|
Conferences in DBLP
On Ideal Lattices and Learning with Errors over Rings. [Citation Graph (, )][DBLP]
Fully Homomorphic Encryption over the Integers. [Citation Graph (, )][DBLP]
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups. [Citation Graph (, )][DBLP]
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. [Citation Graph (, )][DBLP]
Secure Obfuscation for Encrypted Signatures. [Citation Graph (, )][DBLP]
Public-Key Encryption in the Bounded-Retrieval Model. [Citation Graph (, )][DBLP]
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. [Citation Graph (, )][DBLP]
Partial Fairness in Secure Two-Party Computation. [Citation Graph (, )][DBLP]
Secure Message Transmission with Small Public Discussion. [Citation Graph (, )][DBLP]
On the Impossibility of Three-Move Blind Signature Schemes. [Citation Graph (, )][DBLP]
Efficient Device-Independent Quantum Key Distribution. [Citation Graph (, )][DBLP]
New Generic Algorithms for Hard Knapsacks. [Citation Graph (, )][DBLP]
Lattice Enumeration Using Extreme Pruning. [Citation Graph (, )][DBLP]
Algebraic Cryptanalysis of McEliece Variants with Compact Keys. [Citation Graph (, )][DBLP]
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. [Citation Graph (, )][DBLP]
Cryptography between Wonderland and Underland. [Citation Graph (, )][DBLP]
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. [Citation Graph (, )][DBLP]
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. [Citation Graph (, )][DBLP]
Computational Soundness, Co-induction, and Encryption Cycles. [Citation Graph (, )][DBLP]
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. [Citation Graph (, )][DBLP]
Cryptographic Agility and Its Relation to Circular Encryption. [Citation Graph (, )][DBLP]
Bounded Key-Dependent Message Security. [Citation Graph (, )][DBLP]
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography. [Citation Graph (, )][DBLP]
Adaptively Secure Broadcast. [Citation Graph (, )][DBLP]
Universally Composable Quantum Multi-party Computation. [Citation Graph (, )][DBLP]
A Simple BGN-Type Cryptosystem from LWE. [Citation Graph (, )][DBLP]
Bonsai Trees, or How to Delegate a Lattice Basis. [Citation Graph (, )][DBLP]
Efficient Lattice (H)IBE in the Standard Model. [Citation Graph (, )][DBLP]
Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation. [Citation Graph (, )][DBLP]
Stam's Collision Resistance Conjecture. [Citation Graph (, )][DBLP]
Universal One-Way Hash Functions via Inaccessible Entropy. [Citation Graph (, )][DBLP]
Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions. [Citation Graph (, )][DBLP]
Constructing Verifiable Random Functions with Large Input Spaces. [Citation Graph (, )][DBLP]
Adaptive Trapdoor Functions and Chosen-Ciphertext Security. [Citation Graph (, )][DBLP]
|