The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
2009 (conf/crypto/2009)


  1. Reconstructing RSA Private Keys from Random Key Bits. [Citation Graph (, )][DBLP]


  2. Public-Key Cryptosystems Resilient to Key Leakage. [Citation Graph (, )][DBLP]


  3. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. [Citation Graph (, )][DBLP]


  4. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. [Citation Graph (, )][DBLP]


  5. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. [Citation Graph (, )][DBLP]


  6. Private Mutual Authentication and Conditional Oblivious Transfer. [Citation Graph (, )][DBLP]


  7. Randomizable Proofs and Delegatable Anonymous Credentials. [Citation Graph (, )][DBLP]


  8. Computational Differential Privacy. [Citation Graph (, )][DBLP]


  9. Probabilistically Checkable Arguments. [Citation Graph (, )][DBLP]


  10. On the Composition of Public-Coin Zero-Knowledge Protocols. [Citation Graph (, )][DBLP]


  11. On the Amortized Complexity of Zero-Knowledge Protocols. [Citation Graph (, )][DBLP]


  12. Linear Algebra with Sub-linear Zero-Knowledge Arguments. [Citation Graph (, )][DBLP]


  13. New Birthday Attacks on Some MACs Based on Block Ciphers. [Citation Graph (, )][DBLP]


  14. Distinguisher and Related-Key Attack on the Full AES-256. [Citation Graph (, )][DBLP]


  15. Cryptanalysis of C2. [Citation Graph (, )][DBLP]


  16. Message Authentication Codes from Unpredictable Block Ciphers. [Citation Graph (, )][DBLP]


  17. How to Encipher Messages on a Small Domain. [Citation Graph (, )][DBLP]


  18. How to Hash into Elliptic Curves. [Citation Graph (, )][DBLP]


  19. Batch Binary Edwards. [Citation Graph (, )][DBLP]


  20. Solving Hidden Number Problem with One Bit Oracle and Advice. [Citation Graph (, )][DBLP]


  21. Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. [Citation Graph (, )][DBLP]


  22. Merkle Puzzles Are Optimal - An O(n2)-Query Attack on Any Key Exchange from a Random Oracle. [Citation Graph (, )][DBLP]


  23. Position Based Cryptography. [Citation Graph (, )][DBLP]


  24. Improving the Security of Quantum Protocols via Commit-and-Open. [Citation Graph (, )][DBLP]


  25. Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. [Citation Graph (, )][DBLP]


  26. How Risky Is the Random-Oracle Model? [Citation Graph (, )][DBLP]


  27. Abstraction in Cryptography. [Citation Graph (, )][DBLP]


  28. Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. [Citation Graph (, )][DBLP]


  29. The Round Complexity of Verifiable Secret Sharing Revisited. [Citation Graph (, )][DBLP]


  30. Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. [Citation Graph (, )][DBLP]


  31. Collusion-Free Multiparty Computation in the Mediated Model. [Citation Graph (, )][DBLP]


  32. Privacy-Enhancing Auctions Using Rational Cryptography. [Citation Graph (, )][DBLP]


  33. Utility Dependence in Correct and Fair Rational Secret Sharing. [Citation Graph (, )][DBLP]


  34. On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem. [Citation Graph (, )][DBLP]


  35. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. [Citation Graph (, )][DBLP]


  36. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. [Citation Graph (, )][DBLP]


  37. The Group of Signed Quadratic Residues and Applications. [Citation Graph (, )][DBLP]


  38. Short and Stateless Signatures from the RSA Assumption. [Citation Graph (, )][DBLP]


  39. Smooth Projective Hashing for Conditionally Extractable Commitments. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002