Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2008
- Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin:
How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. ProvSec 2008: 241-253 - Ahto Buldas, Margus Niitsoo:
Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. ProvSec 2008: 254-267 - Liqun Chen, Paul Morrissey, Nigel P. Smart:
On Proofs of Security for DAA Schemes. ProvSec 2008: 156-175 - Sherman S. M. Chow, Siu-Ming Yiu:
Timed-Release Encryption Revisited. ProvSec 2008: 38-51 - Yvo Desmedt, Duong Hieu Phan:
A CCA Secure Hybrid Damgård's ElGamal Encryption. ProvSec 2008: 68-82 - Wei Du, Mingxing He:
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. ProvSec 2008: 345-359 - Sebastian Gajek:
A Universally Composable Framework for the Analysis of Browser-Based Security Protocols. ProvSec 2008: 283-297 - Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk:
Universally Composable Security Analysis of TLS. ProvSec 2008: 313-327 - Kristian Gjøsteen, Lillian Kråkmo:
Round-Optimal Blind Signatures from Waters Signatures. ProvSec 2008: 112-126 - Fuchun Guo, Yi Mu:
Optimal Online/Offline Signature: How to Sign a Message without Online Computation. ProvSec 2008: 98-111 - Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen:
A Tamper-Evident Voting Machine Resistant to Covert Channels. ProvSec 2008: 335-344 - Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen Xiao:
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. ProvSec 2008: 1-21 - Tibor Jager, Jörg Schwenk:
On the Equivalence of Generic Group Models. ProvSec 2008: 200-209 - Peeter Laud, Long Ngo:
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. ProvSec 2008: 298-312 - Zhenhua Liu, Yupu Hu, Hua Ma:
Secure Proxy Multi-signature Scheme in the Standard Model. ProvSec 2008: 127-140 - Zhengqin Luo:
Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups. ProvSec 2008: 185-199 - Atsushi Mitsuda, Tetsu Iwata:
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. ProvSec 2008: 22-37 - Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
Relationship of Three Cryptographic Channels in the UC Framework. ProvSec 2008: 268-282 - S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan:
Efficient and Provably Secure Certificateless Multi-receiver Signcryption. ProvSec 2008: 52-67 - Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Server-Aided Verification Signatures: Definitions and New Constructions. ProvSec 2008: 141-155 - Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta:
Leaky Random Oracle (Extended Abstract). ProvSec 2008: 226-240 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ProvSec 2008: 83-97 - Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ProvSec 2008: 176-184 - Huafei Zhu:
Round Optimal Universally Composable Oblivious Transfer Protocols. ProvSec 2008: 328-334 - Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang:
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. ProvSec 2008: 210-225 - Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. Lecture Notes in Computer Science 5324, Springer 2008, ISBN 978-3-540-88732-4 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-10 23:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint