Computer Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 601 to 620 of 3037
TitleAuthor(s)Issue Date
Neural Machine Translation with Bilingual History Involved Attention
Proceeding/Conference:Natural Language Processing and Chinese Computing: 8th CCF International Conference, NLPCC 2019, Dunhuang, China, October 9–14, 2019, Proceedings, Part II
2019
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism
Proceeding/Conference:Advances in Cryptology - ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II
2018
Lattice-based dual receiver encryption and more
Proceeding/Conference:Information Security and Privacy : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018, Proceedings
2018
Preprocess-then-NTT technique and its applications to kyber and newhope
Proceeding/Conference:Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised Selected Papers
2019
Regularly lossy functions and applications
Proceeding/Conference:Topics in Cryptology - CT-RSA 2018 : The Cryptographers’ Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings
2018
Compact hierarchical IBE from lattices in the standard model
Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
2018
Towards tightly secure deterministic public key encryption
Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
2018
New framework of password-based authenticated key exchange from only-one lossy encryption
Proceeding/Conference:Provable Security : 11th International Conference, ProvSec 2017, Xi’an, China, October 23–25, 2017, Proceedings
2017
IND-PCA secure KEM is enough for password-based authenticated key exchange
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus
Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016
Lossy projective hashing and its applications
Proceeding/Conference:Progress in Cryptology - INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
2015
Identity-based lossy encryption from learning with errors
Proceeding/Conference:Advances in Information and Computer Security, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26–28, 2015, Proceedings
2015
On the lossiness of 2k-th power and the instantiability of rabin-OAEP
Proceeding/Conference:Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014, Proceedings
2014
Efficient lossy trapdoor functions based on subgroup membership assumptions
Proceeding/Conference:Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings
2013
A secure public key encryption from computational linear Diffe-Hellman problem
Proceeding/Conference:Proceedings of the 2012 8th International Conference on Computational Intelligence and Security, CIS 2012
2012
Security on SM2 and GOST Signatures against Related Key Attacks
Proceeding/Conference:2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
2021
A Trustless GQ Multi-signature Scheme with Identifiable Abort
Proceeding/Conference:The 26th Australasian Conference on Information Security and Privacy (ACISP), 2021
2021
One-More Unforgeability of Blind ECDSA
Proceeding/Conference:26th European Symposium on Research in Computer Security (ESORICS 2021)
2021
 
Semantic Search and Summarization of Judgments Using Topic Modeling
Proceeding/Conference:Legal Knowledge and Information Systems
2021
 
Quantum Superpositions Of Causal Orders
Proceeding/Conference:Young Researchers' Forum on Quantum Information Science 2020, Taiwan
2020
Collection's Items (Sorted by Submit Date in Descending order): 601 to 620 of 3037