The SCEAS System
Navigation Menu

Conferences in DBLP

The Cryptographer's Track at RSA Conference (CT-RSA) (ctrsa)
2010 (conf/ctrsa/2010)


  1. The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition. [Citation Graph (, )][DBLP]


  2. Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries. [Citation Graph (, )][DBLP]


  3. Efficient CRT-RSA Decryption for Small Encryption Exponents. [Citation Graph (, )][DBLP]


  4. Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine. [Citation Graph (, )][DBLP]


  5. Plaintext-Awareness of Hybrid Encryption. [Citation Graph (, )][DBLP]


  6. Speed Records for NTRU. [Citation Graph (, )][DBLP]


  7. High-Speed Parallel Software Implementation of the ηT Pairing. [Citation Graph (, )][DBLP]


  8. Refinement of Miller's Algorithm Over Edwards Curves. [Citation Graph (, )][DBLP]


  9. Probabilistic Public Key Encryption with Equality Test. [Citation Graph (, )][DBLP]


  10. Efficient CCA-Secure PKE from Identity-Based Techniques. [Citation Graph (, )][DBLP]


  11. Anonymity from Asymmetry: New Constructions for Anonymous HIBE. [Citation Graph (, )][DBLP]


  12. Making the Diffie-Hellman Protocol Identity-Based. [Citation Graph (, )][DBLP]


  13. On Extended Sanitizable Signature Schemes. [Citation Graph (, )][DBLP]


  14. Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks. [Citation Graph (, )][DBLP]


  15. Fault Attacks Against emv Signatures. [Citation Graph (, )][DBLP]


  16. Revisiting Higher-Order DPA Attacks: . [Citation Graph (, )][DBLP]


  17. Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. [Citation Graph (, )][DBLP]


  18. Usable Optimistic Fair Exchange. [Citation Graph (, )][DBLP]


  19. Hash Function Combiners in TLS and SSL. [Citation Graph (, )][DBLP]


  20. Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. [Citation Graph (, )][DBLP]


  21. Linear Cryptanalysis of Reduced-Round PRESENT. [Citation Graph (, )][DBLP]


  22. Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited. [Citation Graph (, )][DBLP]


  23. Practical Key Recovery Attack against Secret-IV Edon-. [Citation Graph (, )][DBLP]


  24. Rebound Attacks on the Reduced Grøstl Hash Function. [Citation Graph (, )][DBLP]


  25. The Sum of CBC MACs Is a Secure PRF. [Citation Graph (, )][DBLP]


  26. On Fast Verification of Hash Chains. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002