Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Book
|
Cryptography: Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982ISBN: 3540119930 ;ISBN: 9783540119937 ;EISBN: 9783540394662 ;EISBN: 3540394664Full text available |
|
2 |
Material Type: Book Chapter
|
Hierarchical ID-Based CryptographyAdvances in Cryptology - ASIACRYPT 2002, 2002, Vol.2501, p.548-566 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2002 ;2003 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540001719 ;ISBN: 9783540001713 ;EISSN: 1611-3349 ;EISBN: 9783540361787 ;EISBN: 3540361782 ;DOI: 10.1007/3-540-36178-2_34 ;OCLC: 935290913 ;LCCallNum: QA268Full text available |
|
3 |
Material Type: Conference Proceeding
|
Correlation Power Analysis with a Leakage ModelCryptographic Hardware and Embedded Systems - CHES 2004, 2004, p.16-29 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540226664 ;ISBN: 9783540226666 ;EISSN: 1611-3349 ;EISBN: 3540286322 ;EISBN: 9783540286325 ;DOI: 10.1007/978-3-540-28632-5_2Full text available |
|
4 |
Material Type: Article
|
Identity-based encryption from the weil pairingSIAM journal on computing, 2003-01, Vol.32 (3), p.586-615 [Peer Reviewed Journal]2003 INIST-CNRS ;[Copyright] © 2003 Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/s0097539701398521Full text available |
|
5 |
Material Type: Article
|
Efficient quantum key distribution scheme and a proof of its unconditional securityJournal of cryptology, 2005-04, Vol.18 (2), p.133-165 [Peer Reviewed Journal]2005 INIST-CNRS ;Springer-Verlag 2004. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-004-0142-yFull text available |
|
6 |
Material Type: Article
|
Unconditional Security of Quantum Key Distribution Over Arbitrarily Long DistancesScience (American Association for the Advancement of Science), 1999-03, Vol.283 (5410), p.2050-2056 [Peer Reviewed Journal]Copyright 1999 American Association for the Advancement of Science ;1999 INIST-CNRS ;COPYRIGHT 1999 American Association for the Advancement of Science ;Copyright American Association for the Advancement of Science Mar 26, 1999 ;ISSN: 0036-8075 ;EISSN: 1095-9203 ;DOI: 10.1126/science.283.5410.2050 ;PMID: 10092221 ;CODEN: SCIEASFull text available |
|
7 |
Material Type: Conference Proceeding
|
Implementing the Tate PairingAlgorithmic Number Theory, 2002, p.324-337 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2002 ;2003 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540438637 ;ISBN: 9783540438632 ;EISSN: 1611-3349 ;EISBN: 3540454551 ;EISBN: 9783540454557 ;DOI: 10.1007/3-540-45455-1_26Full text available |
|
8 |
Material Type: Article
|
Triplet-singlet spin relaxation via nuclei in a double quantum dotNature, 2005-06, Vol.435 (7044), p.925-928 [Peer Reviewed Journal]2005 INIST-CNRS ;COPYRIGHT 2005 Nature Publishing Group ;Copyright Macmillan Journals Ltd. Jun 16, 2005 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/nature03815 ;PMID: 15944715 ;CODEN: NATUASFull text available |
|
9 |
Material Type: Book
|
Advances in Cryptology EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 ProceedingsSpringer-Verlag Berlin Heidelberg 1994 ;ISSN: 0302-9743 ;ISBN: 9783540576006 ;ISBN: 3540576002 ;ISBN: 9783662186022 ;ISBN: 3662186020 ;EISSN: 1611-3349 ;EISBN: 3540482857 ;EISBN: 9783540482857 ;DOI: 10.1007/3-540-48285-7 ;OCLC: 958521129 ;OCLC: 827358252Full text available |
|
10 |
Material Type: Book
|
Cryptographic Hardware and Embedded Systems - CHES 2000: Second International Workshop Worcester, MA, USA, August 17-18, 2000 ProceedingsSpringer Berlin Heidelberg 2000 ;ISSN: 0302-9743 ;ISBN: 354041455X ;ISBN: 9783540414551 ;ISBN: 3662164698 ;ISBN: 9783662164693 ;EISSN: 1611-3349 ;EISBN: 3540444998 ;EISBN: 9783540444992 ;DOI: 10.1007/3-540-44499-8 ;OCLC: 935290972Full text available |
