What Did You Add to My Additive Manufacturing Data? - Steganographic Attacks on 3D Printing Files. | 0 | 0.34 | 2021 |
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. | 0 | 0.34 | 2021 |
Fully Dynamic Password Protected Secret Sharing - Simplifying PPSS Operation and Maintenance. | 0 | 0.34 | 2021 |
Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers | 0 | 0.34 | 2021 |
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality | 0 | 0.34 | 2020 |
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. | 0 | 0.34 | 2020 |
Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers | 0 | 0.34 | 2020 |
Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings. | 0 | 0.34 | 2019 |
Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers | 0 | 0.34 | 2019 |
Correcting Subverted Random Oracles. | 1 | 0.34 | 2018 |
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs. | 0 | 0.34 | 2018 |
Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation. | 0 | 0.34 | 2017 |
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions. | 6 | 0.39 | 2017 |
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange. | 2 | 0.39 | 2017 |
Brief Announcement: Proactive Secret Sharing with a Dishonest Majority. | 0 | 0.34 | 2016 |
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions. | 6 | 0.40 | 2016 |
Proactive Secret Sharing with a Dishonest Majority. | 4 | 0.44 | 2016 |
Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack. | 1 | 0.35 | 2016 |
Sequential aggregate signatures with short public keys without random oracles | 0 | 0.34 | 2015 |
End-To-End Design Of A Puf-Based Privacy Preserving Authentication Protocol | 18 | 0.69 | 2015 |
The drunk motorcyclist protocol for anonymous communication | 3 | 0.44 | 2014 |
Order-Preserving Encryption Secure Beyond One-Wayness. | 11 | 0.53 | 2014 |
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security. | 11 | 0.49 | 2014 |
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares | 4 | 0.40 | 2014 |
Fully forward-secure group signatures | 1 | 0.34 | 2012 |
PayTree: "Amortized Signature" for Flexible Micro-Payments. | 29 | 4.80 | 2012 |
On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs. | 0 | 0.34 | 2012 |
Strictly-black-box zero-knowledge and efficient validation of financial transactions | 5 | 0.46 | 2012 |
Secret swarm unit: reactive k-secret sharing | 14 | 0.78 | 2012 |
Efficient robust private set intersection | 92 | 3.02 | 2012 |
Efficient circuit-size independent public key encryption with KDM security | 31 | 1.15 | 2011 |
Indifferentiability of the Hash Algorithm BLAKE. | 7 | 0.56 | 2011 |
On the security of hash functions employing blockcipher postprocessing | 0 | 0.34 | 2011 |
Kleptography from standard assumptions and applications | 5 | 0.50 | 2010 |
Efficient completely non-malleable public key encryption | 3 | 0.38 | 2010 |
Practical leakage-resilient pseudorandom generators | 42 | 1.42 | 2010 |
On the Portability of Generalized Schnorr Proofs | 55 | 1.50 | 2009 |
Secure Multi-party Computation Minimizing Online Rounds | 7 | 0.53 | 2009 |
Secure Function Collection with Sublinear Storage | 1 | 0.36 | 2009 |
Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings | 36 | 1.93 | 2009 |
Universal forgery of the identity-based sequential aggregate signature scheme | 19 | 0.74 | 2009 |
Concurrent Knowledge-Extraction in the Public-Key Model | 3 | 0.37 | 2009 |
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks | 213 | 9.02 | 2009 |
SocialClouds: concept, security architecture and some mechanisms | 9 | 0.54 | 2009 |
A block cipher based pseudo random number generator secure against side-channel key recovery | 40 | 2.78 | 2008 |
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract | 0 | 0.34 | 2008 |
High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units | 3 | 0.49 | 2008 |
Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings | 26 | 1.73 | 2007 |
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 | 11 | 3.42 | 2007 |
Space-efficient kleptography without random oracles | 4 | 0.45 | 2007 |