Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns. | 0 | 0.34 | 2021 |
Secure Communication Channel Establishment: Tls 1.3 (Over Tcp Fast Open) Versus Quic | 1 | 0.34 | 2021 |
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search | 0 | 0.34 | 2021 |
Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part III. | 0 | 0.34 | 2019 |
Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part II. | 0 | 0.34 | 2019 |
Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part I. | 0 | 0.34 | 2019 |
Masking Fuzzy-Searchable Public Databases. | 0 | 0.34 | 2019 |
Hedging Public-Key Encryption in the Real World. | 0 | 0.34 | 2017 |
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange | 1 | 0.36 | 2017 |
Provably-Secure Remote Memory Attestation for Heap Overflow Protection. | 1 | 0.39 | 2016 |
How secure and quick is QUIC?: provable security and performance analyses | 27 | 1.30 | 2015 |
Towards Provably-Secure Remote Memory Attestation. | 0 | 0.34 | 2015 |
Efficient Fuzzy Search on Encrypted Data. | 2 | 0.35 | 2014 |
On Symmetric Encryption with Distinguishable Decryption Failures. | 27 | 0.92 | 2013 |
Provable security of S-BGP and other path vector protocols: model, analysis and extensions | 12 | 0.65 | 2012 |
Order-Preserving Symmetric Encryption | 312 | 10.49 | 2012 |
Identity-based encryption with efficient revocation | 169 | 5.53 | 2012 |
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. | 28 | 0.83 | 2012 |
On-line Ciphers and the Hash-CBC Constructions | 12 | 0.69 | 2012 |
A new pseudorandom generator from collision-resistant hash functions | 3 | 0.41 | 2012 |
Order-preserving encryption revisited: improved security analysis and alternative solutions | 179 | 4.90 | 2011 |
How to strengthen the security of RSA-OAEP | 1 | 0.37 | 2010 |
Search on encrypted data in the symmetric-key setting | 0 | 0.34 | 2010 |
Strengthening Security of RSA-OAEP | 4 | 0.42 | 2009 |
Foundations of Non-malleable Hash and One-Way Functions | 10 | 0.50 | 2009 |
New Multiparty Signature Schemes for Network Routing Applications | 8 | 1.40 | 2008 |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles | 118 | 3.92 | 2008 |
Provable-security analysis of authenticated encryption in Kerberos | 1 | 0.35 | 2007 |
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing | 68 | 2.20 | 2007 |
A closer look at PKI: security and efficiency | 26 | 1.00 | 2007 |
Provably-secure schemes for basic query support in outsourced databases | 37 | 2.03 | 2007 |
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos | 10 | 0.62 | 2007 |
A digital rights enabled graphics processing system | 4 | 0.44 | 2006 |
Analysis of random oracle instantiation scenarios for OAEP and other practical schemes | 25 | 0.93 | 2005 |
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation | 45 | 1.81 | 2005 |
Online Encryption Schemes: New Security Notions and Constructions | 16 | 0.74 | 2004 |
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem. | 127 | 5.10 | 2004 |
Randomness Re-use in Multi-recipient Encryption Schemeas | 80 | 3.10 | 2003 |
Secure Proxy Signature Schemes for Delegation of Signing Rights | 98 | 3.39 | 2003 |
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme | 355 | 12.70 | 2003 |
Efficient Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-Diffie-Hellman-group signature scheme | 62 | 6.40 | 2002 |
Key-Privacy in Public-Key Encryption | 189 | 16.89 | 2001 |
Public-key encryption in a multi-user setting: security proofs and improvements | 225 | 19.09 | 2000 |
The Security of Chaffing and Winnowing | 14 | 1.18 | 2000 |