Scheme for Information Hiding
International Journal of Electronic Commerce
Cross-layer jamming detection and mitigation in wireless broadcast networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
A secure watermarking scheme for buyer-seller identification and copyright protection
EURASIP Journal on Applied Signal Processing
Secure multimedia authoring with dishonest collaborators
EURASIP Journal on Applied Signal Processing
A provably secure short signature scheme based on discrete logarithms
Information Sciences: an International Journal
An innovative revocation scheme for one-to-many E-services
Electronic Commerce Research and Applications
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
Computers and Electrical Engineering
A practice of a collaborative multipoint medical teleconsultation system on broadband network
Journal of High Speed Networks
Web services discovery in secure collaboration environments
ACM Transactions on Internet Technology (TOIT)
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
ACM Communications in Computer Algebra
Cryptographic strength of ssl/tls servers: current and recent practices
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
A Computer Algorithm for Calculating the Product AB Modulo M
IEEE Transactions on Computers
IEEE Transactions on Computers
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Certificate-less user authentication with consent
Proceedings of the 2007 ACM workshop on Digital identity management
What can identity-based cryptography offer to web services?
Proceedings of the 2007 ACM workshop on Secure web services
Mobile Networks and Applications
High-performance public-key cryptoprocessor for wireless mobile applications
Mobile Networks and Applications
A state-of-the-art elliptic curve cryptographic processor operating in the frequency domain
Mobile Networks and Applications
New and improved architectures for Montgomery modular multiplication
Mobile Networks and Applications
Identity-based ring signatures from RSA
Theoretical Computer Science
A lossless data hiding scheme based on three-pixel block differences
Pattern Recognition
CADS: continuous authentication on data streams
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Computer Standards & Interfaces
Verifying Completeness of Relational Query Answers from Online Servers
ACM Transactions on Information and System Security (TISSEC)
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Anonymous fingerprinting with robust QIM watermarking techniques
EURASIP Journal on Information Security
Mobile broadcast DRM based on user identity card
EURASIP Journal on Wireless Communications and Networking
If NP Languages are Hard on the Worst-Case, Then it is Easy to Find Their Hard Instances
Computational Complexity
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Steganography using overlapping codebook partition
Signal Processing
Transforming semi-honest protocols to ensure accountability
Data & Knowledge Engineering
Algorithm of cipher text containing key to produce cipher text transmitted in network security
AIKED'07 Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6
Electronic Notes in Theoretical Computer Science (ENTCS)
Visualization of cryptographic protocols with GRACE
Journal of Visual Languages and Computing
Comparison of innovative signature algorithms for WSNs
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Modeling viral economies for digital media
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
A low-cost cryptographic processor for security embedded system
Proceedings of the 2008 Asia and South Pacific Design Automation Conference
A simple broadcasting cryptosystem in computer networks using eXclusive-OR
International Journal of Computer Applications in Technology
International Journal of High Performance Computing and Networking
WAP PKI and certification path validation
International Journal of Internet Protocol Technology
A study of securing route structures for mobile agents dispatched in parallel
International Journal of Web Engineering and Technology
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol
International Journal of Security and Networks
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
End-to-end security mechanisms for SMS
International Journal of Security and Networks
A new signature scheme without random oracles
International Journal of Security and Networks
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
International Journal of Information and Computer Security
A Novel Image Hiding Scheme Based on VQ and Hamming Distance
Fundamenta Informaticae
Reconfigurable solutions for very-long arithmetic with applications in cryptography
Proceedings of the 18th ACM Great Lakes symposium on VLSI
Cryptanalysis on an Elgamal-like cryptosystem for encrypting large messages
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Silence detection in secure P2P VoIP multiconferencing
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A new idea in digital signature schemes
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
FPGA based communication security for wireless sensor networks
ESPOCO'05 Proceedings of the 4th WSEAS International Conference on Electronic, Signal Processing and Control
Non-interactive conference key distribution and its applications
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Exploiting social networks for threshold signing: attack-resilience vs. availability
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Data transmission encryption and decryption algorithm in network security
SMO'06 Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
User centricity: A taxonomy and open issues
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Encoding for secure computations in distributed interactive real-time applications
Computer Communications
On the security of a digital signature with message recovery using self-certified public key
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
A new key exchange scheme based on extended Chebyshev polynomials
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
Lossy trapdoor functions and their applications
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Trapdoors for hard lattices and new cryptographic constructions
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Adaptive watermark mechanism for rightful ownership protection
Journal of Systems and Software
Authentication in stealth distributed hash tables
Journal of Systems Architecture: the EUROMICRO Journal
Identity hiding by blind signature scheme
ICECS'03 Proceedings of the 2nd WSEAS International Conference on Electronics, Control and Signal Processing
On the management of grid credentials
Proceedings of the 5th international workshop on Middleware for grid computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference
Off-line economies for digital media
Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video
Video authentication for H.264/AVC using digital signature standard and secure hash algorithm
Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video
Secure and scalable many-to-one symbol transmission for sensor networks
Computer Communications
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
Methods for image authentication: a survey
Multimedia Tools and Applications
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Secure data aggregation in wireless sensor network: a survey
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
A pervasive identification service for physical access control
Proceedings of the 5th international conference on Pervasive services
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
Maximum supported network coverage area and cost evaluation of key pre-distribution schemes
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Fast exponentiation based on common-multiplicand-multiplication and minimal-signed-digit techniques
International Journal of Computer Mathematics
An embedding technique based upon block prediction
Journal of Systems and Software
A methodology to design arbitrary failure detectors for distributed protocols
Journal of Systems Architecture: the EUROMICRO Journal
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
A unified architecture for a public key cryptographic coprocessor
Journal of Systems Architecture: the EUROMICRO Journal
Can quantum mechanics help distributed computing?
ACM SIGACT News
A New ID-Based Deniable Authentication Protocol
Informatica
International Journal of Information and Computer Security
A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcasting
Computational Intelligence and Security
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Self-certified Signatures Based on Discrete Logarithms
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks
MDAI '07 Proceedings of the 4th international conference on Modeling Decisions for Artificial Intelligence
Power and EM Attacks on Passive $13.56\,\textrm{MHz}$ RFID Devices
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
RF-DNA: Radio-Frequency Certificates of Authenticity
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Research in Cryptology
A Timing-Resistant Elliptic Curve Backdoor in RSA
Information Security and Cryptology
Evolutionary Public-Key Cryptographic Circuits
IEA/AIE '08 Proceedings of the 21st international conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: New Frontiers in Applied Artificial Intelligence
Optimized Certificates --- A New Proposal for Efficient Electronic Document Signature Validation
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Fast Point Decompression for Standard Elliptic Curves
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
PETRI NETS '08 Proceedings of the 29th international conference on Applications and Theory of Petri Nets
The Banknote Anti-forgery System Based on Digital Signature Algorithms
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Algebraic Cryptanalysis of CTRU Cryptosystem
COCOON '08 Proceedings of the 14th annual international conference on Computing and Combinatorics
Shared and Searchable Encrypted Data for Untrusted Servers
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Cryptography Adapted to the New European Area of Higher Education
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part II
On the Improvement of the BDF Attack on LSBS-RSA
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Public-Key Cryptosystems with Primitive Power Roots of Unity
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Optimal Extension Field Inversion in the Frequency Domain
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Modular Reduction in GF(2n) without Pre-computational Phase
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Exploiting the Power of GPUs for Asymmetric Cryptography
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Communication Complexity in Algebraic Two-Party Protocols
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Attacks on CKK Family of RFID Authentication Protocols
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Message Quality for Ambient System Security
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
How to Solve Consensus in the Smallest Window of Synchrony
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Revisiting Wiener's Attack --- New Weak Keys in RSA
ISC '08 Proceedings of the 11th international conference on Information Security
An Identity-Based Key Agreement Protocol for the Network Layer
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
The benefits and drawbacks of using electronic identities
Information Security Tech. Report
An Empirical Study on the Performance of Java/.Net Cryptographic APIs
Information Systems Security
Authenticating the query results of text search engines
Proceedings of the VLDB Endowment
The cost of protecting privacy in multimedia applications
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
USIM-based EAP-TLS authentication protocol for wireless local area networks
Computer Standards & Interfaces
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
Journal of Systems Architecture: the EUROMICRO Journal
Efficient attributes for anonymous credentials
Proceedings of the 15th ACM conference on Computer and communications security
Rethinking accountable privacy supporting services: extended abstract
Proceedings of the 4th ACM workshop on Digital identity management
Improving secure long-term archival of digitally signed documents
Proceedings of the 4th ACM international workshop on Storage security and survivability
Beacon certificate push revocation
Proceedings of the 2nd ACM workshop on Computer security architectures
RSA-TBOS signcryption with proxy re-encryption
Proceedings of the 8th ACM workshop on Digital rights management
The investigation of the elliptic curve cryptology applies to the new generation protocol
WSEAS Transactions on Computers
The ring authenticated encryption scheme - How to provide a clue wisely
Information Sciences: an International Journal
Distributed marketplaces using P2P networks and public-key cryptography
Proceedings of the 3rd international conference on Scalable information systems
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces
A novel application of grey system theory to information security (Part I)
Computer Standards & Interfaces
Design of electronic t-out-of-n lotteries on the Internet
Computer Standards & Interfaces
Robust t-out-of-n oblivious transfer mechanism based on CRT
Journal of Network and Computer Applications
A multilayered digital content distribution using a group-key based on web
Future Generation Computer Systems
A light weight buyer-seller watermarking protocol
Advances in Multimedia
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Copyright protection protocols for copyright protection issues
WSEAS Transactions on Computer Research
A matricial public key cryptosystem with digital signature
WSEAS Transactions on Mathematics
Information Sciences: an International Journal
Information Sciences: an International Journal
Side Channels in the McEliece PKC
PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing
Reversible information hiding for VQ indices based on locally adaptive coding
Journal of Visual Communication and Image Representation
Proceedings of the 2009 ACM SIGPLAN workshop on Partial evaluation and program manipulation
Anonymous Fair Transaction Protocols Based on Electronic Cash
International Journal of Electronic Commerce
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
Method for Detecting Vulnerability to Doubling Attacks
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
A CCA Secure Hybrid Damgård's ElGamal Encryption
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
On the Equivalence of Generic Group Models
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
A New Class of Weak Encryption Exponents in RSA
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Conditional Payments for Computing Markets
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
WSEAS Transactions on Circuits and Systems
Concord: a secure mobile data authorization framework for regulatory compliance
LISA'08 Proceedings of the 22nd conference on Large installation system administration conference
NetAuth: supporting user-based network services
SS'08 Proceedings of the 17th conference on Security symposium
A novel key management algorithm in sensor networks
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
A mobile agent platform for distributed network and systems management
Journal of Systems and Software
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
An extended-precision operand computer for integer factoring
AFIPS '84 Proceedings of the July 9-12, 1984, national computer conference and exposition
The implementation of a cryptography-based secure office system
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Evolving service semantics cooperatively: a consumer-driven approach
Autonomous Agents and Multi-Agent Systems
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
Proceedings of the 40th ACM technical symposium on Computer science education
User-aided data authentication
International Journal of Security and Networks
A new modular exponentiation architecture for efficient design of RSA cryptosystem
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
DCT-based reversible data hiding scheme
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Query assurance verification for outsourced multi-dimensional databases
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Montgomery Multiplication with Twice the Bit-Length of Multipliers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Provably Secure Multisignatures in Formal Security Model and Their Optimality
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Fair Exchange from Identity-Based Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A High-Speed Design of Montgomery Multiplier
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A Secure Test Technique for Pipelined Advanced Encryption Standard
IEICE - Transactions on Information and Systems
LSB-Based Steganography Using Reflected Gray Code
IEICE - Transactions on Information and Systems
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA
IEICE - Transactions on Information and Systems
RSA-Based Password-Authenticated Key Exchange, Revisited
IEICE - Transactions on Information and Systems
An enhanced secure buyer-seller watermarking protocol
Proceedings of the International Conference on Advances in Computing, Communication and Control
Analysis and design of a secure key exchange scheme
Information Sciences: an International Journal
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Elliptic Curve Cryptography with the TI-83
Cryptologia
Usable trust anchor management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Quantum resistant public key cryptography: a survey
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Increasing the security of e-commerce systems using multi-agents
International Journal of Business Information Systems
A simple encryption strategy based on addition
Journal of Computing Sciences in Colleges
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
Information Security Applications
An efficient proxy raffle protocol with anonymity-preserving
Computer Standards & Interfaces
Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
A New Lattice Construction for Partial Key Exposure Attack for RSA
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
Information Security and Cryptology --- ICISC 2008
Breaking RSA Generically Is Equivalent to Factoring
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Realizing Hash-and-Sign Signatures under Standard Assumptions
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Design of a Passport Anti-forgery System Based on Digital Signature Schemes
PAISI '09 Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Security Analysis of Multivariate Polynomials for Hashing
Information Security and Cryptology
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme
Information Security and Cryptology
An improved and efficient micro-payment scheme
Journal of Theoretical and Applied Electronic Commerce Research
Partially materialized digest scheme: an efficient verification method for outsourced databases
The VLDB Journal — The International Journal on Very Large Data Bases
Attack on digital multi-signature scheme based on elliptic curve cryptosystem
Journal of Computer Science and Technology
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries
Secure outsourced aggregation via one-way chains
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Partial Key Exposure Attack on CRT-RSA
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Attacking ECDSA-Enabled RFID Devices
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Fair anonymous rewarding based on electronic cash
Journal of Systems and Software
A Generic Protocol for Controlling Access to Mobile Services
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Elliptic Curve Cryptography with the TI-83
Cryptologia
Generalized Russian Cards Problem
COCOA '09 Proceedings of the 3rd International Conference on Combinatorial Optimization and Applications
Securing Mobile Phone Calls with Identity-Based Cryptography
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Cryptanalysis of RSA Using the Ratio of the Primes
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Unifying Zero-Knowledge Proofs of Knowledge
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Reducing the Complexity in the Distributed Computation of Private RSA Keys
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Random Order m-ary Exponentiation
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Continuous Spatial Authentication
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Interactions between computer algebra (Gröbner bases) and cryptology
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Secured communication protocol for internetworking ZigBee cluster networks
Computer Communications
True random number generator based on mouse movement and chaotic hash function
Information Sciences: an International Journal
GenLM: License Management for Grid and Cloud Computing Environments
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Brief announcement: global consistency can be easier than point-to-point communication
Proceedings of the 28th ACM symposium on Principles of distributed computing
Configuration Measurement for FPGA-based Trusted Platforms
RSP '09 Proceedings of the 2009 IEEE/IFIP International Symposium on Rapid System Prototyping
A flexible and efficient key distribution scheme for renewable wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Degenerate keys for RSA encryption
ACM SIGCSE Bulletin
Trading decryption for speeding encryption in Rebalanced-RSA
Journal of Systems and Software
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces
Data hiding based on compressed VQ indices of images
Computer Standards & Interfaces
Recover the tampered image based on VQ indexing
Signal Processing
Distributed Privilege Enforcement in PACS
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Analysis and Optimization of Cryptographically Generated Addresses
ISC '09 Proceedings of the 12th International Conference on Information Security
Privacy-Preserving Policy-Based Information Transfer
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Classification Framework for Fair Content Tracing Protocols
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Fault Attacks on RSA Signatures with Partially Unknown Messages
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Mobile hosts in enterprise service integration
International Journal of Web Engineering and Technology
An on-line electronic check system with mutual authentication
Computers and Electrical Engineering
An efficient signed digit montgomery multiplication for RSA
Journal of Systems Architecture: the EUROMICRO Journal
Secure M2M service space in residential home
Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
Belief, awareness, and limited reasoning: preliminary report
IJCAI'85 Proceedings of the 9th international joint conference on Artificial intelligence - Volume 1
AWGN based seed for random noise generator in ParseKey+
Proceedings of the 2nd international conference on Security of information and networks
Pushing the limits of one-time signatures
Proceedings of the 2nd international conference on Security of information and networks
Web-based election system for small scale to medium scale academic societies
DIWEB'09 Proceedings of the 9th WSEAS international conference on Distance learning and web engineering
A framework for identity privacy in SIP
Journal of Network and Computer Applications
Variations on a theme by Akl and Taylor: Security and tradeoffs
Theoretical Computer Science
Recent progress in quantum algorithms
Communications of the ACM
SCON: Secure management of continuity in sensor networks
Computer Communications
A lightweight secure protocol for wireless sensor networks
Computer Communications
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
Secure distributed intelligent networks
Computer Communications
Technical challenges of network anonymity
Computer Communications
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A note on efficient implementation of prime generation algorithms in small portable devices
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improved server assisted signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
An ID-based multisignature scheme without reblocking and predetermined signing order
Computer Standards & Interfaces
Design of a fair proxy raffle protocol on the Internet
Computer Standards & Interfaces
A secure on-line software transaction scheme
Computer Standards & Interfaces
An efficient password authenticated key exchange protocol for imbalanced wireless networks
Computer Standards & Interfaces
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
Simulations of modular multipliers on FPGA
AsiaMS '07 Proceedings of the IASTED Asian Conference on Modelling and Simulation
Reversible watermarking for knowledge digest embedding and reliability control in medical images
IEEE Transactions on Information Technology in Biomedicine
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps
Computers and Electrical Engineering
Anonymous credentials on a standard java card
Proceedings of the 16th ACM conference on Computer and communications security
Multi-level visual secret sharing scheme with smooth-looking
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Collect and broadcast news in security
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A new algorithm for high-speed modular multiplication design
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Integration of a secure mobile payment system in a GSM/UMTS SIM smart card
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
A proposal for an authentication method for traceability in physical distribution
CSN '07 Proceedings of the Sixth IASTED International Conference on Communication Systems and Networks
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
Computing arbitrary functions of encrypted data
Communications of the ACM
Self-healing key management service for mobile ad hoc networks
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Scalable verification for outsourced dynamic databases
Proceedings of the VLDB Endowment
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
International Journal of Security and Networks
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Proactive Byzantine Quorum Systems
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
PSS Is Secure against Random Fault Attacks
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Teaching Public-Key Cryptography in School
ISSEP '10 Proceedings of the 4th International Conference on Informatics in Secondary Schools - Evolution and Perspectives: Teaching Fundamentals Concepts of Informatics
Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
The ephemerizer: making data disappear
The ephemerizer: making data disappear
Secure construction of k-unlinkable patient records from distributed providers
Artificial Intelligence in Medicine
Watermarking protocol for protecting user's right in content based image retrieval
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Compressed-domain temporal adaptation-resilient watermarking for H.264 video authentication
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Improving the security of McEliece-like public key cryptosystem based on LDPC codes
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Detecting intrusion faults in remotely controlled systems
ACC'09 Proceedings of the 2009 conference on American Control Conference
A practical anonymous off-line multi-authority payment scheme
Electronic Commerce Research and Applications
A New Rabin-type Trapdoor Permutation Equivalent to Factoring
Electronic Notes in Theoretical Computer Science (ENTCS)
Survey on anonymous communications in computer networks
Computer Communications
Secure information storage and retrieval using new results in cryptography
Information Processing Letters
Information Processing Letters
Modifying YCN key assignment scheme to resist the attack from Hwang
Information Processing Letters
A note on quadratic residuosity and UP
Information Processing Letters
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
A probability model for reconstructing secret sharing under the internet environment
Information Sciences: an International Journal
Distribution of digital contents based on public key considering execution speed and security
Information Sciences: an International Journal
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Ownership-attached unblinding of blind signatures for untraceable electronic cash
Information Sciences: an International Journal
An overview of RFID tags and new cryptographic developments
Information Security Tech. Report
Monitoring for security intrusion using performance signatures
Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering
Parallel computation for LUC Cryptosystems on distributed memory multiprocessor machine
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
An introduction to implementation attacks and countermeasures
MEMOCODE'09 Proceedings of the 7th IEEE/ACM international conference on Formal Methods and Models for Codesign
A flexible implementation of a web-based election system for educational organizations
WSEAS Transactions on Computers
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Resisting node spoofing attacks in random key predistribution schemes: a uniform design
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Security, privacy, and accountability in wireless access networks
IEEE Wireless Communications
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
Distributed secret on the basis of the linear correcting codes
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
Speeding up Euclid's GCD algorithm with no magnitude comparisons
International Journal of Information and Computer Security
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Fault-tolerant authentication services
International Journal of Computers and Applications
International Journal of Parallel Programming - Special issue on the 19th international symposium on computer architecture and high performance computing (SBAC-PAD 2007)
An Image Authentication Based on Discrete Fourier Transform
Fundamenta Informaticae
Key establishment for layered group-based Wireless Sensor Networks
International Journal of Ad Hoc and Ubiquitous Computing
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
DESCV--A Secure Wireless Communication Scheme for Vehicle ad hoc Networking
Mobile Networks and Applications
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
An adjusted-purpose digital watermarking technique
Pattern Recognition
Hiding secret data in images via predictive coding
Pattern Recognition
Cryptanalysis of RSA with more than one decryption exponent
Information Processing Letters
Providing data confidentiality against malicious hosts in Shared Data Spaces
Science of Computer Programming
A cryptography based privacy preserving solution to mine cloud data
Proceedings of the Third Annual ACM Bangalore Conference
Low-exponent RSA with related messages
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Equivocable oblivious transfer
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
New modular multiplication algorithms for fast modular exponentiation
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
On diffie-hellman key agreement with short exponents
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Kleptography: using cryptography against cryptography
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Stronger security proofs for RSA and rabin bits
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Collision-free accumulators and fail-stop signature schemes without trees
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Selective forgery of RSA signatures using redundancy
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Some considerations concerning the selection of RSA moduli
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Building cyclic elliptic curves modulo large primes
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A formal approach to security architectures
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Discrete logarithm based protocols
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
ESIGN: an efficient digital signature implementation for smart cards
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Non-interactive public-key cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems with very small key lengths
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Batch Diffie-Hellmam key agreement systems and their application to portable communications
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
High-speed implementation methods for RSA scheme
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
How to make efficient fail-stop signatures
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Secure audio teleconferencing: a practical solution
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Securing traceability of ciphertexts: towards a secure software key escrow system
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Restrictive binding of secret-key certificates
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Fast RSA-type schemes based on singular cubic curves y2 + axy ≡ x3 (mod n)
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Random sources for cryptographic systems
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
A public key analog cryptosystem
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Blinding for unanticipated signatures
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Identity-based encryption based on DHIES
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Proceedings of the 1982 conference on Cryptography
Ein effizienzvergleich der Faktorisierungsverfahren von Morrison-Hrillhart und Schroeppel
Proceedings of the 1982 conference on Cryptography
Cryptanalysis of RSA with private key d less than N0:292
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure hash-and-sign signatures without the random oracle
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
New public key cryptosystems based on the dependent-RSA problems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Resistance against general iterated attacks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An analysis of exponentiation based on formal languages
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Factorization of a 512-bit RSA modulus
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Computing inverses over a shared secret modulus
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Confirmer signature schemes secure against adaptive adversaries
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Security aspects of practical quantum cryptography
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
New attacks on PKCS#1 v1.5 encryption
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Cox-Rower architecture for fast parallel montgomery multiplication
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Unbridle the bit-length of a crypto-coprocessor with montgomery multiplication
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
When stream cipher analysis meets public-key cryptography
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Implementation of smartcard using multi authentication method
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
MKPS: a multi-level key pre-distribution scheme for secure wireless sensor networks
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction platforms and techniques
An elliptic curve backdoor algorithm for RSASSA
IH'06 Proceedings of the 8th international conference on Information hiding
An E-unification algorithm for analyzing protocols that use modular exponentiation
RTA'03 Proceedings of the 14th international conference on Rewriting techniques and applications
On the sequentiality of three optimal structured multisignature schemes
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Cryptography and the methodology of provable security
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Grouping verifiable content for selective disclosure
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Permanent fault attack on the parameters of RSA with CRT
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Backdoor attacks on black-box ciphers exploiting low-entropy plaintexts
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Digital signature schemes with restriction on signing capability
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Parallel authentication and public-key encryption
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Robust software tokens: yet another method for securing user's digital identity
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
High order linearization equation (HOLE) attack on multivariate public key cryptosystems
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Deterministic polynomial time equivalence between factoring and key-recovery attack on Takagi's RSA
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Secure linear algebra using linearly recurrent sequences
TCC'07 Proceedings of the 4th conference on Theory of cryptography
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
A method for sending confidential messages to a group without trusted parties
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Enhanced doubling attacks on signed-all-bits set recoding
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
CRT RSA algorithm protected against fault attacks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
A RT0-based compliance checker model for automated trust negotiation
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Privacy protection in PKIs: a separation-of-authority approach
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A two-server, sealed-bid auction protocol
FC'02 Proceedings of the 6th international conference on Financial cryptography
Cryptographic primitives enforcing communication and storage complexity
FC'02 Proceedings of the 6th international conference on Financial cryptography
Hardware fault attack on RSA with CRT revisited
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Speeding up secure sessions establishment on the internet
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient fixed-size systolic arrays for the modular multiplication
COCOON'99 Proceedings of the 5th annual international conference on Computing and combinatorics
Efficient and non-malleable proofs of plaintext knowledge and applications
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Why provable security matters?
