|
Conferences in DBLP
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition. [Citation Graph (, )][DBLP]
Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries. [Citation Graph (, )][DBLP]
Efficient CRT-RSA Decryption for Small Encryption Exponents. [Citation Graph (, )][DBLP]
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine. [Citation Graph (, )][DBLP]
Plaintext-Awareness of Hybrid Encryption. [Citation Graph (, )][DBLP]
Speed Records for NTRU. [Citation Graph (, )][DBLP]
High-Speed Parallel Software Implementation of the ηT Pairing. [Citation Graph (, )][DBLP]
Refinement of Miller's Algorithm Over Edwards Curves. [Citation Graph (, )][DBLP]
Probabilistic Public Key Encryption with Equality Test. [Citation Graph (, )][DBLP]
Efficient CCA-Secure PKE from Identity-Based Techniques. [Citation Graph (, )][DBLP]
Anonymity from Asymmetry: New Constructions for Anonymous HIBE. [Citation Graph (, )][DBLP]
Making the Diffie-Hellman Protocol Identity-Based. [Citation Graph (, )][DBLP]
On Extended Sanitizable Signature Schemes. [Citation Graph (, )][DBLP]
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks. [Citation Graph (, )][DBLP]
Fault Attacks Against emv Signatures. [Citation Graph (, )][DBLP]
Revisiting Higher-Order DPA Attacks: . [Citation Graph (, )][DBLP]
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. [Citation Graph (, )][DBLP]
Usable Optimistic Fair Exchange. [Citation Graph (, )][DBLP]
Hash Function Combiners in TLS and SSL. [Citation Graph (, )][DBLP]
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. [Citation Graph (, )][DBLP]
Linear Cryptanalysis of Reduced-Round PRESENT. [Citation Graph (, )][DBLP]
Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited. [Citation Graph (, )][DBLP]
Practical Key Recovery Attack against Secret-IV Edon-. [Citation Graph (, )][DBLP]
Rebound Attacks on the Reduced Grøstl Hash Function. [Citation Graph (, )][DBLP]
The Sum of CBC MACs Is a Secure PRF. [Citation Graph (, )][DBLP]
On Fast Verification of Hash Chains. [Citation Graph (, )][DBLP]
|