|
Conferences in DBLP
Cryptanalysis of the SFLASH Signature Scheme. [Citation Graph (, )][DBLP]
On the Evolution of User Authentication: Non-bilateral Factors. [Citation Graph (, )][DBLP]
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. [Citation Graph (, )][DBLP]
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. [Citation Graph (, )][DBLP]
An Efficient ID-Based Proxy Signature Scheme from Pairings. [Citation Graph (, )][DBLP]
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP]
Linear Slide Attacks on the KeeLoq Block Cipher. [Citation Graph (, )][DBLP]
A Key Predistribution Scheme Based on 3-Designs. [Citation Graph (, )][DBLP]
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. [Citation Graph (, )][DBLP]
A Provably Secure One-Pass Two-Party Key Establishment Protocol. [Citation Graph (, )][DBLP]
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. [Citation Graph (, )][DBLP]
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. [Citation Graph (, )][DBLP]
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor. [Citation Graph (, )][DBLP]
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. [Citation Graph (, )][DBLP]
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. [Citation Graph (, )][DBLP]
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images. [Citation Graph (, )][DBLP]
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. [Citation Graph (, )][DBLP]
Four Families of Binary Sequences with Low Correlation and Large Linear Complexity. [Citation Graph (, )][DBLP]
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. [Citation Graph (, )][DBLP]
Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators. [Citation Graph (, )][DBLP]
Linear Equation on Polynomial Single Cycle T-Functions. [Citation Graph (, )][DBLP]
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables. [Citation Graph (, )][DBLP]
Anonymity and k-Choice Identities. [Citation Graph (, )][DBLP]
Deniable Authentication on the Internet. [Citation Graph (, )][DBLP]
Orthogonality between Key Privacy and Data Privacy, Revisited. [Citation Graph (, )][DBLP]
Unlinkable Randomizable Signature and Its Application in Group Signature. [Citation Graph (, )][DBLP]
An Improved Collision Attack on MD5 Algorithm. [Citation Graph (, )][DBLP]
Multivariates Polynomials for Hashing. [Citation Graph (, )][DBLP]
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. [Citation Graph (, )][DBLP]
Multi-Identity Single-Key Decryption without Random Oracles. [Citation Graph (, )][DBLP]
Kipnis-Shamir Attack on HFE Revisited. [Citation Graph (, )][DBLP]
Cryptanalysis of General Lu-Lee Type Systems. [Citation Graph (, )][DBLP]
A Timing-Resistant Elliptic Curve Backdoor in RSA. [Citation Graph (, )][DBLP]
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. [Citation Graph (, )][DBLP]
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. [Citation Graph (, )][DBLP]
Building Trusted Sub-domain for the Grid with Trusted Computing. [Citation Graph (, )][DBLP]
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. [Citation Graph (, )][DBLP]
Online Tracing Scanning Worm with Sliding Window. [Citation Graph (, )][DBLP]
A New Proactive Defense Model Based on Intrusion Deception and Traceback. [Citation Graph (, )][DBLP]
On Modeling Post Decryption Error Processes in UMTS Air Interface. [Citation Graph (, )][DBLP]
A Simple, Smart and Extensible Framework for Network Security Measurement. [Citation Graph (, )][DBLP]
|