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Biometric digital key mechanisms for telebiometric authentication based on biometric certificate
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
VECPAR'02 Proceedings of the 5th international conference on High performance computing for computational science
A WTLS handshake protocol with user anonymity and forward secrecy
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
Rethinking chosen-ciphertext security under Kerckhoffs'assumption
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Provably secure public-key encryption for length-preserving chaumian mixes
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Fast elliptic curve arithmetic and improved weil pairing evaluation
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Secure applications of Pedersen's distributed key generation protocol
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
A provably secure blind signature scheme
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Double-size bipartite modular multiplication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Hash-and-sign with weak hashing made secure
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Verification across intellectual property boundaries
CAV'07 Proceedings of the 19th international conference on Computer aided verification
A scalable and secure cryptographic service
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Certificate and authority application based on grid environment
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
An abuse-free fair contract-signing protocol based on the RSA signature
IEEE Transactions on Information Forensics and Security
Improving e-payment security using Elliptic Curve Cryptosystem
Electronic Commerce Research
Continuous authentication on relational streams
The VLDB Journal — The International Journal on Very Large Data Bases
Fast Reconfigurable Elliptic Curve Cryptography Acceleration for GF(2m) on 32 bit Processors
Journal of Signal Processing Systems
A group-based security policy for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Biometric digital signature key generation and cryptography communication based on fingerprint
FAW'07 Proceedings of the 1st annual international conference on Frontiers in algorithmics
A novel biology-based reversible data hiding fusion scheme
FAW'07 Proceedings of the 1st annual international conference on Frontiers in algorithmics
Speeding up scalar multiplication using a new signed binary representation for integers
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Practical cryptanalysis of SFLASH
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
On secure multi-party computation in black-box groups
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Efficient ID-based digital signatures with message recovery
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Anonymity 2.0 - X.509 extensions supporting privacy-friendly authentication
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
Design of secure watermarking scheme for watermarking protocol
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Authenticating kNN query results in data publishing
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Self-authorized public key management for home networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A simple and efficient key exchange scheme against the smart card loss problem
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
When e-th roots become easier than factoring
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
How to build a hash function from any collision-resistant function
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Risk balance in exchange protocols
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Toward acceleration of RSA using 3D graphics hardware
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
The Martini Synch: joint fuzzy hashing via error correction
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
A probabilistic applied pi-calculus
APLAS'07 Proceedings of the 5th Asian conference on Programming languages and systems
Power analysis for secret recovering and reverse engineering of public key algorithms
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Comparative studies in key disagreement correction process on wireless key agreement system
WISA'07 Proceedings of the 8th international conference on Information security applications
Boudot's range-bounded commitment scheme revisited
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Efficient sequential aggregate signed data
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Threshold RSA for dynamic and ad-hoc groups
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
RSA moduli with a predetermined portion: techniques and applications
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Robust threshold schemes based on the Chinese remainder theorem
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Cryptanalysis of the TRMS signature scheme of PKC'05
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Another generalization of Wiener's attack on RSA
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
DAKOTA: hashing from a combination of modular arithmetic and symmetric cryptography
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Generic security-amplifying methods of ordinary digital signatures
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
COORDINATION'08 Proceedings of the 10th international conference on Coordination models and languages
Dual-residue montgomery multiplication
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
A direction to avoid re-encryption in cryptographic file sharing
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
On the BRIP algorithms security for RSA
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Small secret key attack on a variant of RSA (due to Takagi)
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Off-line/on-line signatures: theoretical aspects and experimental results
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
An optimized hardware architecture for the montgomery multiplication algorithm
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
User-friendly grid security architecture and protocols
Proceedings of the 13th international conference on Security protocols
A secure communication scheme for mobile wireless sensor networks using hamming distance
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Content-based image watermarking via public-key cryptosystems
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
An efficient re-keying scheme for cluster based wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
An efficient user authentication and key exchange protocol for mobile client-server environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
Public-key cryptography from different assumptions
Proceedings of the forty-second ACM symposium on Theory of computing
Toward trusted wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Joint watermarking and encryption of color images in the Fibonacci-Haar domain
EURASIP Journal on Advances in Signal Processing
Modelling, designing, and implementing a family-based health record prototype
Computers in Biology and Medicine
Privacy-preserving trust verification
Proceedings of the 15th ACM symposium on Access control models and technologies
Parallel computation of modular exponentiation for fast cryptography
International Journal of High Performance Systems Architecture
Efficient hardware for modular exponentiation using the sliding-window method
International Journal of High Performance Systems Architecture
Security analysis of mobile web service provisioning
International Journal of Internet Technology and Secured Transactions
A new construction of knapsack PKC by using a random sequence
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Tri-layer stego for enhanced security: a keyless random approach
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
ACM Transactions on Computer Systems (TOCS)
Symmetric-key homomorphic encryption for encrypted data processing
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Dynamic resiliency analysis of key predistribution in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A lightweight fast handover authentication scheme in mobile networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure distortion computation among untrusting parties using homomorphic encryption
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Novel approach design of elliptic curve cryptography implementation in VLSI
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Finite field arithmetic for cryptography
IEEE Circuits and Systems Magazine
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs
Wireless Personal Communications: An International Journal
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
A new scheme of key distribution using implicit security in wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Efficient implementation of elliptic curve cryptography using low-power digital signal processor
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
RIPPLE authentication for network coding
INFOCOM'10 Proceedings of the 29th conference on Information communications
Privacy and confidentiality in context-based and epidemic forwarding
Computer Communications
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
A new fragile watermarking scheme and its security evaluation
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Collusion-resistant privacy-preserving data mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Model checking detectability of attacks in multiagent systems
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
A distributed sinkhole detection method using cluster analysis
Expert Systems with Applications: An International Journal
W/CMS: open-ended web-based contract management system
ACE'10 Proceedings of the 9th WSEAS international conference on Applications of computer engineering
A safe antifraud system for art: safeart
WSEAS Transactions on Information Science and Applications
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
A novel DRM framework for peer-to-peer music content delivery
Journal of Systems and Software
An efficient implementation of montgomery powering ladder in reconfigurable hardware
SBCCI '10 Proceedings of the 23rd symposium on Integrated circuits and system design
A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems
International Journal of Ad Hoc and Ubiquitous Computing
An SSH-based toolkit for user-based network services
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Performance of two one-time signature schemes in space/time constrained environments
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Flexible key exchange negotiation for wireless sensor networks
Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Journal of Intelligent Manufacturing
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
Elliptic curves cryptosystems for ecommerce applications
MCBE'10/MCBC'10 Proceedings of the 11th WSEAS international conference on mathematics and computers in business and economics and 11th WSEAS international conference on Biology and chemistry
Secure steganography for audio signals
ISCGAV'10 Proceedings of the 10th WSEAS international conference on Signal processing, computational geometry and artificial vision
Using asymmetric keys in a certified trust model for multiagent systems
Expert Systems with Applications: An International Journal
pSHS: a scalable parallel software implementation of Montgomery multiplication for multicore systems
Proceedings of the Conference on Design, Automation and Test in Europe
Fault-based attack of RSA authentication
Proceedings of the Conference on Design, Automation and Test in Europe
An embedded platform for privacy-friendly road charging applications
Proceedings of the Conference on Design, Automation and Test in Europe
A new CRT-RSA algorithm resistant to powerful fault attacks
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Measurement-based and universal blind quantum computation
SFM'10 Proceedings of the Formal methods for quantitative aspects of programming languages, and 10th international conference on School on formal methods for the design of computer, communication and software systems
Towards privacy-enhancing identity management in mashup-providing platforms
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Additively homomorphic encryption with d-operand multiplications
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Factorization of a 768-bit RSA modulus
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Coordinate blinding over large prime fields
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Algorithms and theory of computation handbook
Algorithms and theory of computation handbook
Crypto topics and applications I
Algorithms and theory of computation handbook
Crypto topics and applications II
Algorithms and theory of computation handbook
Montgomery multiplication on the cell
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
A timing attack against patterson algorithm in the McEliece PKC
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Side-channel analysis of cryptographic software via early-terminating multiplications
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
A certifying compiler for zero-knowledge proofs of knowledge based on Σ-protocols
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Low-cost client puzzles based on modular exponentiation
