## Stem cryptographi$ (all stems)

### 39 papers:

- ICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance #using
- Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
- DAC-2014-HollerDKSF #co-evolution #design #encryption #hardware
- Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications (AH, ND, CK, CS, TF), p. 6.
- DATE-2014-MaurichG #configuration management #encryption #lightweight
- Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices (IvM, TG), pp. 1–6.
- STOC-2013-BitanskyP #approximate #encryption #obfuscation #on the
- On the impossibility of approximate obfuscation and applications to resettable cryptography (NB, OP), pp. 241–250.
- HCI-UC-2013-TsaiW #design #encryption #towards #visual notation
- Towards a Design Guideline of Visual Cryptography on Stereoscopic Displays (SLT, CHW), pp. 78–84.
- ITiCSE-2012-ChenLM #encryption
- Cryptography for the million (YC, EL, MM), p. 384.
- SAC-2012-DavtyanKMRS #encryption
- Integrity of electronic voting systems: fallacious use of cryptography (SD, AK, LM, AR, AAS), pp. 1486–1493.
- SAC-2011-MunizL #encryption #on the #protocol #recognition
- On the (im)possibility of perennial message recognition protocols without public-key cryptography (MGM, PL), pp. 1510–1515.
- STOC-2010-ApplebaumBW #encryption
- Public-key cryptography from different assumptions (BA, BB, AW), pp. 171–180.
- STOC-2009-DodisKL #encryption #on the
- On cryptography with auxiliary input (YD, YTK, SL), pp. 621–630.
- STOC-2009-DodisW #encryption #symmetry
- Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
- DATE-2008-FanBSV #algebra #design #encryption
- FPGA Design for Algebraic Tori-Based Public-Key Cryptography (JF, LB, KS, IV), pp. 1292–1297.
- DATE-2008-PurnaprajnaPP #configuration management #encryption #multi #power management
- Power Aware Reconfigurable Multiprocessor for Elliptic Curve Cryptography (MP, CP, MP), pp. 1462–1467.
- STOC-2008-IshaiKOS #constant #encryption
- Cryptography with constant computational overhead (YI, EK, RO, AS), pp. 433–442.
- ICGT-2008-Grohmann #encryption #graph #security
- Security, Cryptography and Directed Bigraphs (DG), pp. 487–489.
- DAC-2007-KoushanfarP #encryption #security
- CAD-based Security, Cryptography, and Digital Rights Management (FK, MP), pp. 268–269.
- DATE-2007-PeterLP #encryption #flexibility #hardware #reduction
- Flexible hardware reduction for elliptic curve cryptography in GF(2m) (SP, PL, KP), pp. 1259–1264.
- STOC-2007-GavinskyKKRW #communication #complexity #encryption #exponential #quantum
- Exponential separations for one-way quantum communication complexity, with applications to cryptography (DG, JK, IK, RR, RdW), pp. 516–525.
- ICALP-2007-Damgard #encryption
- A “proof-reading” of Some Issues in Cryptography (ID), pp. 2–11.
- LICS-2007-CohenD #axiom #encryption
- A Complete Axiomatization of Knowledge and Cryptography (MC, MD), pp. 77–88.
- DATE-2006-GrossschadlIPTV #algorithm #case study #design #encryption #set
- Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography (JG, PI, LP, ST, AKV), pp. 218–223.
- FM-2006-BackesPW #encryption #formal method
- Formal Methods and Cryptography (MB, BP, MW), pp. 612–616.
- DATE-2005-CilardoMMR #architecture #encryption #novel
- A Novel Unified Architecture for Public-Key Cryptography (AC, AM, NM, LR), pp. 52–57.
- DATE-2005-DykaL #encryption #hardware #implementation #performance
- Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba’s Method (ZD, PL), pp. 70–75.
- STOC-2005-Regev #encryption #fault #learning #linear #on the #random
- On lattices, learning with errors, random linear codes, and cryptography (OR), pp. 84–93.
- SIGMOD-2004-Maurer #database #encryption #security
- The Role of Cryptography in Database Security (UMM), pp. 5–10.
- VLDB-2003-MiklauS #encryption #using
- Controlling Access to Published Data Using Cryptography (GM, DS), pp. 898–909.
- DATE-2001-BertoniBF #architecture #encryption #finite #multi #performance
- Efficient finite field digital-serial multiplier architecture for cryptography applications (GB, LB, PF), p. 812.
- ASPLOS-2000-BurkeMA #architecture #encryption #performance #symmetry
- Architectural Support for Fast Symmetric-Key Cryptography (JB, JM, TMA), pp. 178–189.
- SAC-1999-DavisE #encryption #named #web
- Emperor: Cheap Legal Secure Cryptography for the Web (CD, CFE), pp. 603–609.
- EDTC-1997-RoyoML #design #encryption #implementation
- Design and implementation of a coprocessor for cryptography applications (AR, JM, JCL), pp. 213–217.
- STOC-1997-Beaver #encryption
- Commodity-Based Cryptography (Extended Abstract) (DB), pp. 446–455.
- STOC-1997-Micciancio #data type #encryption
- Oblivious Data Structures: Applications to Cryptography (DM), pp. 456–464.
- ICALP-1996-AtenieseBSS #bound #encryption #visual notation
- Constructions and Bounds for Visual Cryptography (GA, CB, ADS, DRS), pp. 416–428.
- ICPR-1996-OGormanR #authentication #encryption #pattern matching #pattern recognition #recognition
- Photo-image authentication by pattern recognition and cryptography (LO, IR), pp. 949–953.
- STOC-1995-BellareGG #encryption #incremental
- Incremental cryptography and application to virus protection (MB, OG, SG), pp. 45–56.
- STOC-1991-DolevDN #encryption
- Non-Malleable Cryptography (Extended Abstract) (DD, CD, MN), pp. 542–552.
- STOC-1988-Kilian #encryption
- Founding Cryptography on Oblivious Transfer (JK), pp. 20–31.
- ICALP-1980-Shamir #commutative #encryption #on the #power of
- On the Power of Commutativity in Cryptography (AS), pp. 582–595.