Searched for keywords.author.keyword:"cryptography" OR acmdlCCS:"cryptography"  [new search]  [edit/save query]  [advanced search]
Searched The ACM Full-Text Collection: 472,798 records   [Expand your search to The ACM Guide to Computing Literature: 2,693,848 records] Help: ACM vs. Guide
6,433 results found
Export Results: bibtexendnoteacmrefcsv

Refine by People
Names show/hide
Institutions show/hide
Authors show/hide
Editors show/hide
Reviewers show/hide
Refine by Publications
Publication Names show/hide
ACM Publications show/hide
All Publications show/hide
Content Formats show/hide
Publishers show/hide
Refine by Conferences
Sponsors show/hide
Events show/hide
Proceeding Series show/hide
Refine by Publication Year
1955
Result 1 – 20 of 6,433
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1 published by ACM
April 2015 ACM Transactions on Programming Languages and Systems (TOPLAS): Volume 37 Issue 2, April 2015
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 18,   Downloads (12 Months): 181,   Downloads (Overall): 476

Full text available: PDFPDF
This article presents a full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of functional correctness in the Coq proof assistant, using the Verifiable C program logic. Verifiable C is a separation logic for the C language, proved sound with respect ...
Keywords: Cryptography
[result highlights]

2 published by ACM
October 2004 InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum development
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 11,   Downloads (12 Months): 144,   Downloads (Overall): 1,085

Full text available: PDFPDF
Traditionally, courses in cryptography have been heavily mathematical in nature. Yet, there is a large population of Information Systems practitioners who are not mathematicians, but who need to implement cryptography as a part of an overall system that they are developing. These people need a thorough understanding of the characteristics ...
Keywords: cryptography
[result highlights]

3 published by ACM
March 2004 ACM SIGCSE Bulletin: Volume 36 Issue 1, March 2004
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5,   Downloads (12 Months): 68,   Downloads (Overall): 1,497

Full text available: PDFPDF
The panel discusses solutions to the problem of computer security education.
Keywords: security, cryptography
Also published in:
March 2004  SIGCSE '04: Proceedings of the 35th SIGCSE technical symposium on Computer science education
[result highlights]

4 published by ACM
September 2011 InfoSecCD '11: Proceedings of the 2011 Information Security Curriculum Development Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 6,   Downloads (12 Months): 56,   Downloads (Overall): 506

Full text available: PDFPDF
The cryptography of elliptical curve (ECC) is an approach in cryptography public key based on the algebraic structure of elliptical curves on the finished fields; a smaller group can be used to obtain the same level of security as RSA-based. In this article a simple presentation on cryptography with focus ...
Keywords: cryptography algorithms, elliptic curve cryptography, RSA, cryptography
[result highlights]

5 published by ACM
July 2016 ITiCSE '16: Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 71,   Downloads (Overall): 71

Full text available: PDFPDF
This paper describes a visualization tool AESvisual that helps students learn and instructors teach the AES cipher. The software allows the user to visualize all the major steps of AES encryption and decryption. The demo mode is useful and efficient for classroom presentation and the practice mode provides the user ...
Keywords: cryptography, visualization
[result highlights]

6 published by ACM
November 2000 CCS '00: Proceedings of the 7th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 92
Downloads (6 Weeks): 2,   Downloads (12 Months): 24,   Downloads (Overall): 570

Full text available: PDFPDF
Keywords: simulatability, cryptography
[result highlights]

7 published by ACM
April 2017 IoTPTS '17: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 44,   Downloads (Overall): 44

Full text available: PDFPDF
Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another efficiently and without knowledge of public and private keys. In this work we explore this lattice transformation property from cryptographic engineering viewpoint. We apply ciphertext transformation to compress Ring-LWE ciphertexts and to ...
Keywords: lightweight cryptography, post-quantum cryptography, ring-LWE encryption, lattice cryptography
[result highlights]

8 published by ACM
May 2013 ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 23,   Downloads (Overall): 152

Full text available: PDFPDF
This paper focus on incremental cryptographic schemes that solve the privacy problem introduced by Bellare, Goldreich and Goldwasser. To our knowledge, none of the schemes designed so far provide simultaneously strong privacy guarantees and byte-wise incremental operations. We propose a new method that extends a block-wise incremental cryptographic scheme into ...
Keywords: parallel cryptography, incremental cryptography, perfect privacy
[result highlights]

9 published by ACM
September 2009 InfoSecCD '09: 2009 Information Security Curriculum Development Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 26,   Downloads (Overall): 268

Full text available: PDFPDF
This paper examines the missing factors in cryptography algorithms curriculum designed to teach Information security (information assurance) to students. Normally, there are four different aspects to organizing a cryptography curriculum for a curriculum developer, drawing from the work inspiration of their background, their field of study, and their target degree. ...
Keywords: cryptography curriculum for information security, cryptography curriculum for mathematics, cryptography curriculum, cryptography curriculum for computer science, applied cryptography, standard cryptography
[result highlights]

