Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2004
- Toru Akishita, Tsuyoshi Takagi:
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. Public Key Cryptography 2004: 346-359 - Andris Ambainis, Markus Jakobsson, Helger Lipmaa:
Cryptographic Randomized Response Techniques. Public Key Cryptography 2004: 425-438 - Roberto Maria Avanzi, Mathieu Ciet, Francesco Sica:
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism. Public Key Cryptography 2004: 28-40 - Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Decryption. Public Key Cryptography 2004: 262-276 - Vicente Benjumea, Javier López, José A. Montenegro, José M. Troya:
A First Approach to Provide Anonymity in Attribute Certificates. Public Key Cryptography 2004: 402-415 - Johannes Blömer, Alexander May:
A Generalized Wiener Attack on RSA. Public Key Cryptography 2004: 1-13 - Emmanuel Bresson, Dario Catalano:
Constant Round Authenticated Group Key Agreement via Distributed Computation. Public Key Cryptography 2004: 115-129 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
New Security Results on Encrypted Key Exchange. Public Key Cryptography 2004: 145-158 - Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
Efficient ID-based Group Key Agreement with Bilinear Maps. Public Key Cryptography 2004: 130-144 - Jean-Sébastien Coron:
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Public Key Cryptography 2004: 14-27 - Nicolas T. Courtois:
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2. Public Key Cryptography 2004: 201-217 - Jintai Ding:
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. Public Key Cryptography 2004: 305-318 - Farid F. Elwailly, Craig Gentry, Zulfikar Ramzan:
QuasiModo: Efficient Certificate Validation and Revocation. Public Key Cryptography 2004: 375-388 - Stéphane Flon, Roger Oyono:
Fast Arithmetic on Jacobians of Picard Curves. Public Key Cryptography 2004: 55-68 - Jun Furukawa:
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. Public Key Cryptography 2004: 319-332 - Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka:
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. Public Key Cryptography 2004: 291-304 - Brian King:
A Point Compression Method for Elliptic Curves Defined over GF(2 n). Public Key Cryptography 2004: 333-345 - Satoshi Koga, Kouichi Sakurai:
A Distributed Online Certificate Status Protocol with a Single Public Key. Public Key Cryptography 2004: 389-401 - Takeshi Koshiba, Kaoru Kurosawa:
Short Exponent Diffie-Hellman Problems. Public Key Cryptography 2004: 173-186 - Kaoru Kurosawa, Swee-Huay Heng:
From Digital Signature to ID-based Identification/Signature. Public Key Cryptography 2004: 248-261 - Benoît Libert, Jean-Jacques Quisquater:
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. Public Key Cryptography 2004: 187-200 - Alexander May:
Secret Exponent Attacks on RSA-type Schemes with Moduli N= prq. Public Key Cryptography 2004: 218-230 - Pradeep Kumar Mishra, Palash Sarkar:
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. Public Key Cryptography 2004: 41-54 - Jean Monnerat, Serge Vaudenay:
Undeniable Signatures Based on Characters: How to Sign with One Bit. Public Key Cryptography 2004: 69-85 - Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454 - Reihaneh Safavi-Naini, Luke McAven, Moti Yung:
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". Public Key Cryptography 2004: 231-247 - Igor E. Shparlinski, Arne Winterhof:
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups. Public Key Cryptography 2004: 416-424 - Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Public Key Cryptography 2004: 86-100 - María Isabel González Vasco, Mats Näslund, Igor E. Shparlinski:
New Results on the Hardness of Diffie-Hellman Bits. Public Key Cryptography 2004: 159-172 - Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-03 09:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint