|
Conferences in DBLP
Reconstructing RSA Private Keys from Random Key Bits. [Citation Graph (, )][DBLP]
Public-Key Cryptosystems Resilient to Key Leakage. [Citation Graph (, )][DBLP]
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. [Citation Graph (, )][DBLP]
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. [Citation Graph (, )][DBLP]
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. [Citation Graph (, )][DBLP]
Private Mutual Authentication and Conditional Oblivious Transfer. [Citation Graph (, )][DBLP]
Randomizable Proofs and Delegatable Anonymous Credentials. [Citation Graph (, )][DBLP]
Computational Differential Privacy. [Citation Graph (, )][DBLP]
Probabilistically Checkable Arguments. [Citation Graph (, )][DBLP]
On the Composition of Public-Coin Zero-Knowledge Protocols. [Citation Graph (, )][DBLP]
On the Amortized Complexity of Zero-Knowledge Protocols. [Citation Graph (, )][DBLP]
Linear Algebra with Sub-linear Zero-Knowledge Arguments. [Citation Graph (, )][DBLP]
New Birthday Attacks on Some MACs Based on Block Ciphers. [Citation Graph (, )][DBLP]
Distinguisher and Related-Key Attack on the Full AES-256. [Citation Graph (, )][DBLP]
Cryptanalysis of C2. [Citation Graph (, )][DBLP]
Message Authentication Codes from Unpredictable Block Ciphers. [Citation Graph (, )][DBLP]
How to Encipher Messages on a Small Domain. [Citation Graph (, )][DBLP]
How to Hash into Elliptic Curves. [Citation Graph (, )][DBLP]
Batch Binary Edwards. [Citation Graph (, )][DBLP]
Solving Hidden Number Problem with One Bit Oracle and Advice. [Citation Graph (, )][DBLP]
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. [Citation Graph (, )][DBLP]
Merkle Puzzles Are Optimal - An O(n2)-Query Attack on Any Key Exchange from a Random Oracle. [Citation Graph (, )][DBLP]
Position Based Cryptography. [Citation Graph (, )][DBLP]
Improving the Security of Quantum Protocols via Commit-and-Open. [Citation Graph (, )][DBLP]
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. [Citation Graph (, )][DBLP]
How Risky Is the Random-Oracle Model? [Citation Graph (, )][DBLP]
Abstraction in Cryptography. [Citation Graph (, )][DBLP]
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. [Citation Graph (, )][DBLP]
The Round Complexity of Verifiable Secret Sharing Revisited. [Citation Graph (, )][DBLP]
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. [Citation Graph (, )][DBLP]
Collusion-Free Multiparty Computation in the Mediated Model. [Citation Graph (, )][DBLP]
Privacy-Enhancing Auctions Using Rational Cryptography. [Citation Graph (, )][DBLP]
Utility Dependence in Correct and Fair Rational Secret Sharing. [Citation Graph (, )][DBLP]
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem. [Citation Graph (, )][DBLP]
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. [Citation Graph (, )][DBLP]
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. [Citation Graph (, )][DBLP]
The Group of Signed Quadratic Residues and Applications. [Citation Graph (, )][DBLP]
Short and Stateless Signatures from the RSA Assumption. [Citation Graph (, )][DBLP]
Smooth Projective Hashing for Conditionally Extractable Commitments. [Citation Graph (, )][DBLP]
|