|
Conferences in DBLP
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. [Citation Graph (, )][DBLP]
How to Construct Interval Encryption from Binary Tree Encryption. [Citation Graph (, )][DBLP]
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. [Citation Graph (, )][DBLP]
Trapdoor Sanitizable Signatures Made Easy. [Citation Graph (, )][DBLP]
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs. [Citation Graph (, )][DBLP]
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. [Citation Graph (, )][DBLP]
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. [Citation Graph (, )][DBLP]
Multi-trail Statistical Saturation Attacks. [Citation Graph (, )][DBLP]
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . [Citation Graph (, )][DBLP]
High Performance GHASH Function for Long Messages. [Citation Graph (, )][DBLP]
Principles on the Security of AES against First and Second-Order Differential Power Analysis. [Citation Graph (, )][DBLP]
Adaptive Chosen-Message Side-Channel Attacks. [Citation Graph (, )][DBLP]
Secure Multiplicative Masking of Power Functions. [Citation Graph (, )][DBLP]
Batch Groth-Sahai. [Citation Graph (, )][DBLP]
Efficient and Secure Evaluation of Multivariate Polynomials and Applications. [Citation Graph (, )][DBLP]
Efficient Implementation of the Orlandi Protocol. [Citation Graph (, )][DBLP]
Improving the Round Complexity of Traitor Tracing Schemes. [Citation Graph (, )][DBLP]
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. [Citation Graph (, )][DBLP]
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. [Citation Graph (, )][DBLP]
Deniable Internet Key Exchange. [Citation Graph (, )][DBLP]
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. [Citation Graph (, )][DBLP]
Secure Sketch for Multiple Secrets. [Citation Graph (, )][DBLP]
A Message Recognition Protocol Based on Standard Assumptions. [Citation Graph (, )][DBLP]
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. [Citation Graph (, )][DBLP]
Privacy-Preserving Group Discovery with Linear Complexity. [Citation Graph (, )][DBLP]
Two New Efficient PIR-Writing Protocols. [Citation Graph (, )][DBLP]
Regulatory Compliant Oblivious RAM. [Citation Graph (, )][DBLP]
Revisiting Unpredictability-Based RFID Privacy Models. [Citation Graph (, )][DBLP]
On RFID Privacy with Mutual Authentication and Tag Corruption. [Citation Graph (, )][DBLP]
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. [Citation Graph (, )][DBLP]
COP: A Step toward Children Online Privacy. [Citation Graph (, )][DBLP]
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. [Citation Graph (, )][DBLP]
|