The SCEAS System
Navigation Menu

Conferences in DBLP

(vietcrypt)
2006 (conf/vietcrypt/2006)

  1. Aline Gouget, Jacques Patarin
    Probabilistic Multivariate Cryptography. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:1-18 [Conf]
  2. Jean Monnerat, Serge Vaudenay
    Short 2-Move Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:19-36 [Conf]
  3. Matthew J. B. Robshaw
    Searching for Compact Algorithms: cgen. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:37-49 [Conf]
  4. Tatsuaki Okamoto
    On Pairing-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:50-66 [Conf]
  5. Fangguo Zhang, Xiaofeng Chen, Willy Susilo, Yi Mu
    A New Signature Scheme Without Random Oracles from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:67-80 [Conf]
  6. Lan Nguyen
    Efficient Dynamic k-Times Anonymous Authentication. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:81-98 [Conf]
  7. Claire Whelan, Michael Scott
    Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure? [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:99-114 [Conf]
  8. Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta
    Factorization of Square-Free Integers with High Bits Known. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:115-130 [Conf]
  9. Roberto Maria Avanzi, Francesco Sica
    Scalar Multiplication on Koblitz Curves Using Double Bases. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:131-146 [Conf]
  10. Fumitaka Hoshino, Tetsutaro Kobayashi, Kazumaro Aoki
    Compressed Jacobian Coordinates for OEF. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:147-156 [Conf]
  11. Miyako Ohkubo, Masayuki Abe
    On the Definition of Anonymity for Ring Signatures. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:157-174 [Conf]
  12. Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen
    Escrowed Linkability of Ring Signatures and Its Applications. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:175-192 [Conf]
  13. Cécile Delerablée, David Pointcheval
    Dynamic Fully Anonymous Short Group Signatures. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:193-210 [Conf]
  14. Phillip Rogaway
    Formalizing Human Ignorance. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:211-228 [Conf]
  15. Arjen K. Lenstra, Daniel Page, Martijn Stam
    Discrete Logarithm Variants of VSH. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:229-242 [Conf]
  16. Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
    How to Construct Sufficient Conditions for Hash Functions. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:243-259 [Conf]
  17. Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong
    Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:260-270 [Conf]
  18. Jianyong Huang, Jennifer Seberry, Willy Susilo
    On the Internal Structure of Alpha-MAC. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:271-285 [Conf]
  19. Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim
    A Weak Key Class of XTEA for a Related-Key Rectangle Attack. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:286-297 [Conf]
  20. Jens-Matthias Bohli, Rainer Steinwandt
    Deniable Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:298-311 [Conf]
  21. Hossein Ghodosi, Josef Pieprzyk
    An Ideal and Robust Threshold RSA. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:312-321 [Conf]
  22. Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
    Towards Provably Secure Group Key Agreement Building on Group Theory. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:322-336 [Conf]
  23. Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto
    Universally Composable Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:337-353 [Conf]
  24. Duong Hieu Phan
    Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:354-365 [Conf]
  25. Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:366-384 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002