|
Conferences in DBLP
Generic One Round Group Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. [Citation Graph (, )][DBLP]
Efficient Certificateless KEM in the Standard Model. [Citation Graph (, )][DBLP]
Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing. [Citation Graph (, )][DBLP]
Factoring Unbalanced Moduli with Known Bits. [Citation Graph (, )][DBLP]
Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. [Citation Graph (, )][DBLP]
MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. [Citation Graph (, )][DBLP]
Improved Linear Cryptanalysis of SOSEMANUK. [Citation Graph (, )][DBLP]
Serial Model for Attack Tree Computations. [Citation Graph (, )][DBLP]
Lightweight Cryptography and RFID: Tackling the Hidden Overheads. [Citation Graph (, )][DBLP]
Power Analysis of Single-Rail Storage Elements as Used in MDPL. [Citation Graph (, )][DBLP]
A Timing Attack against Patterson Algorithm in the McEliece PKC. [Citation Graph (, )][DBLP]
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. [Citation Graph (, )][DBLP]
First CPIR Protocol with Data-Dependent Computation. [Citation Graph (, )][DBLP]
Efficient Fuzzy Matching and Intersection on Private Datasets. [Citation Graph (, )][DBLP]
Efficient Privacy-Preserving Face Recognition. [Citation Graph (, )][DBLP]
Linear, Constant-Rounds Bit-Decomposition. [Citation Graph (, )][DBLP]
Attacking and Repairing the Improved ModOnions Protocol. [Citation Graph (, )][DBLP]
Secret Handshakes with Revocation Support. [Citation Graph (, )][DBLP]
Practical Rebound Attack on 12-Round Cheetah-256. [Citation Graph (, )][DBLP]
Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. [Citation Graph (, )][DBLP]
Improved Preimage Attack for 68-Step HAS-160. [Citation Graph (, )][DBLP]
Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1. [Citation Graph (, )][DBLP]
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. [Citation Graph (, )][DBLP]
Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. [Citation Graph (, )][DBLP]
|