The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
2009 (conf/eurocrypt/2009)

  1. Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. [Citation Graph (, )][DBLP]

  2. Breaking RSA Generically Is Equivalent to Factoring. [Citation Graph (, )][DBLP]

  3. Resettably Secure Computation. [Citation Graph (, )][DBLP]

  4. On the Security Loss in Cryptographic Reductions. [Citation Graph (, )][DBLP]

  5. On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. [Citation Graph (, )][DBLP]

  6. Cryptanalysis of MDC-2. [Citation Graph (, )][DBLP]

  7. Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. [Citation Graph (, )][DBLP]

  8. Finding Preimages in Full MD5 Faster Than Exhaustive Search. [Citation Graph (, )][DBLP]

  9. Asymmetric Group Key Agreement. [Citation Graph (, )][DBLP]

  10. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). [Citation Graph (, )][DBLP]

  11. Traitors Collaborating in Public: Pirates 2.0. [Citation Graph (, )][DBLP]

  12. Key Agreement from Close Secrets over Unsecured Channels. [Citation Graph (, )][DBLP]

  13. Order-Preserving Symmetric Encryption. [Citation Graph (, )][DBLP]

  14. A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. [Citation Graph (, )][DBLP]

  15. On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. [Citation Graph (, )][DBLP]

  16. Cube Attacks on Tweakable Black Box Polynomials. [Citation Graph (, )][DBLP]

  17. Smashing SQUASH-0. [Citation Graph (, )][DBLP]

  18. Practical Chosen Ciphertext Secure Encryption from Factoring. [Citation Graph (, )][DBLP]

  19. Realizing Hash-and-Sign Signatures under Standard Assumptions. [Citation Graph (, )][DBLP]

  20. A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. [Citation Graph (, )][DBLP]

  21. Cryptography without (Hardly Any) Secrets ? [Citation Graph (, )][DBLP]

  22. Salvaging Merkle-Damgård for Practical Applications. [Citation Graph (, )][DBLP]

  23. On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. [Citation Graph (, )][DBLP]

  24. Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. [Citation Graph (, )][DBLP]

  25. On the Portability of Generalized Schnorr Proofs. [Citation Graph (, )][DBLP]

  26. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. [Citation Graph (, )][DBLP]

  27. A Leakage-Resilient Mode of Operation. [Citation Graph (, )][DBLP]

  28. ECM on Graphics Cards. [Citation Graph (, )][DBLP]

  29. Double-Base Number System for Multi-scalar Multiplications. [Citation Graph (, )][DBLP]

  30. Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. [Citation Graph (, )][DBLP]

  31. Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields. [Citation Graph (, )][DBLP]

  32. Verifiable Random Functions from Identity-Based Key Encapsulation. [Citation Graph (, )][DBLP]

  33. Optimal Randomness Extraction from a Diffie-Hellman Element. [Citation Graph (, )][DBLP]

  34. A New Randomness Extraction Paradigm for Hybrid Encryption. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002