The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
2008 (conf/eurocrypt/2008)


  1. A Practical Attack on KeeLoq. [Citation Graph (, )][DBLP]


  2. Key Recovery on Hidden Monomial Multivariate Schemes. [Citation Graph (, )][DBLP]


  3. Predicting Lattice Reduction. [Citation Graph (, )][DBLP]


  4. Efficient Sequential Aggregate Signed Data. [Citation Graph (, )][DBLP]


  5. Proving Tight Security for Rabin-Williams Signatures. [Citation Graph (, )][DBLP]


  6. Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP]


  7. Towards Key-Dependent Message Security in the Standard Model. [Citation Graph (, )][DBLP]


  8. The Twin Diffie-Hellman Problem and Applications. [Citation Graph (, )][DBLP]


  9. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. [Citation Graph (, )][DBLP]


  10. Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves. [Citation Graph (, )][DBLP]


  11. On the Indifferentiability of the Sponge Construction. [Citation Graph (, )][DBLP]


  12. A New Mode of Operation for Block Ciphers and Length-Preserving MACs. [Citation Graph (, )][DBLP]


  13. Security/Efficiency Tradeoffs for Permutation-Based Hashing. [Citation Graph (, )][DBLP]


  14. New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (, )][DBLP]


  15. Collisions for the LPS Expander Graph Hash Function. [Citation Graph (, )][DBLP]


  16. Second Preimage Attacks on Dithered Hash Functions. [Citation Graph (, )][DBLP]


  17. Efficient Two Party and Multi Party Computation Against Covert Adversaries. [Citation Graph (, )][DBLP]


  18. Almost-Everywhere Secure Computation. [Citation Graph (, )][DBLP]


  19. Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme. [Citation Graph (, )][DBLP]


  20. Protocols and Lower Bounds for Failure Localization in the Internet. [Citation Graph (, )][DBLP]


  21. HB#: Increasing the Security and Efficiency of HB+. [Citation Graph (, )][DBLP]


  22. Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. [Citation Graph (, )][DBLP]


  23. Precise Concurrent Zero Knowledge. [Citation Graph (, )][DBLP]


  24. Efficient Non-interactive Proof Systems for Bilinear Groups. [Citation Graph (, )][DBLP]


  25. Zero-Knowledge Sets with Short Proofs. [Citation Graph (, )][DBLP]


  26. Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves. [Citation Graph (, )][DBLP]


  27. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. [Citation Graph (, )][DBLP]


  28. Obfuscating Point Functions with Multibit Output. [Citation Graph (, )][DBLP]


  29. Isolated Proofs of Knowledge and Isolated Zero Knowledge. [Citation Graph (, )][DBLP]


  30. David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware. [Citation Graph (, )][DBLP]


  31. New Constructions for UC Secure Computation Using Tamper-Proof Hardware. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002