BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
applic (7)
key (6)
ellipt (5)
base (5)
curv (5)

Stem cryptographi$ (all stems)

39 papers:

ICEISICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance #using
Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
DACDAC-2014-HollerDKSF #co-evolution #design #encryption #hardware
Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications (AH, ND, CK, CS, TF), p. 6.
DATEDATE-2014-MaurichG #configuration management #encryption #lightweight
Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices (IvM, TG), pp. 1–6.
STOCSTOC-2013-BitanskyP #approximate #encryption #obfuscation #on the
On the impossibility of approximate obfuscation and applications to resettable cryptography (NB, OP), pp. 241–250.
HCIHCI-UC-2013-TsaiW #design #encryption #towards #visual notation
Towards a Design Guideline of Visual Cryptography on Stereoscopic Displays (SLT, CHW), pp. 78–84.
ITiCSEITiCSE-2012-ChenLM #encryption
Cryptography for the million (YC, EL, MM), p. 384.
SACSAC-2012-DavtyanKMRS #encryption
Integrity of electronic voting systems: fallacious use of cryptography (SD, AK, LM, AR, AAS), pp. 1486–1493.
SACSAC-2011-MunizL #encryption #on the #protocol #recognition
On the (im)possibility of perennial message recognition protocols without public-key cryptography (MGM, PL), pp. 1510–1515.
STOCSTOC-2010-ApplebaumBW #encryption
Public-key cryptography from different assumptions (BA, BB, AW), pp. 171–180.
STOCSTOC-2009-DodisKL #encryption #on the
On cryptography with auxiliary input (YD, YTK, SL), pp. 621–630.
STOCSTOC-2009-DodisW #encryption #symmetry
Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
DATEDATE-2008-FanBSV #algebra #design #encryption
FPGA Design for Algebraic Tori-Based Public-Key Cryptography (JF, LB, KS, IV), pp. 1292–1297.
DATEDATE-2008-PurnaprajnaPP #configuration management #encryption #multi #power management
Power Aware Reconfigurable Multiprocessor for Elliptic Curve Cryptography (MP, CP, MP), pp. 1462–1467.
STOCSTOC-2008-IshaiKOS #constant #encryption
Cryptography with constant computational overhead (YI, EK, RO, AS), pp. 433–442.
ICGTICGT-2008-Grohmann #encryption #graph #security
Security, Cryptography and Directed Bigraphs (DG), pp. 487–489.
DACDAC-2007-KoushanfarP #encryption #security
CAD-based Security, Cryptography, and Digital Rights Management (FK, MP), pp. 268–269.
DATEDATE-2007-PeterLP #encryption #flexibility #hardware #reduction
Flexible hardware reduction for elliptic curve cryptography in GF(2m) (SP, PL, KP), pp. 1259–1264.
STOCSTOC-2007-GavinskyKKRW #communication #complexity #encryption #exponential #quantum
Exponential separations for one-way quantum communication complexity, with applications to cryptography (DG, JK, IK, RR, RdW), pp. 516–525.
ICALPICALP-2007-Damgard #encryption
A “proof-reading” of Some Issues in Cryptography (ID), pp. 2–11.
LICSLICS-2007-CohenD #axiom #encryption
A Complete Axiomatization of Knowledge and Cryptography (MC, MD), pp. 77–88.
DATEDATE-2006-GrossschadlIPTV #algorithm #case study #design #encryption #set
Combining algorithm exploration with instruction set design: a case study in elliptic curve cryptography (JG, PI, LP, ST, AKV), pp. 218–223.
FMFM-2006-BackesPW #encryption #formal method
Formal Methods and Cryptography (MB, BP, MW), pp. 612–616.
DATEDATE-2005-CilardoMMR #architecture #encryption #novel
A Novel Unified Architecture for Public-Key Cryptography (AC, AM, NM, LR), pp. 52–57.
DATEDATE-2005-DykaL #encryption #hardware #implementation #performance
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba’s Method (ZD, PL), pp. 70–75.
STOCSTOC-2005-Regev #encryption #fault #learning #linear #on the #random
On lattices, learning with errors, random linear codes, and cryptography (OR), pp. 84–93.
SIGMODSIGMOD-2004-Maurer #database #encryption #security
The Role of Cryptography in Database Security (UMM), pp. 5–10.
VLDBVLDB-2003-MiklauS #encryption #using
Controlling Access to Published Data Using Cryptography (GM, DS), pp. 898–909.
DATEDATE-2001-BertoniBF #architecture #encryption #finite #multi #performance
Efficient finite field digital-serial multiplier architecture for cryptography applications (GB, LB, PF), p. 812.
ASPLOSASPLOS-2000-BurkeMA #architecture #encryption #performance #symmetry
Architectural Support for Fast Symmetric-Key Cryptography (JB, JM, TMA), pp. 178–189.
SACSAC-1999-DavisE #encryption #named #web
Emperor: Cheap Legal Secure Cryptography for the Web (CD, CFE), pp. 603–609.
DATEEDTC-1997-RoyoML #design #encryption #implementation
Design and implementation of a coprocessor for cryptography applications (AR, JM, JCL), pp. 213–217.
STOCSTOC-1997-Beaver #encryption
Commodity-Based Cryptography (Extended Abstract) (DB), pp. 446–455.
STOCSTOC-1997-Micciancio #data type #encryption
Oblivious Data Structures: Applications to Cryptography (DM), pp. 456–464.
ICALPICALP-1996-AtenieseBSS #bound #encryption #visual notation
Constructions and Bounds for Visual Cryptography (GA, CB, ADS, DRS), pp. 416–428.
ICPRICPR-1996-OGormanR #authentication #encryption #pattern matching #pattern recognition #recognition
Photo-image authentication by pattern recognition and cryptography (LO, IR), pp. 949–953.
STOCSTOC-1995-BellareGG #encryption #incremental
Incremental cryptography and application to virus protection (MB, OG, SG), pp. 45–56.
STOCSTOC-1991-DolevDN #encryption
Non-Malleable Cryptography (Extended Abstract) (DD, CD, MN), pp. 542–552.
STOCSTOC-1988-Kilian #encryption
Founding Cryptography on Oblivious Transfer (JK), pp. 20–31.
ICALPICALP-1980-Shamir #commutative #encryption #on the #power of
On the Power of Commutativity in Cryptography (AS), pp. 582–595.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.