|
11 |
Material Type: Book
|
Cryptographic Hardware and Embedded Systems - CHES 2001: Third International Workshop, Paris, France, May 14-16, 2001 ProceedingsSpringer-Verlag Berlin Heidelberg 2001 ;ISSN: 0302-9743 ;ISBN: 9783540425212 ;ISBN: 3540425217 ;ISBN: 9783662193228 ;ISBN: 3662193221 ;EISSN: 1611-3349 ;EISBN: 3540447091 ;EISBN: 9783540447092 ;DOI: 10.1007/3-540-44709-1 ;OCLC: 958559547Full text available |
|
12 |
Material Type: Conference Proceeding
|
On the (im)possibility of obfuscating programs : (Extended abstract)Lecture notes in computer science, 2001, p.1-18 [Peer Reviewed Journal]2001 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540424563 ;ISBN: 9783540424567 ;EISSN: 1611-3349 ;DOI: 10.1007/3-540-44647-8_1Full text available |
|
13 |
Material Type: Article
|
Quantum key distribution using gaussian-modulated coherent statesNature (London), 2003-01, Vol.421 (6920), p.238-241 [Peer Reviewed Journal]2003 INIST-CNRS ;COPYRIGHT 2003 Nature Publishing Group ;Copyright Macmillan Journals Ltd. Jan 16, 2003 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/nature01289 ;PMID: 12529636 ;CODEN: NATUASFull text available |
|
14 |
Material Type: Conference Proceeding
|
Aggregate and Verifiably Encrypted Signatures from Bilinear MapsAdvances in Cryptology — EUROCRYPT 2003, 2003, p.416-432 [Peer Reviewed Journal]International Association for Cryptologic Research 2003 ;2003 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540140395 ;ISBN: 9783540140399 ;EISSN: 1611-3349 ;EISBN: 3540392009 ;EISBN: 9783540392002 ;DOI: 10.1007/3-540-39200-9_26Full text available |
|
15 |
Material Type: Conference Proceeding
|
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear PairingsInformation Security and Privacy, 2003, p.312-323 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2003 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540405153 ;ISBN: 3540405151 ;EISSN: 1611-3349 ;EISBN: 354045067X ;EISBN: 9783540450672 ;DOI: 10.1007/3-540-45067-X_27Full text available |
|
16 |
Material Type: Book Chapter
|
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUsCryptographic Hardware and Embedded Systems - CHES 2004, 2004, p.119-132 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540226664 ;ISBN: 9783540226666 ;EISSN: 1611-3349 ;EISBN: 3540286322 ;EISBN: 9783540286325 ;DOI: 10.1007/978-3-540-28632-5_9Full text available |
|
17 |
Material Type: Article
|
Security arguments for digital signatures and blind signaturesJournal of cryptology, 2000-06, Vol.13 (3), p.361-396 [Peer Reviewed Journal]2000 INIST-CNRS ;International Association for Criptologic Rese 2000. ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s001450010003Full text available |
|
18 |
Material Type: Conference Proceeding
|
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataAdvances in Cryptology - EUROCRYPT 2004, 2004, p.523-540 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540219354 ;ISBN: 3540219358 ;EISSN: 1611-3349 ;EISBN: 3540246762 ;EISBN: 9783540246763 ;DOI: 10.1007/978-3-540-24676-3_31Full text available |
|
19 |
Material Type: Conference Proceeding
|
Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesAdvances in Cryptology - EUROCRYPT 2004, 2004, p.223-238 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540219354 ;ISBN: 3540219358 ;EISSN: 1611-3349 ;EISBN: 3540246762 ;EISBN: 9783540246763 ;DOI: 10.1007/978-3-540-24676-3_14Full text available |
|
20 |
Material Type: Book Chapter
|
An Efficient Signature Scheme from Bilinear Pairings and Its ApplicationsLecture notes in computer science, 2004, p.277-290 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540210180 ;ISBN: 9783540210184 ;EISSN: 1611-3349 ;EISBN: 9783540246329 ;EISBN: 3540246320 ;DOI: 10.1007/978-3-540-24632-9_20Full text available |