Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC | 0 | 0.34 | 2021 |
Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring. | 0 | 0.34 | 2020 |
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption. | 0 | 0.34 | 2018 |
Outsourced Private Function Evaluation with Privacy Policy Enforcement. | 0 | 0.34 | 2018 |
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure Against Undetectable On-Line Dictionary Attack | 0 | 0.34 | 2017 |
One-time Programs with Cloud Storage and Its Application to Electronic Money. | 0 | 0.34 | 2017 |
Card-Based Protocols Using Regular Polygon Cards | 2 | 0.37 | 2017 |
Improved proxy re-encryption scheme for symmetric key cryptography | 1 | 0.38 | 2017 |
Identity-Based Key-Insulated Aggregate Signatures, Revisited. | 0 | 0.34 | 2017 |
Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices | 0 | 0.34 | 2016 |
Committed And Protocol Using Three Cards With More Handy Shuffle | 0 | 0.34 | 2016 |
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability. | 0 | 0.34 | 2016 |
Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards. | 0 | 0.34 | 2016 |
Software Implementation Of Ciphertext-Policy Functional Encryption With Simple Usability | 1 | 0.36 | 2015 |
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. | 0 | 0.34 | 2015 |
Software Implementation Of A Pairing Function For Public Key Cryptosystems | 0 | 0.34 | 2015 |
Anonymous encryption with partial-order subset delegation and its application in privacy email systems | 1 | 0.36 | 2014 |
Fine-Grained Access Control Aware Multi-User Data Sharing With Secure Keyword Search | 3 | 0.41 | 2014 |
Secure (M+1) st-Price Auction with Automatic Tie-Break. | 1 | 0.35 | 2014 |
Supporting secure provenance update by keeping "provenance" of the provenance | 0 | 0.34 | 2013 |
Upper bound of the length of information embedd in RSA public key efficiently | 2 | 0.38 | 2013 |
Efficient implementation for QUAD stream cipher with GPUs. | 3 | 0.42 | 2013 |
Secure keyword search using bloom filter with specified character positions | 9 | 0.56 | 2012 |
Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs | 2 | 0.41 | 2012 |
Batch Logical Protocols For Efficient Multi-Party Computation | 0 | 0.34 | 2012 |
Security Analysis of Offline E-cash Systems with Malicious Insider. | 3 | 0.40 | 2012 |
Differential fault analysis of full LBlock | 5 | 0.50 | 2012 |
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. | 3 | 0.41 | 2012 |
A Method for Embedding Secret Key Information in RSA Public Key and Its Application | 3 | 0.57 | 2012 |
Analysis of Methods for Detecting Compromised Nodes and its Countermeasures. | 0 | 0.34 | 2012 |
Securing Provenance Of Distributed Processes In An Untrusted Environment | 2 | 0.37 | 2012 |
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation. | 0 | 0.34 | 2012 |
Towards Countermeasure of Insider Threat in Network Security | 2 | 0.43 | 2011 |
Accelerating multiparty computation by efficient random number bitwise-sharing protocols | 0 | 0.34 | 2011 |
Batching multiple protocols to improve efficiency of multi-party computation | 1 | 0.37 | 2011 |
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems | 29 | 1.13 | 2011 |
Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited | 2 | 0.36 | 2011 |
Multi-user keyword search scheme for secure data sharing with fine-grained access control | 17 | 0.77 | 2011 |
Cryptanalysis of randomized arithmetic codes based on markov model | 0 | 0.34 | 2011 |
Design and Implementation of a Forced Encryption Kernel Module | 0 | 0.34 | 2011 |
Integrity for the In-flight web page based on a fragile watermarking chain scheme | 1 | 0.37 | 2011 |
Anonymous encryption with partial-order subset delegation functionality | 3 | 0.39 | 2011 |
Securing location-aware services based on online/offline signatures in VANETs | 0 | 0.34 | 2011 |
Model-Based Intrusion Detection by Abstract Interpretation | 0 | 0.34 | 2010 |
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. | 3 | 0.37 | 2010 |
Adaptive and Composable Non-interactive String-commitment Protocols. | 0 | 0.34 | 2010 |
Distributed paillier cryptosystem without trusted dealer | 18 | 0.72 | 2010 |
Adaptive and composable non-committing encryptions | 5 | 0.43 | 2010 |
Preserving integrity and confidentiality of a directed acyclic graph model of provenance | 9 | 0.54 | 2010 |
Attribute-Based Encryption With Partially Hidden Ciphertext Policies | 11 | 0.58 | 2009 |