Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes | 0 | 0.34 | 2020 |
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation. | 0 | 0.34 | 2017 |
How To Make Traitor Tracing Schemes Secure Against A Content Comparison Attack In Actual Services | 0 | 0.34 | 2017 |
Content and Key Management to Trace Traitors in Broadcasting Services | 1 | 0.35 | 2015 |
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE | 0 | 0.34 | 2014 |
A construction method of matroidal networks | 2 | 0.37 | 2012 |
A Numerical Evaluation Of Entanglement Sharing Protocols Using Quantum Ldpc Css Codes | 0 | 0.34 | 2012 |
Spatially coupled quasi-cyclic quantum LDPC codes | 27 | 1.16 | 2011 |
Round-optimal deniable ring authentication in the presence of big brother | 3 | 0.41 | 2010 |
On the security of the quantum key distribution using the Mean King Problem | 1 | 0.63 | 2010 |
Cca-Secure Public Key Encryption Without Group-Dependent Hash Functions | 0 | 0.34 | 2009 |
Generic Construction of Stateful Identity Based Encryption | 0 | 0.34 | 2009 |
Bounds on the Number of Users for Random 2-Secure Codes | 1 | 0.38 | 2009 |
An Efficient 2-Secure And Short Random Fingerprint Code And Its Security Evaluation | 6 | 0.53 | 2009 |
An improvement of discrete Tardos fingerprinting codes | 45 | 1.66 | 2009 |
An image sanitizing scheme using digital watermarking | 0 | 0.34 | 2009 |
Strong Anonymous Signature | 3 | 0.39 | 2009 |
A generic construction of useful client puzzles | 2 | 0.38 | 2009 |
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions | 0 | 0.34 | 2008 |
A Novel Probabilistic Passive Attack On The Protocols Hb And Hb+ | 2 | 0.38 | 2008 |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption | 1 | 0.35 | 2008 |
On the use of Bhattacharyya distance as a measure of the detectability of steganographic systems | 3 | 0.39 | 2008 |
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service | 4 | 0.42 | 2007 |
Bounded CCA2-Secure Encryption | 30 | 1.33 | 2007 |
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs | 0 | 0.34 | 2007 |
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off | 7 | 0.57 | 2007 |
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use | 0 | 0.34 | 2007 |
Formal Security Treatments For Ibe-To-Signature Transformation: Relations Among Security Notions | 11 | 0.56 | 2007 |
Comparative studies in key disagreement correction process on wireless key agreement system | 2 | 0.44 | 2007 |
Wolf attack probability: a new security measure in biometric authentication systems | 9 | 0.97 | 2007 |
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services | 0 | 0.34 | 2007 |
An efficient aggregate shuffle argument scheme | 1 | 0.37 | 2007 |
Applying fujisaki-okamoto to identity-based encryption | 17 | 1.32 | 2006 |
Digitally signed document sanitizing scheme based on bilinear maps | 47 | 1.75 | 2006 |
Adaptively secure traitor tracing against key exposure and its application to anywhere TV service | 3 | 0.41 | 2006 |
Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions | 5 | 0.40 | 2006 |
Security Protocols Protection Based on Anomaly Detection | 1 | 0.37 | 2006 |
Parallel key-insulated public key encryption | 34 | 1.13 | 2006 |
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature | 11 | 0.82 | 2006 |
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication | 1 | 0.36 | 2006 |
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries. | 0 | 0.34 | 2006 |
.Efficient Protocols Achieving The Commitment Capacity Of Noisy Correlations | 9 | 0.61 | 2006 |
A Provably Secure Refreshable Partially Anonymous Token and Its Applications | 1 | 0.37 | 2006 |
Trends and challenges for securer cryptography in practice | 0 | 0.34 | 2005 |
How to Protect Peer-to-Peer Online Games from Cheats | 0 | 0.34 | 2005 |
Identity-Based hierarchical strongly key-insulated encryption and its application | 35 | 1.31 | 2005 |
Graph-Decomposition-Based frameworks for subset-cover broadcast encryption and efficient instantiations | 10 | 0.64 | 2005 |
IDS false alarm reduction using continuous and discontinuous patterns | 21 | 1.09 | 2005 |
Digitally Signed Document Sanitizing Scheme With Disclosure Condition Control | 51 | 2.98 | 2005 |
A generic conversion with optimal redundancy | 4 | 0.42 | 2005 |