10 published by ACM
June 2007 STOC '07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 4,   Downloads (12 Months): 20,   Downloads (Overall): 397

Full text available: PDFPDF
We give an exponential separation between one-way quantum and classical communication protocols for twopartial Boolean functions, both of which are variants of the Boolean Hidden Matching Problem of Bar-Yossef et al. Earlier such an exponential separation was known only for a relational version of the Hidden Matching Problem. Our proofs ...
Keywords: communication complexity, quantum, cryptography
[result highlights]

11 published by ACM
October 2008 MSWiM '08: Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 132

Full text available: PDFPDF
Recent large scale disasters have awaken governments at home and abroad to their needs for preparedness to support homeland security and public safety. First responders of various agencies are often on the frontline to assist in managing these events to protect lives and property. The effectiveness of their mission is ...
Keywords: security, cryptography, multimedia
[result highlights]

12 published by ACM
November 2006 VizSEC '06: Proceedings of the 3rd international workshop on Visualization for computer security
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 19,   Downloads (Overall): 406

Full text available: PDFPDF
Visualization can be an effective means for analyzing security data and teaching students different concepts about various security algorithms. At the Air Force Academy, interactive visualizations are used to teach ciphers to students in a cryptography course. In the course of preparing student visualizations about the RC4 cipher characteristics, an ...
Keywords: cryptography, algorithm analysis, visualization
[result highlights]

13 published by ACM
October 2004 ACM SIGCOMM Computer Communication Review: Volume 34 Issue 5, October 2004
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 27,   Downloads (Overall): 773

Full text available: PDFPDF
We demonstrate high data-rate quantum-noise{protected data encryption through optical fibers using coherent states of light. Specifically, we demonstrate 650Mbps data encryption through a 10Gbps data-bearing, in-line amplified 200km-long line. In our protocol, legitimate users (who share a short secret-key) communicate using an M-ry signal set while an attacker (who does ...
Keywords: quantum cryptography, data encryption
[result highlights]

14 published by ACM
June 2002 SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 0,   Downloads (12 Months): 15,   Downloads (Overall): 1,164

Full text available: PDFPDF
The need for access control in a hierarchy arises in several different contexts. One such context is managing the information of an organization where the users are divided into different security classes depending on who has access to what. Several cryptographic solutions have been proposed to address this problem --- ...
Keywords: cryptography, access control, hierarchy
[result highlights]

15 published by ACM
April 1984 Communications of the ACM: Volume 27 Issue 4, April 1984
Publisher: ACM
Bibliometrics:
Citation Count: 25
Downloads (6 Weeks): 2,   Downloads (12 Months): 26,   Downloads (Overall): 838

Full text available: PDFPDF
Keywords: cryptographic protocols, cryptography
[result highlights]

16 published by ACM
January 2014 ITCS '14: Proceedings of the 5th conference on Innovations in theoretical computer science
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 92

Full text available: PDFPDF
We show how to securely obfuscate a new class of functions: conjunctions of NC 0 d circuits . These are functions of the form C (→/ x ) = ∧ m i=1 C 1 (→/ x ), where each C 1 is a boolean NC 0 d circuits circuit, whose ...
Keywords: cryptography, program obfuscation
[result highlights]

17 published by ACM
September 2006 Journal on Educational Resources in Computing (JERIC): Volume 6 Issue 3, September 2006
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 33,   Downloads (Overall): 838

Full text available: PDFPDF
Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzúa (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers. It can use ...
Keywords: classical cryptography, Cryptology
[result highlights]

18 published by ACM
March 2017 SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education
Publisher: ACM
Bibliometrics:
Citation Count: 0

Cryptography is a major area of study that provides mechanisms to achieve confidentiality, integrity, authenticity, and non-repudiation in information and computer security. For many not in the area of cryptography, teaching cryptography may be a challenge due to the mathematically heavy background underlying the subject. For students it may be ...
Keywords: cryptography, hash functions, introductory cryptography, digital signatures, symmetric key cryptography, public key cryptography, public key infrastructure (PKI)
[result highlights]

19 published by ACM
October 2006 ACM Transactions on Computational Logic (TOCL): Volume 7 Issue 4, October 2006
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 15,   Downloads (Overall): 266

Full text available: PDFPDF
The replacement (or collection or choice ) axiom scheme BB(Γ) asserts bounded quantifier exchange as follows: ∀ i < | a | ∃ x < a φ( i , x ) → ∃ w ∀ i < | a |φ( i ,[ w ] i ), for φ in the ...
Keywords: Bounded arithmetic, PV, cryptography
[result highlights]

20 published by ACM
October 2010 Q2SWinet '10: Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 26,   Downloads (Overall): 283

Full text available: PDFPDF
In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods can be ...
Keywords: authentication, elliptic curve cryptography, rfid
[result highlights]

Result 1 – 20 of 6,433
Result page: 1 2 3 4 5 6 7 8 9 10 >>



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us
 
Export Formats