|
Conferences in DBLP
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. [Citation Graph (, )][DBLP]
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. [Citation Graph (, )][DBLP]
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. [Citation Graph (, )][DBLP]
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. [Citation Graph (, )][DBLP]
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. [Citation Graph (, )][DBLP]
Practical Secure Evaluation of Semi-private Functions. [Citation Graph (, )][DBLP]
Secure Hamming Distance Based Computation and Its Applications. [Citation Graph (, )][DBLP]
Efficient Robust Private Set Intersection. [Citation Graph (, )][DBLP]
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]
An Efficient Identity-Based Online/Offline Encryption Scheme. [Citation Graph (, )][DBLP]
Dual-Policy Attribute Based Encryption. [Citation Graph (, )][DBLP]
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. [Citation Graph (, )][DBLP]
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. [Citation Graph (, )][DBLP]
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. [Citation Graph (, )][DBLP]
Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. [Citation Graph (, )][DBLP]
Tracing and Revoking Pirate Rebroadcasts. [Citation Graph (, )][DBLP]
Efficient Deniable Authentication for Signatures. [Citation Graph (, )][DBLP]
Homomorphic MACs: MAC-Based Integrity for Network Coding. [Citation Graph (, )][DBLP]
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. [Citation Graph (, )][DBLP]
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. [Citation Graph (, )][DBLP]
Cryptanalysis of Twister. [Citation Graph (, )][DBLP]
Cryptanalysis of CubeHash. [Citation Graph (, )][DBLP]
Collision Attack on Boole. [Citation Graph (, )][DBLP]
Integrity Protection for Revision Control. [Citation Graph (, )][DBLP]
Fragility of the Robust Security Network: 802.11 Denial of Service. [Citation Graph (, )][DBLP]
Fast Packet Classification Using Condition Factorization. [Citation Graph (, )][DBLP]
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. [Citation Graph (, )][DBLP]
Broadcast Attacks against Lattice-Based Cryptosystems. [Citation Graph (, )][DBLP]
Partial Key Exposure Attack on CRT-RSA. [Citation Graph (, )][DBLP]
How to Compare Profiled Side-Channel Attacks?. [Citation Graph (, )][DBLP]
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. [Citation Graph (, )][DBLP]
Attacking ECDSA-Enabled RFID Devices. [Citation Graph (, )][DBLP]
|