The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2009 (conf/icisc/2009)


  1. Generic One Round Group Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]


  2. Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. [Citation Graph (, )][DBLP]


  3. Efficient Certificateless KEM in the Standard Model. [Citation Graph (, )][DBLP]


  4. Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing. [Citation Graph (, )][DBLP]


  5. Factoring Unbalanced Moduli with Known Bits. [Citation Graph (, )][DBLP]


  6. Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. [Citation Graph (, )][DBLP]


  7. MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. [Citation Graph (, )][DBLP]


  8. Improved Linear Cryptanalysis of SOSEMANUK. [Citation Graph (, )][DBLP]


  9. Serial Model for Attack Tree Computations. [Citation Graph (, )][DBLP]


  10. Lightweight Cryptography and RFID: Tackling the Hidden Overheads. [Citation Graph (, )][DBLP]


  11. Power Analysis of Single-Rail Storage Elements as Used in MDPL. [Citation Graph (, )][DBLP]


  12. A Timing Attack against Patterson Algorithm in the McEliece PKC. [Citation Graph (, )][DBLP]


  13. Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. [Citation Graph (, )][DBLP]


  14. First CPIR Protocol with Data-Dependent Computation. [Citation Graph (, )][DBLP]


  15. Efficient Fuzzy Matching and Intersection on Private Datasets. [Citation Graph (, )][DBLP]


  16. Efficient Privacy-Preserving Face Recognition. [Citation Graph (, )][DBLP]


  17. Linear, Constant-Rounds Bit-Decomposition. [Citation Graph (, )][DBLP]


  18. Attacking and Repairing the Improved ModOnions Protocol. [Citation Graph (, )][DBLP]


  19. Secret Handshakes with Revocation Support. [Citation Graph (, )][DBLP]


  20. Practical Rebound Attack on 12-Round Cheetah-256. [Citation Graph (, )][DBLP]


  21. Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. [Citation Graph (, )][DBLP]


  22. Improved Preimage Attack for 68-Step HAS-160. [Citation Graph (, )][DBLP]


  23. Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1. [Citation Graph (, )][DBLP]


  24. Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. [Citation Graph (, )][DBLP]


  25. Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002