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
A novel node level security policy framework for wireless sensor networks
Journal of Network and Computer Applications
Efficient key management for preserving HIPAA regulations
Journal of Systems and Software
Encoding Basic Arithmetic Operations for SAT-Solvers
Proceedings of the 2010 conference on Artificial Intelligence Research and Development: Proceedings of the 13th International Conference of the Catalan Association for Artificial Intelligence
High-performance modular multiplication on the cell processor
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Speeding up bipartite modular multiplication
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
On the broadcast and validity-checking security of PKCS#1 v1.5 encryption
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Shrinking the keys of discrete-log-type lossy trapdoor functions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Intrusion detection and security policy framework for distributed environments
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Public key cryptographic system using mandelbrot sets
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Choosing key sizes for cryptography
Information Security Tech. Report
Public-key encryption based on Chebyshev polynomials over GF(q)
Information Processing Letters
Scan-based attack against elliptic curve cryptosystems
Proceedings of the 2010 Asia and South Pacific Design Automation Conference
A security framework for privacy-preserving data aggregation in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Independently verifiable decentralized role-based delegation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
IEEE Transactions on Wireless Communications
Fair exchange of valuable information: A generalised framework
Journal of Computer and System Sciences
Solving generalized small inverse problems
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Publishing upper half of RSA decryption exponent
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
An improvement of key generation algorithm for Gentry's homomorphic encryption scheme
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Preimage attacks against variants of very smooth hash
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Automatic generation of sigma-protocols
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Validity models of electronic signatures and their enforcement in practice
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Design and analysis of "flexible" k-out-of-n signatures
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
Design and implementation of a public key-based group collaboration system
Computer Communications
Comments on the security of Chen's authenticated encryption scheme
Computers and Electrical Engineering
Achieving autonomous fair exchange in ubiquitous network settings
Journal of Network and Computer Applications
A novel cryptoprocessor architecture for chained Merkle signature scheme
Microprocessors & Microsystems
Secure mobile communication via identity-based cryptography and server-aided computations
The Journal of Supercomputing
Privacy-preserving activity scheduling on mobile devices
Proceedings of the first ACM conference on Data and application security and privacy
A high-performance unified-field reconfigurable cryptographic processor
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Safeart: a digital signature based anti-counterfeit system for art
SSIP '09/MIV'09 Proceedings of the 9th WSEAS international conference on signal, speech and image processing, and 9th WSEAS international conference on Multimedia, internet & video technologies
Limitations on design principles for public key protocols
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Cryptovirology: extortion-based security threats and countermeasures
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Design and implementation of real time secured RS232 link for multiple FPGA communication
Proceedings of the 2011 International Conference on Communication, Computing & Security
High-level secured signature scheme
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
An axiomatic basis of trust in distributed systems
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
One-time trapdoor one-way functions
ISC'10 Proceedings of the 13th international conference on Information security
A short signature scheme from the RSA family
ISC'10 Proceedings of the 13th international conference on Information security
Breaking and building of threshold signcryption schemes
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Weak keys in RSA with primes sharing least significant bits
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
IASSim: a programmable emulator for the princeton IAS/Von Neumann machine
Proceedings of the 42nd ACM technical symposium on Computer science education
Workload characterization of cryptography algorithms for hardware acceleration
Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
Engineering SSL-based systems for enhancing system performance
Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
The ForwardDiffsig scheme for multicast authentication
IEEE/ACM Transactions on Networking (TON)
Cross-layer jamming detection and mitigation in wireless broadcast networks
IEEE/ACM Transactions on Networking (TON)
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
A mission-critical certification authority architecture for high reliability and response time
International Journal of Critical Computer-Based Systems
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
Energy analysis of RSA and ELGAMAL algorithms for wireless sensor networks
ELECTRO'10 Proceedings of the 8th WSEAS international conference on Applied electromagnetics, wireless and optical communications
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Defeating RSA multiply-always and message blinding countermeasures
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Beyond provable security verifiable IND-CCA security of OAEP
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Signatures on randomizable ciphertexts
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
A novel and efficient cryptosystem for large message encryption
International Journal of Information and Communication Technology
A steganographic scheme by fully exploiting modification directions
Expert Systems with Applications: An International Journal
Privacy preservation with X.509 standard certificates
Information Sciences: an International Journal
How (Not) to design strong-RSA signatures
Designs, Codes and Cryptography
SSLShader: cheap SSL acceleration with commodity processors
Proceedings of the 8th USENIX conference on Networked systems design and implementation
International Journal of Reconfigurable Computing - Special issue on selected papers from the southern programmable logic conference (SPL2010)
A file protection system based on a trapdoor one-way hash function
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A new public key cryptosystem based on matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Biometric fusion image for sharing over satellite communication with pseudo-random secret code
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
An ID-based multi-signer universal designated multi-verifier signature scheme
Information and Computation
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
Black-box circular-secure encryption beyond affine functions
TCC'11 Proceedings of the 8th conference on Theory of cryptography
An efficient anonymous authentication protocol for mobile pay-TV
Journal of Network and Computer Applications
A security scheme for dependable key insertion in mobile embedded devices
International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
Prime field ECDSA signature processing for reconfigurable embedded systems
International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
New sealed-bid electronic auction with fairness, security and efficiency
Journal of Computer Science and Technology
Loss tolerant video streaming authentication in heterogeneous wireless networks
Computer Communications
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
Fast parallel DNA-based algorithms for molecular computation: discrete logarithm
The Journal of Supercomputing
Standardization of Quantum Key Distribution in ETSI
Wireless Personal Communications: An International Journal
CrowdLogging: distributed, private, and anonymous search logging
Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval
Note: A note on the average number of RSA fixed points
Theoretical Computer Science
Implementation of Shor's algorithm on a linear nearest neighbour qubit array
Quantum Information & Computation
New identity-based key-insulated convertible multi-authenticated encryption scheme
Journal of Network and Computer Applications
Gate elimination for linear functions and new feebly secure constructions
CSR'11 Proceedings of the 6th international conference on Computer science: theory and applications
Authenticated Byzantine generals in dual failure model
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
Security'08 Proceedings of the 16th International conference on Security protocols
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Analyzing standards for RSA integers
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Benaloh's dense probabilistic encryption revisited
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
On constructing 1-1 one-way functions
Studies in complexity and cryptography
Three XOR-lemmas - an exposition
Studies in complexity and cryptography
An efficient rational secret sharing scheme based on the Chinese remainder theorem
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Meetings through the cloud: Privacy-preserving scheduling on mobile devices
Journal of Systems and Software
Privacy in mobile computing for location-sharing-based services
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Public communication based on russian cards protocol: a case study
COCOA'11 Proceedings of the 5th international conference on Combinatorial optimization and applications
An efficient cacheable secure scalar product protocol for privacy-preserving data mining
DaWaK'11 Proceedings of the 13th international conference on Data warehousing and knowledge discovery
Wireless Personal Communications: An International Journal
ESA'11 Proceedings of the 19th European conference on Algorithms
Cryptanalysis of RSA with small prime combination
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
A new signature scheme based on multiple hard number theoretic problems
ISRN Communications and Networking
A review on body area networks security for healthcare
ISRN Communications and Networking
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
To infinity and beyond: combined attack on ECC using points of low order
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Modulus fault attacks against RSA-CRT signatures
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
FPGA implementation of pairings using residue number system and lazy reduction
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Self-adaptive service monitoring
ICAIS'11 Proceedings of the Second international conference on Adaptive and intelligent systems
Twin clouds: secure cloud computing with low latency
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Traitor tracing schemes for protected software implementations
Proceedings of the 11th annual ACM workshop on Digital rights management
Digital identity security architecture in Ethos
Proceedings of the 7th ACM workshop on Digital identity management
Exploitation as an inference problem
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Security analysis of an RSA key generation algorithm with a large private key
ISC'11 Proceedings of the 14th international conference on Information security
Long-term confidentiality of PKI
Communications of the ACM
Recommendation in the end-to-end encrypted domain
Proceedings of the 20th ACM international conference on Information and knowledge management
Cryptography in constant parallel time
Cryptography in constant parallel time
Robust watermarking of compressed JPEG images in encrypted domain
Transactions on data hiding and multimedia security VI
Optimized two party privacy preserving association rule mining using fully homomorphic encryption
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
A mathematical problem for security analysis of hash functions and pseudorandom generators
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
Design and characterisation of an AES chip embedding countermeasures
International Journal of Intelligent Engineering Informatics
Fast Access to Distributed Atomic Memory
SIAM Journal on Computing
On partial encryption of RDF-Graphs
ISWC'05 Proceedings of the 4th international conference on The Semantic Web
Breaking four mix-related schemes based on universal re-encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Formal security model of multisignatures
ISC'06 Proceedings of the 9th international conference on Information Security
On the equivalence of RSA and factoring regarding generic ring algorithms
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Practical and secure e-mail system (PractiSES)
ADVIS'04 Proceedings of the Third international conference on Advances in Information Systems
A subliminal channel in secret block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Secure sessions from weak secrets
Proceedings of the 11th international conference on Security Protocols
Protocols for supporting a public key infrastructure in ad hoc networks
Proceedings of the 11th international conference on Security Protocols
Load balanced block lanczos algorithm over GF(2) for factorization of large keys
HiPC'06 Proceedings of the 13th international conference on High Performance Computing
An ideal and robust threshold RSA
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
CMSS: an improved merkle signature scheme
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
An efficient short certificate-based signature scheme
Journal of Systems and Software
Capture resilient elgamal signature protocols
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
LSec: lightweight security protocol for distributed wireless sensor network
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Improving the ID-Based key exchange protocol in wireless mobile ad hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Authenticating multi-dimensional query results in data publishing
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A secure and efficient secret sharing scheme with general access structures
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Cryptanalysis of timestamp-based password authentication schemes using smart cards
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Secure set membership using 3SAT
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A fast RSA implementation on itanium 2 processor
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Privacy-preserving electronic health records
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Visual document authentication using human-recognizable watermarks
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Authentication of outsourced databases using signature aggregation and chaining
DASFAA'06 Proceedings of the 11th international conference on Database Systems for Advanced Applications
Anonymous authentication with optional shared anonymity revocation and linkability
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Optimal use of montgomery multiplication on smart cards
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Independent zero-knowledge sets
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
A parallel modular exponentiation scheme for transformed exponents
APPT'05 Proceedings of the 6th international conference on Advanced Parallel Processing Technologies
A grid authentication system with revocation guarantees
HiPC'05 Proceedings of the 12th international conference on High Performance Computing
Spreading alerts quietly and the subgroup escape problem
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Server-Aided verification: theory and practice
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Multi-Dimensional hash chains and application to micropayment schemes
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
A novel remote user authentication scheme through dynamic login identity
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Secure mutual distrust transaction tracking using cryptographic elements
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
On the security of probabilistic multisignature schemes and their optimality
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Optimization of the MOVA undeniable signature scheme
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Questionable encryption and its applications
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Multimedia digital right management using selective scrambling for mobile handset
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
New key management systems for multilevel security
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Efficient dos resistant multicast authentication schemes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A fair multimedia exchange protocol
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Solvability of a system of bivariate polynomial equations over a finite field
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Solvability of a system of bivariate polynomial equations over a finite field
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
An improved multi-stage (t, n)-threshold secret sharing scheme
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Breaking ciphers with COPACOBANA –a cost-optimized parallel code breaker
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Fast generation of prime numbers on portable devices: an update
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Why one should also secure RSA public key elements
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Superscalar coprocessor for high-speed curve-based cryptography
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Immediate data authentication for multicast in resource constrained network
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
An efficient implementation of a threshold RSA signature scheme
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
On the generation of fast verifiable IPv6 addresses
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part IV
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Towards secure mobile agent based e-cash system
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
A technique of embedding digital data in an image compression code reversibly
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Reversible data hiding scheme with high payload for JPEG images
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Information Sciences: an International Journal
Parallel modular exponentiation using load balancing without precomputation
Journal of Computer and System Sciences
Remote authentication with forward security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
An efficient fault-tolerant digital signature scheme based on the discrete logarithm problem
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
MaTRU: a new NTRU-Based cryptosystem
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Scalar multiplication on elliptic curves defined over fields of small odd characteristic
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
How to authenticate real time streams using improved online/offline signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient authentication of electronic document workflow
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Security analysis of three cryptographic schemes from other cryptographic schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A digital content distribution using a group-key and multi-layered structure based on web
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Another look at small RSA exponents
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
BeeHiveGuard: a step towards secure nature inspired routing algorithms
EuroGP'06 Proceedings of the 2006 international conference on Applications of Evolutionary Computing
Arevir: a secure platform for designing personalized antiretroviral therapies against HIV
DILS'06 Proceedings of the Third international conference on Data Integration in the Life Sciences
Secure mobile sales force automation: the case of independent sales agencies
Information Systems and e-Business Management
Cryptanalysis of two protocols for RSA with CRT based on fault infection
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Incorporating error detection in an RSA architecture
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
A group-oriented (t, n) threshold signature scheme against replay attacks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Cooperative public key authentication protocol in wireless sensor network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Utilizing secure three hop links to agree pairwise keys in wireless sensor networks
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
A practical solution to the (t, n) threshold untraceable signature with (k, l) verification scheme
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Efficiency limitations for Σ-protocols for group homomorphisms
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
An FPGA accelerator for hash tree generation in the merkle signature scheme
ARC'10 Proceedings of the 6th international conference on Reconfigurable Computing: architectures, Tools and Applications
Diophantine approximation attack on a fast public key cryptosystem
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Security analysis of a server-aided RSA key generation protocol
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Designing secure e-tendering systems
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Multi-modal techniques for identity theft prevention
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
Hardware for modular exponentiation suitable for smart cards
ICESS'04 Proceedings of the First international conference on Embedded Software and Systems
On reduction of bootstrapping information using digital multisignature
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
A new related message attack on RSA
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
RSA with balanced short exponents and its application to entity authentication
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
From fixed-length to arbitrary-length RSA encoding schemes revisited
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Cramer-Damgård signatures revisited: efficient flat-tree signatures based on factoring
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
A traitor tracing scheme based on RSA for fast decryption
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Digital signatures do not guarantee exclusive ownership
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
New signature schemes with coupons and tight reduction
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Computational complexity since 1980
FSTTCS '05 Proceedings of the 25th international conference on Foundations of Software Technology and Theoretical Computer Science
A tutorial on physical security and side-channel attacks
Foundations of Security Analysis and Design III
ECRYPT: the cryptographic research challenges for the next decade
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Malicious cryptography: kleptographic aspects
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Cryptography in subgroups of Zn
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Proof of plaintext knowledge for the ajtai-dwork cryptosystem
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Flaws in generic watermarking protocols based on zero-knowledge proofs
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Interactive visualization applets for modular exponentiation using addition chains
HAIS'10 Proceedings of the 5th international conference on Hybrid Artificial Intelligence Systems - Volume Part II
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
An efficient CDH-based signature scheme with a tight security reduction
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Probabilistic analyses on finding optimal combinations of primality tests in real applications
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Cryptographic asynchronous multi-party computation with optimal resilience
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Multi-modal biometrics with PKI technologies for border control applications
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Efficient pre-processing for large window-based modular exponentiation using ant colony
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Unique user-generated digital pseudonyms
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
A new baby-step giant-step algorithm and some applications to cryptanalysis
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Bipartite modular multiplication
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Fast truncated multiplication for cryptographic applications
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Time-based release of confidential information in hierarchical settings
ISC'05 Proceedings of the 8th international conference on Information Security
Work-focused analysis and design
Cognition, Technology and Work - Special Issue on Human-automation Coagency
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
Public key cryptography in sensor networks—revisited
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
On the security of a certified e-mail scheme
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Separable implicit certificate revocation
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users
Wireless Personal Communications: An International Journal
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
Optimizing least-significant-bit substitution using cat swarm optimization strategy
Information Sciences: an International Journal
Offline business objects: enabling data persistence for distributed desktop applications
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
Asymmetric concurrent signatures
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Cryptanalysis of two user identification schemes with key distribution preserving anonymity
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Practical private set intersection protocols with linear complexity
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Efficient device-independent quantum key distribution
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
A novel framework for multiple creatorship protection of digital movies
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
An efficient fingerprinting scheme with secret sharing
