|
Conferences in DBLP
The State of Hash Functions and the NIST SHA-3 Competition. [Citation Graph (, )][DBLP]
Key Evolution Systems in Untrusted Update Environments. [Citation Graph (, )][DBLP]
Secure and Privacy-Preserving Information Brokering. [Citation Graph (, )][DBLP]
Provably Secure Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]
Cryptanalysis of Two Ring Signcryption Schemes. [Citation Graph (, )][DBLP]
Efficient Signcryption Key Encapsulation without Random Oracles. [Citation Graph (, )][DBLP]
Strong Anonymous Signatures. [Citation Graph (, )][DBLP]
Publicly Verifiable Privacy-Preserving Group Decryption. [Citation Graph (, )][DBLP]
Privacy for Private Key in Signatures. [Citation Graph (, )][DBLP]
Security of Truncated MACs. [Citation Graph (, )][DBLP]
Security Analysis of Multivariate Polynomials for Hashing. [Citation Graph (, )][DBLP]
SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. [Citation Graph (, )][DBLP]
Batch ZK Proof and Verification of OR Logic. [Citation Graph (, )][DBLP]
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. [Citation Graph (, )][DBLP]
Impossible Differential Analysis of Reduced Round CLEFIA. [Citation Graph (, )][DBLP]
Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR. [Citation Graph (, )][DBLP]
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. [Citation Graph (, )][DBLP]
Further Observations on Certificateless Public Key Encryption. [Citation Graph (, )][DBLP]
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. [Citation Graph (, )][DBLP]
New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. [Citation Graph (, )][DBLP]
A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. [Citation Graph (, )][DBLP]
Key Predistribution Schemes Using Codes in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. [Citation Graph (, )][DBLP]
On the Computational Efficiency of XTR+. [Citation Graph (, )][DBLP]
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. [Citation Graph (, )][DBLP]
Inter-domain Identity-Based Proxy Re-encryption. [Citation Graph (, )][DBLP]
Hardening Botnet by a Rational Botmaster. [Citation Graph (, )][DBLP]
Separation of Duty in Trust-Based Collaboration. [Citation Graph (, )][DBLP]
An Integrity Assurance Mechanism for Run-Time Programs. [Citation Graph (, )][DBLP]
A Security and Performance Evaluation of Hash-Based RFID Protocols. [Citation Graph (, )][DBLP]
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. [Citation Graph (, )][DBLP]
|