The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Information Security and Cryptology (cisc)
2008 (conf/cisc/2008)


  1. Cryptanalysis of the SFLASH Signature Scheme. [Citation Graph (, )][DBLP]


  2. On the Evolution of User Authentication: Non-bilateral Factors. [Citation Graph (, )][DBLP]


  3. ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. [Citation Graph (, )][DBLP]


  4. Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. [Citation Graph (, )][DBLP]


  5. An Efficient ID-Based Proxy Signature Scheme from Pairings. [Citation Graph (, )][DBLP]


  6. Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP]


  7. Linear Slide Attacks on the KeeLoq Block Cipher. [Citation Graph (, )][DBLP]


  8. A Key Predistribution Scheme Based on 3-Designs. [Citation Graph (, )][DBLP]


  9. Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. [Citation Graph (, )][DBLP]


  10. A Provably Secure One-Pass Two-Party Key Establishment Protocol. [Citation Graph (, )][DBLP]


  11. Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. [Citation Graph (, )][DBLP]


  12. Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. [Citation Graph (, )][DBLP]


  13. A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor. [Citation Graph (, )][DBLP]


  14. Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. [Citation Graph (, )][DBLP]


  15. Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  16. Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images. [Citation Graph (, )][DBLP]


  17. Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. [Citation Graph (, )][DBLP]


  18. Four Families of Binary Sequences with Low Correlation and Large Linear Complexity. [Citation Graph (, )][DBLP]


  19. Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. [Citation Graph (, )][DBLP]


  20. Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators. [Citation Graph (, )][DBLP]


  21. Linear Equation on Polynomial Single Cycle T-Functions. [Citation Graph (, )][DBLP]


  22. Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables. [Citation Graph (, )][DBLP]


  23. Anonymity and k-Choice Identities. [Citation Graph (, )][DBLP]


  24. Deniable Authentication on the Internet. [Citation Graph (, )][DBLP]


  25. Orthogonality between Key Privacy and Data Privacy, Revisited. [Citation Graph (, )][DBLP]


  26. Unlinkable Randomizable Signature and Its Application in Group Signature. [Citation Graph (, )][DBLP]


  27. An Improved Collision Attack on MD5 Algorithm. [Citation Graph (, )][DBLP]


  28. Multivariates Polynomials for Hashing. [Citation Graph (, )][DBLP]


  29. Efficient Public Key Encryption with Keyword Search Schemes from Pairings. [Citation Graph (, )][DBLP]


  30. Multi-Identity Single-Key Decryption without Random Oracles. [Citation Graph (, )][DBLP]


  31. Kipnis-Shamir Attack on HFE Revisited. [Citation Graph (, )][DBLP]


  32. Cryptanalysis of General Lu-Lee Type Systems. [Citation Graph (, )][DBLP]


  33. A Timing-Resistant Elliptic Curve Backdoor in RSA. [Citation Graph (, )][DBLP]


  34. A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. [Citation Graph (, )][DBLP]


  35. Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. [Citation Graph (, )][DBLP]


  36. Building Trusted Sub-domain for the Grid with Trusted Computing. [Citation Graph (, )][DBLP]


  37. Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. [Citation Graph (, )][DBLP]


  38. Online Tracing Scanning Worm with Sliding Window. [Citation Graph (, )][DBLP]


  39. A New Proactive Defense Model Based on Intrusion Deception and Traceback. [Citation Graph (, )][DBLP]


  40. On Modeling Post Decryption Error Processes in UMTS Air Interface. [Citation Graph (, )][DBLP]


  41. A Simple, Smart and Extensible Framework for Network Security Measurement. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002