How to bypass the Wassenaar arrangement: a new application for watermarking
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Proceedings of the 38th annual Design Automation Conference
A Public Key Cryptosystem Based on the Subgroup Membership Problem
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Another Way of Doing RSA Cryptography in Hardware
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A Signcryption Scheme Based on Integer Factorization
ISW '00 Proceedings of the Third International Workshop on Information Security
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
Elliptic Curve Arithmetic Using SIMD
ISC '01 Proceedings of the 4th International Conference on Information Security
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n)
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A Secure Distributed Search System
HPDC '02 Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
Hardware architectures for public key cryptography
Integration, the VLSI Journal
Designs, Codes and Cryptography
Crypto-based identifiers (CBIDs): Concepts and applications
ACM Transactions on Information and System Security (TISSEC)
FPGA based hardware acceleration for elliptic curve public key cryptosystems
Journal of Systems and Software - Special issue: Rapid system prototyping
Elliptic and hyperelliptic curves on embedded μP
ACM Transactions on Embedded Computing Systems (TECS)
Elliptic curve cryptography: Java implementation
Proceedings of the 1st annual conference on Information security curriculum development
A Public Key Cryptosystem Based On A Subgroup Membership Problem
Designs, Codes and Cryptography
Enabling the Archival Storage of Signed Documents
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Dos and don'ts of client authentication on the web
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
New and improved architectures for Montgomery modular multiplication
Mobile Networks and Applications
Passport: secure and adoptable source authentication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Efficient public key encryption with smallest ciphertext expansion from factoring
Designs, Codes and Cryptography
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Information Security Applications
FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Factorization of a 512-bit RSA modulus
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Enhanced mutual authentication and key exchange protocol for wireless communications
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Applicability of security metrics for adaptive security management in a universal banking hub system
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Security estimates for quadratic field based cryptosystems
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Long-term confidentiality of PKI
Communications of the ACM
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
RFID-Tags for anti-counterfeiting
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Optimal asymmetric encryption and signature paddings
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Achieving efficient conjunctive keyword searches over encrypted data
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Selecting parameters for the rainbow signature scheme
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Timed release cryptography from bilinear pairings using hash chains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Low-Cost elliptic curve cryptography for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A practical optimal padding for signature schemes
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Reducing the computational cost of certification path validation in mobile payment
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Analyzing and comparing the AES architectures for their power consumption
Journal of Intelligent Manufacturing
Hi-index | 0.02 |