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Using automated banking certificates to detect unauthorised financial transactions
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
A generic construction for token-controlled public key encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Applications of SAT solvers to cryptanalysis of hash functions
SAT'06 Proceedings of the 9th international conference on Theory and Applications of Satisfiability Testing
A new RSA-based signature scheme
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Factoring RSA modulus using prime reconstruction from random known bits
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
A timing attack against the secret permutation in the mceliece PKC
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
How to leak a secret: theory and applications of ring signatures
Theoretical Computer Science
A new related message attack on RSA
Theoretical Computer Science
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Encoding-Free elgamal encryption without random oracles
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
High-Order attacks against the exponent splitting protection
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
SAS-Based authenticated key agreement
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
A generic construction of secure signatures without random oracles
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Maple implementation of the chor-rivest cryptosystem
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
Efficient primitives from exponentiation in Zp
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Secure mobile notifications of civilians in case of a disaster
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
High-Speed RSA crypto-processor with radix-4 modular multiplication and chinese remainder theorem
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
An efficient public key cryptosystem secure against chosen ciphertext attack
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A practical optimal padding for signature schemes
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
A practical and tightly secure signature scheme without hash function
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Medical image integrity control combining digital signature and lossless watermarking
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Efficient CRT-RSA decryption for small encryption exponents
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Fault attacks against EMV signatures
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
A smart card implementation of the mceliece PKC
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Simple power analysis on exponentiation revisited
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Why teaching informatics in schools is as important as teaching mathematics and natural sciences
ISSEP'11 Proceedings of the 5th international conference on Informatics in Schools: situation, Evolution and Perspectives
A massively parallel hardware for modular exponentiations using the m-ary method
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part II
Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
USAB'11 Proceedings of the 7th conference on Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society: information Quality in e-Health
New computation paradigm for modular exponentiation using a graph model
SAGA'05 Proceedings of the Third international conference on StochasticAlgorithms: foundations and applications
The physically observable security of signature schemes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
An algebraic framework for cipher embeddings
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
A layer cyber security defense strategy for smart grid programmable logic controllers
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
A key reshuffling scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
Autonomic communication security in sensor networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks
EWSN'06 Proceedings of the Third European conference on Wireless Sensor Networks
Communication efficient secure linear algebra
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Chosen-Ciphertext security from tag-based encryption
TCC'06 Proceedings of the Third conference on Theory of Cryptography
A space efficient backdoor in RSA and its applications
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Improvements to mitchell's remote user authentication protocol
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Efficient authenticators with application to key exchange
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Relative doubling attack against montgomery ladder
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
On quisquater's multiplication algorithm
Cryptography and Security
Cryptography and Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure mashup-providing platforms - implementing encrypted wiring
ICWE'11 Proceedings of the 11th international conference on Current Trends in Web Engineering
Practical attacks on a cryptosystem proposed in patent WO/2009/066313
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Order-Preserving encryption for non-uniformly distributed plaintexts
WISA'11 Proceedings of the 12th international conference on Information Security Applications
A general NTRU-Like framework for constructing lattice-based public-key cryptosystems
WISA'11 Proceedings of the 12th international conference on Information Security Applications
A unified framework for small secret exponent attack on RSA
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Information security in a quantum world
MEMICS'11 Proceedings of the 7th international conference on Mathematical and Engineering Methods in Computer Science
The circuit model of quantum computation and its simulation with mathematica
MMCP'11 Proceedings of the 2011 international conference on Mathematical Modeling and Computational Science
A new lattice-based public-key cryptosystem mixed with a knapsack
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Partial key exposure: generalized framework to attack RSA
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
SP 800-56B. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
Generic security-amplifying methods of ordinary digital signatures
Information Sciences: an International Journal
Novel Approach for fast Compressed Hybrid color image Cryptosystem
Advances in Engineering Software
VECoS'10 Proceedings of the Fourth international conference on Verification and Evaluation of Computer and Communication Systems
Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios
Information Fusion
E-voting and e-democracy: basic approach to e-government issuance
ACACOS'12 Proceedings of the 11th WSEAS international conference on Applied Computer and Applied Computational Science
Efficient multiple-collision trapdoor hash family
Security and Communication Networks
Collusion-resistant outsourcing of private set intersection
Proceedings of the 27th Annual ACM Symposium on Applied Computing
On the instantiability of hash-and-sign RSA signatures
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Mobile one-time passwords: two-factor authentication using mobile phones
Security and Communication Networks
Pairing-based strong designated verifier proxy signature scheme with low cost
Security and Communication Networks
A shared-secret free security infrastructure for wireless networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Fully homomorphic encryption based two-party association rule mining
Data & Knowledge Engineering
Research notes: Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem
Computer Communications
Tutorial: Security in computer networks and distributed systems
Computer Communications
Research: Traffic control at terminal equipment in ATM networks using cryptographic techniques
Computer Communications
Research: Formal language for security services base modelling and analysis
Computer Communications
Secure end-to-end delegations in distributed systems
Computer Communications
I: Basic technologies: Modern key agreement techniques
Computer Communications
III: Security applications: SESAME: The solution to security for open distributed systems
Computer Communications
Modular arithmetic and fast algorithm designed for modern computer security applications
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
Review: Artificial intelligence approaches to network management: recent advances and a survey
Computer Communications
Research note: Using RSA with low exponent in a public network
Computer Communications
Secure broadcasting in large networks
Computer Communications
Research note: ID-based group-oriented cryptosystem and its digital signature scheme
Computer Communications
Research note: An on-line secret sharing scheme for multi-secrets
Computer Communications
Research note: Three ID-based information security functions
Computer Communications
Research note: Authenticity of public keys in asymmetric cryptosystems
Computer Communications
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting
Mathematical and Computer Modelling: An International Journal
Prêt à Voter with Paillier encryption
Mathematical and Computer Modelling: An International Journal
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Scalable integrity-guaranteed AJAX
APWeb'12 Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications
On the complexity of the equivalence problem for probabilistic automata
FOSSACS'12 Proceedings of the 15th international conference on Foundations of Software Science and Computational Structures
Structure-Based RSA fault attacks
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
On the CCA-1 security of somewhat homomorphic encryption over the integers
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Identity-Based (lossy) trapdoor functions and applications
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
A traceable group signature scheme
Mathematical and Computer Modelling: An International Journal
The design of a secure and fair sealed-bid auction service
Mathematical and Computer Modelling: An International Journal
Convertible ring signatures with gradual revelation of non-signers
Security and Communication Networks
Security: Standards for data security - the state of the art
Computer Communications
Anonymous channel and authentication in wireless communications
Computer Communications
Partially blind threshold signatures based on discrete logarithm
Computer Communications
Decentralized group key management for secure multicast communications
Computer Communications
IPsec-based end-to-end VPN deployment over UMTS
Computer Communications
Information Sciences: an International Journal
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Tutorial: Technological infrastructure for PKI and digital certification
Computer Communications
Research note: A fast modular multiplication method based on the Lempel-Ziv binary tree
Computer Communications
MNPA: a mobile network privacy architecture
Computer Communications
A secure and practical electronic voting scheme
Computer Communications
Randomization enhanced Chaum's blind signature scheme
Computer Communications
A private online system for executing wills based on a secret sharing mechanism
Security and Communication Networks
CSP-DHIES: a new public-key encryption scheme from matrix conjugation
Security and Communication Networks
Computing the modular inverses is as simple as computing the GCDs
Finite Fields and Their Applications
Permutation Polynomials Modulo 2w
Finite Fields and Their Applications
Side effects of identity management in SIP VoIP environment
Information Security Tech. Report
A novel elliptical curve ID cryptography protocol for multi-hop ZigBee sensor networks
Wireless Communications & Mobile Computing
Redactable Signatures for Signed CDA Documents
Journal of Medical Systems
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
Enriching introductory programming courses with non-intuitive probability experiments component
Proceedings of the 17th ACM annual conference on Innovation and technology in computer science education
Computer Networks: The International Journal of Computer and Telecommunications Networking
An effective AKA protocol for UMTS
International Journal of Mobile Communications
Lossy Trapdoor Functions and Their Applications
SIAM Journal on Computing
Toward real-life implementation of signature schemes from the strong RSA assumption
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Strong security from probabilistic signature schemes
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Public-Key cryptography from new multivariate quadratic assumptions
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Generating provable primes efficiently on embedded devices
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
The Multivariate Algorithmic Revolution and Beyond
Identity anonymization and secure data storage using group signature in private cloud
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hexagonal groups based key management using deployment knowledge in wireless sensor networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Certificateless strong designated verifier multisignature scheme using bilinear pairings
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
A low-cost alternative for OAEP
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss
Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras
Information Sciences: an International Journal
Journal of Systems and Software
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Batch verification of ECDSA signatures
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A new attack on RSA and CRT-RSA
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Cryptanalysis of RSA with a small parameter
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Generalized first pre-image tractable random oracle model and signature schemes
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
On the optimality of lattices for the coppersmith technique
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Mining your Ps and Qs: detection of widespread weak keys in network devices
Security'12 Proceedings of the 21st USENIX conference on Security symposium
MQQ-SIG: an ultra-fast and provably CMA resistant digital signature scheme
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Reaction attack on outsourced computing with fully homomorphic encryption schemes
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
An Image Authentication Based on Discrete Fourier Transform
Fundamenta Informaticae
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy
Fundamenta Informaticae
A Novel Image Hiding Scheme Based on VQ and Hamming Distance
Fundamenta Informaticae
A New Practical Limited Identity-Based Encryption Scheme
Fundamenta Informaticae
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Concise lookup tables for IPv4 and IPv6 longest prefix matching in scalable routers
IEEE/ACM Transactions on Networking (TON)
Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing
Fundamenta Informaticae
A Novel Color Image Hiding Scheme Using Block Truncation Coding
Fundamenta Informaticae
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Fundamenta Informaticae
An Adaptive Steganographic Scheme for Color Images
Fundamenta Informaticae
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem
Fundamenta Informaticae
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Teaching the RSA algorithm using spreadsheets
Journal of Computing Sciences in Colleges
Aligot: cryptographic function identification in obfuscated binary programs
Proceedings of the 2012 ACM conference on Computer and communications security
Cross-VM side channels and their use to extract private keys
Proceedings of the 2012 ACM conference on Computer and communications security
Verified security of redundancy-free encryption from Rabin and RSA
Proceedings of the 2012 ACM conference on Computer and communications security
Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
A Secure Integrated Medical Information System
Journal of Medical Systems
Reversible Data Hiding Scheme Based on Image Inpainting
Fundamenta Informaticae
Secure Dynamic Access Control Scheme of PHR in Cloud Computing
Journal of Medical Systems
Analysis of existing remote attestation techniques
Security and Communication Networks
Creating shared secrets out of thin air
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Secure cluster header election techniques in sensor network
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
A special purpose integer factorization algorithm
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Efficient password-based authenticated key exchange without public information
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
On the privacy of concealed data aggregation
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Applicability of public key infrastructures in wireless sensor networks
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Cryptanalysis of server-aided RSA key generation protocols at MADNES 2005
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Trapdoor permutation polynomials of Z/nZ and public key cryptosystems
ISC'07 Proceedings of the 10th international conference on Information Security
Towards a DL-based additively homomorphic encryption scheme
ISC'07 Proceedings of the 10th international conference on Information Security
Improved multi-precision squaring for low-end RISC microcontrollers
Journal of Systems and Software
Authentication of moving range queries
Proceedings of the 21st ACM international conference on Information and knowledge management
Security of ping-pong protocol based on pairs of completely entangled qudits
Quantum Information Processing
The CRNS framework and its application to programmable and reconfigurable cryptography
ACM Transactions on Architecture and Code Optimization (TACO) - Special Issue on High-Performance Embedded Architectures and Compilers
Cryptanalysis of Álvarez et al. key exchange scheme
Information Sciences: an International Journal
Full lattice basis reduction on graphics cards
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
On optimal bounds of small inverse problems and approximate GCD problems with higher degree
ISC'12 Proceedings of the 15th international conference on Information Security
Towards secure and communication-efficient broadcast encryption systems
Journal of Network and Computer Applications
Complete atomic blocks for elliptic curves in jacobian coordinates over prime fields
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
An investigation of ensemble systems applied to encrypted and cancellable biometric data
ICANN'12 Proceedings of the 22nd international conference on Artificial Neural Networks and Machine Learning - Volume Part II
Side channel attack to actual cryptanalysis: breaking CRT-RSA with low weight decryption exponents
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Anonymous password-based key exchange with low resources consumption and better user-friendliness
Security and Communication Networks
On the strength comparison of the ECDLP and the IFP
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy
Security and Communication Networks
A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies
Journal of Systems and Software
Closed-form formula on quantum factorization effectiveness
Quantum Information Processing
Reduction in lossiness of RSA trapdoor permutation
SPACE'12 Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography Engineering
Cryptanalysis of multi-prime RSA with small prime difference
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Digital signature-based authentication framework in cognitive radio networks
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Utilizing random noise in cryptography: where is the tofu?
Proceedings of the International Conference on Computer-Aided Design
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA
Designs, Codes and Cryptography
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission
Journal of Systems and Software
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Sequential aggregate signatures with lazy verification from trapdoor permutations
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
NSS'12 Proceedings of the 6th international conference on Network and System Security
Cryptanalysis of exhaustive search on attacking RSA
NSS'12 Proceedings of the 6th international conference on Network and System Security
On the improvement of fermat factorization
NSS'12 Proceedings of the 6th international conference on Network and System Security
An innovative electronic group-buying system for mobile commerce
Electronic Commerce Research and Applications
Faster pairing coprocessor architecture
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Verifying data authenticity and integrity in server-aided confidential forensic investigation
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
ETA: efficient and tiny and authentication for heterogeneous wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Private data warehouse queries
Proceedings of the 18th ACM symposium on Access control models and technologies
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
Computers and Electrical Engineering
Approximately counting semismooth integers
Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation
Partial encryption and watermarking scheme for audio files with controlled degradation of quality
Multimedia Tools and Applications
Provably secure three party encrypted key exchange scheme with explicit authentication
Information Sciences: an International Journal
Another look at affine-padding RSA signatures
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Sometimes it's better to be STUCK! SAML transportation unit for cryptographic keys
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
GPU implementation of a scalable non-linear congruential generator for cryptography applications
Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI
A compact FPGA-based montgomery multiplier over prime fields
Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI
On the design of modulo 2n-1 cubing units
Proceedings of the 23rd ACM international conference on Great lakes symposium on VLSI
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Comprehensive analysis of software countermeasures against fault attacks
Proceedings of the Conference on Design, Automation and Test in Europe
Amplitude demodulation-based EM analysis of different RSA implementations
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Creating secrets out of erasures
Proceedings of the 19th annual international conference on Mobile computing & networking
Biometric encryption using enhanced finger print image and elliptic curve
International Journal of Electronic Security and Digital Forensics
Toward a secure batch verification with group testing for VANET
Wireless Networks
A novel differential scan attack on advanced DFT structures
ACM Transactions on Design Automation of Electronic Systems (TODAES) - Special Section on Networks on Chip: Architecture, Tools, and Methodologies
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
FPGA based unified architecture for public key and private key cryptosystems
Frontiers of Computer Science: Selected Publications from Chinese Universities
On the conventional public key in identification-based encryption: the case of RSA
International Journal of Information and Computer Security
Efficient targeted key subset retrieval in fractal hash sequences
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Secure and practical threshold RSA
Proceedings of the 6th International Conference on Security of Information and Networks
Primeless factoring-based cryptography
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Fine-grained access control for cloud computing
International Journal of Grid and Utility Computing
Cryptanalysis of Brenner et al.'s somewhat homomorphic encryption scheme
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
Improvement on Meshram et al.'s ID-based cryptographic mechanism
Information Processing Letters
Defeating with fault injection a combined attack resistant exponentiation
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Updated recommendations for blinded exponentiation vs. single trace analysis
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Crypto-Book: an architecture for privacy preserving online identities
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
A privacy-friendly architecture for future cloud computing
International Journal of Grid and Utility Computing
FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256
Microprocessors & Microsystems
A new tool for sharing and querying of clinical documents modeled using HL7 Version 3 standard
Computer Methods and Programs in Biomedicine
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload
ACM Transactions on Internet Technology (TOIT)
Proceedings of the 5th conference on Innovations in theoretical computer science
The truth behind the myth of the folk theorem
Proceedings of the 5th conference on Innovations in theoretical computer science
Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices
Personal and Ubiquitous Computing
SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives
Personal and Ubiquitous Computing
Security analysis and improvement of two verifiable multi-secret sharing schemes
International Journal of Security and Networks
Message blinding method requiring no multiplicative inversion for RSA
ACM Transactions on Embedded Computing Systems (TECS)
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
RMDDS: Reed-muller decision diagram synthesis of reversible logic circuits
ACM Journal on Emerging Technologies in Computing Systems (JETC)
PayStar: A denomination flexible micropayment scheme
Information Sciences: an International Journal
Efficient multiple-precision integer division algorithm
Information Processing Letters
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
Hardware security platform for multicast communications
Journal of Systems Architecture: the EUROMICRO Journal
An improved side channel attack using event information of subtraction
Journal of Network and Computer Applications
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes
International Journal of Critical Computer-Based Systems
Web Intelligence and Agent Systems
Self-adaptive service level agreement monitoring in cloud environments
Multiagent and Grid Systems
Information dependability in distributed systems: The dependable distributed storage system
Integrated Computer-Aided Engineering
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Flash storage integration in the IBM System z EC12 I/O drawer
IBM Journal of Research and Development
Hi-index | 48.67 |
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret primer numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d ≡ 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n.