default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2021
- Behzad Abdolmaleki, Daniel Slamanig:
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More. ACISP 2021: 46-67 - Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé:
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. ACISP 2021: 214-233 - Xavier Boyen, Ernest Foo, Qinyi Li:
Anonymous Lattice Identity-Based Encryption with Traceable Identities. ACISP 2021: 630-649 - Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. ACISP 2021: 510-528 - Jikun Chen, Ruoyu Deng, Hongbin Chen, Na Ruan, Yao Liu, Chao Liu, Chunhua Su:
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism. ACISP 2021: 490-509 - Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models. ACISP 2021: 550-568 - Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Joohee Lee, Junbum Shin, Yongsoo Song:
Lattice-Based Secure Biometric Authentication for Hamming Distance. ACISP 2021: 653-672 - Wei-Yang Chiu, Weizhi Meng:
Mind the Scraps: Attacking Blockchain Based on Selfdestruct. ACISP 2021: 451-469 - Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. ACISP 2021: 330-349 - Handong Cui, Tsz Hon Yuen:
A Trustless GQ Multi-signature Scheme with Identifiable Abort. ACISP 2021: 673-693 - Sabyasachi Dutta, Reihaneh Safavi-Naini:
Leakage Resilient Cheating Detectable Secret Sharing Schemes. ACISP 2021: 3-23 - Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy:
Puncturable Identity-Based Encryption from Lattices. ACISP 2021: 571-589 - Muhammad ElSheikh, Amr M. Youssef:
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers. ACISP 2021: 111-131 - Yanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu, Siu-Ming Yiu, Meiqin Wang:
Forced Independent Optimized Implementation of 4-Bit S-Box. ACISP 2021: 151-170 - Steven D. Galbraith, Trey Li:
Small Superset and Big Subset Obfuscation. ACISP 2021: 68-87 - Thomas Haines, Johannes Müller:
Optimal Randomized Partial Checking for Decryption Mix Nets. ACISP 2021: 277-292 - Thomas Haines, Johannes Müller:
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. ACISP 2021: 293-308 - Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. ACISP 2021: 171-190 - Takanori Isobe, Ryoma Ito:
Security Analysis of End-to-End Encryption for Zoom Meetings. ACISP 2021: 234-253 - Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. ACISP 2021: 353-371 - Xiaodan Li, Wenling Wu:
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. ACISP 2021: 132-150 - Xueqiao Liu, Kai He, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Broadcast Authenticated Encryption with Keyword Search. ACISP 2021: 193-213 - Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak. ACISP 2021: 91-110 - Yizhong Liu, Jianwei Liu, Yiming Hei, Yu Xia, Qianhong Wu:
A Secure Cross-Shard View-Change Protocol for Sharding Blockchains. ACISP 2021: 372-390 - Chao Liu, Anyu Wang, Zhongxiang Zheng:
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE. ACISP 2021: 590-609 - Tapas Pal, Ratna Dutta:
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF. ACISP 2021: 24-45 - Tapas Pal, Ratna Dutta:
CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption. ACISP 2021: 254-274 - Jing Pan, Xiaofeng Chen, Fangguo Zhang, Willy Susilo:
Forward-Secure Group Encryptions from Lattices. ACISP 2021: 610-629 - Minfeng Qi, Ziyuan Wang, Fan Wu, Rob Hanson, Shiping Chen, Yang Xiang, Liming Zhu:
A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design. ACISP 2021: 473-489 - Anh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signature for Blockchain Privacy Protection. ACISP 2021: 391-407
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-13 12:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint