Conferences in DBLP
Steve Babbage , Carlos Cid , Norbert Pramstaller , Håvard Raddum An Analysis of the Hermes8 Stream Ciphers. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:1-10 [Conf ] Sultan Al-Hinai , Ed Dawson , Matthew Henricksen , Leonie Ruth Simpson On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:11-28 [Conf ] Debojyoti Bhattacharya , Debdeep Mukhopadhyay , Dhiman Saha , Dipanwita Roy Chowdhury Strengthening NLS Against Crossword Puzzle Attack. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:29-44 [Conf ] Jun Yajima , Yu Sasaki , Yusuke Naito , Terutoshi Iwasaki , Takeshi Shimoyama , Noboru Kunihiro , Kazuo Ohta A New Strategy for Finding a Differential Path of SHA-1. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:45-58 [Conf ] Donghoon Chang , Moti Yung , Jaechul Sung , Seokhie Hong , Sangjin Lee Preimage Attack on the Parallel FFT-Hashing Function. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:59-67 [Conf ] Norbert Pramstaller , Mario Lamberger , Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:68-81 [Conf ] Olivier Billet , Matthew J. B. Robshaw , Thomas Peyrin On Building Hash Functions from Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:82-95 [Conf ] Julien Bringer , Hervé Chabanne , Malika Izabachène , David Pointcheval , Qiang Tang , Sébastien Zimmer An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:96-106 [Conf ] Jovan Dj. Golic , Madalina Baltatu Soft Generation of Secure Biometric Keys. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:107-121 [Conf ] Toshinori Araki , Satoshi Obana Flaws in Some Secret Sharing Schemes Against Cheating. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:122-132 [Conf ] Toshinori Araki Efficient (k , n ) Threshold Secret Sharing Schemes Secure Against Cheating from n -1 Cheaters. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:133-142 [Conf ] Kitae Jeong , Changhoon Lee , Jaechul Sung , Seokhie Hong , Jongin Lim Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:143-157 [Conf ] Fen Liu , Wen Ji , Lei Hu , Jintai Ding , Shuwang Lv , Andrei Pyshkin , Ralf-Philipp Weinmann Analysis of the SMS4 Block Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:158-170 [Conf ] Yongdong Wu , Feng Bao , Robert H. Deng Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:171-183 [Conf ] Jean-Philippe Aumasson , Matthieu Finiasz , Willi Meier , Serge Vaudenay TCH o : A Hardware-Oriented Trapdoor Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:184-199 [Conf ] Ryotaro Hayashi , Keisuke Tanaka Anonymity on Paillier's Trap-Door Permutation. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:200-214 [Conf ] Qiong Huang , Duncan S. Wong Generic Certificateless Key Encapsulation Mechanism. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:215-229 [Conf ] Masayuki Yoshino , Katsuyuki Okeya , Camille Vuillaume Double-Size Bipartite Modular Multiplication. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:230-244 [Conf ] Erik Dahmen , Katsuyuki Okeya , Daniel Schepers Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:245-258 [Conf ] Takeru Ishihara , Hiroshi Aono , Sadayuki Hongo , Junji Shikata Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:259-273 [Conf ] James Birkett , Alexander W. Dent , Gregory Neven , Jacob C. N. Schuldt Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:274-292 [Conf ] Christophe Tartary , Huaxiong Wang Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:293-307 [Conf ] Xinyi Huang , Yi Mu , Willy Susilo , Duncan S. Wong , Wei Wu Certificateless Signature Revisited. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:308-322 [Conf ] Cheng-Kang Chu , Wen-Guey Tzeng Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:323-337 [Conf ] Sylvain Pasini , Serge Vaudenay Hash-and-Sign with Weak Hashing Made Secure. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:338-354 [Conf ] Kan Yasuda "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:355-369 [Conf ] Akihiro Yamamura , Takashi Kurokawa , Junji Nakazato Threshold Anonymous Group Identification and Zero-Knowledge Proof. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:370-384 [Conf ] Mohammad Reza Reyhanitabar , Shuhong Wang , Reihaneh Safavi-Naini Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:385-399 [Conf ] Stefan Brands , Liesje Demuynck , Bart De Decker A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:400-415 [Conf ] Ivan Damgård , Martin Geisler , Mikkel Krøigaard Efficient and Secure Comparison for On-Line Auctions. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:416-430 [Conf ] Man Ho Au , Willy Susilo , Yi Mu Practical Compact E-Cash. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:431-445 [Conf ] Suvasini Panigrahi , Amlan Kundu , Shamik Sural , Arun K. Majumdar Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:446-460 [Conf ] Kannan Srinathan , Prasad Raghavendra , C. Pandu Rangan On Proactive Perfectly Secure Message Transmission. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:461-473 [Conf ]