On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. [Citation Graph (, )][DBLP]
A New Public Key Encryption Scheme Equivalent to Factoring. [Citation Graph (, )][DBLP]
Security Modification for the Hwang-Wen-Hwang's E-voting Scheme. [Citation Graph (, )][DBLP]
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature. [Citation Graph (, )][DBLP]
A secure and low-energy logic style using charge recovery approach. [Citation Graph (, )][DBLP]
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. [Citation Graph (, )][DBLP]
Charge recovery logic as a side channel attack countermeasure. [Citation Graph (, )][DBLP]
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. [Citation Graph (, )][DBLP]
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme [Citation Graph (, )][DBLP]
Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework [Citation Graph (, )][DBLP]
Generalized Secure Distributed Source Coding with Side Information [Citation Graph (, )][DBLP]
Rate Regions of Secret Key Sharing in a New Source Model [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP