Finding the key length of a Vigenère cipher: How to improve the twist algorithm | 0 | 0.34 | 2020 |
On The Performance Analysis Of Sphincs+ Verification | 0 | 0.34 | 2019 |
A Visibility-Based Lower Bound For Android Unlock Patterns | 0 | 0.34 | 2017 |
Average-Case Analysis Of Certificate Revocation In Combinatorial Certificate Management Schemes | 0 | 0.34 | 2016 |
A Visibility-Based Upper Bound For Android Unlock Patterns | 0 | 0.34 | 2016 |
Mathematical Analysis Of Secrecy Amplification In Key Infection | 0 | 0.34 | 2016 |
On The Probability Of Certificate Revocation In Combinatorial Certificate Management Schemes | 1 | 0.41 | 2015 |
Randomized Certificate Replacement With Bounded Collateral Damage | 0 | 0.34 | 2015 |
Unilateral Distance Bounding Protocol With Bidirectional Challenges | 0 | 0.34 | 2013 |
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles | 7 | 0.44 | 2013 |
Secure And Lightweight Localization Method For Wireless Sensor Networks | 2 | 0.36 | 2013 |
Comments on “Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption” | 2 | 0.39 | 2013 |
Lightweight Distance Bounding Protocol Against Relay Attacks | 4 | 0.41 | 2012 |
Exact Formulae for Resilience in Random Key Predistribution Schemes | 2 | 0.36 | 2012 |
A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders. | 0 | 0.34 | 2012 |
Security Condition For Exact Localization In Wireless Ad Hoc Networks | 0 | 0.34 | 2012 |
Sanitizable Signatures Reconsidered | 1 | 0.36 | 2011 |
On the average cost of order-preserving encryption based on hypergeometric distribution | 0 | 0.34 | 2011 |
Fast Verification Of Hash Chains With Reduced Storage | 1 | 0.37 | 2011 |
Lightweight One-Time Signature For Short Messages | 0 | 0.34 | 2011 |
Distance Bounding Protocol with Adjustable False Acceptance Rate | 11 | 0.60 | 2011 |
Order-Preserving encryption for non-uniformly distributed plaintexts | 12 | 0.64 | 2011 |
Energy-Efficient Hash Chain Traversal | 2 | 0.38 | 2011 |
Distance Bounding Protocol for Mutual Authentication | 14 | 0.81 | 2011 |
On fast verification of hash chains | 2 | 0.39 | 2010 |
Generalized Hash Chain Traversal With Selective Output | 1 | 0.36 | 2010 |
Trapdoor sanitizable signatures made easy | 8 | 0.45 | 2010 |
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers | 0 | 0.34 | 2009 |
Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity | 10 | 0.60 | 2009 |
Cracking Hill Ciphers with Goodness-of-Fit Statistics | 2 | 0.53 | 2009 |
Invisibly Sanitizable Signature Without Pairings | 0 | 0.34 | 2009 |
Efficient Fair Exchange from Identity-Based Signature | 6 | 0.47 | 2008 |
Security Analysis of Yeh-Tsai Security Mechanism | 0 | 0.34 | 2008 |
New Multiparty Signature Schemes for Network Routing Applications | 8 | 1.40 | 2008 |
Optimistic fair exchange in a multi-user setting | 28 | 0.79 | 2008 |
Generalized Combinatoric Accumulator | 2 | 0.37 | 2008 |
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing | 68 | 2.20 | 2007 |
Security Analysis of Zhu-Bao's Verifiably Committed Signature | 1 | 0.35 | 2007 |
Time Capsule Signature | 8 | 0.52 | 2005 |
Cryptanalysis Of Yeh-Shen-Hwang'S One-Time Password Authentication Scheme | 4 | 0.54 | 2005 |
Timed-release encryption with pre-open capability and its application to certified e-mail system | 27 | 1.27 | 2005 |
Identity-Based Cryptography in Public Key Management | 32 | 1.83 | 2004 |
EPA: an efficient password-based protocol for authenticated key exchange | 9 | 0.67 | 2003 |
New Signcryption Schemes Based on KCDSA | 40 | 1.60 | 2001 |