The SCEAS System
Navigation Menu

Conferences in DBLP

IMA Conference on Cryptography and Coding (ima)
2007 (conf/ima/2007)


  1. Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise. [Citation Graph (, )][DBLP]


  2. Galois Rings and Pseudo-random Sequences. [Citation Graph (, )][DBLP]


  3. Finding Invalid Signatures in Pairing-Based Batches. [Citation Graph (, )][DBLP]


  4. How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. [Citation Graph (, )][DBLP]


  5. Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions. [Citation Graph (, )][DBLP]


  6. On the Walsh Spectrum of a New APN Function. [Citation Graph (, )][DBLP]


  7. Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. [Citation Graph (, )][DBLP]


  8. Cryptanalysis of the EPBC Authenticated Encryption Mode. [Citation Graph (, )][DBLP]


  9. Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. [Citation Graph (, )][DBLP]


  10. Algebraic Cryptanalysis of the Data Encryption Standard. [Citation Graph (, )][DBLP]


  11. Cryptographic Side-Channels from Low-Power Cache Memory. [Citation Graph (, )][DBLP]


  12. New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. [Citation Graph (, )][DBLP]


  13. Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity. [Citation Graph (, )][DBLP]


  14. Modified Berlekamp-Massey Algorithm for Approximating the k -Error Linear Complexity of Binary Sequences. [Citation Graph (, )][DBLP]


  15. Efficient KEMs with Partial Message Recovery. [Citation Graph (, )][DBLP]


  16. Randomness Reuse: Extensions and Improvements. [Citation Graph (, )][DBLP]


  17. On the Connection Between Signcryption and One-Pass Key Establishment. [Citation Graph (, )][DBLP]


  18. Optimised Versions of the Ate and Twisted Ate Pairings. [Citation Graph (, )][DBLP]


  19. Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic. [Citation Graph (, )][DBLP]


  20. Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction. [Citation Graph (, )][DBLP]


  21. Efficient 15, 360-bit RSA Using Woop-Optimised Montgomery Arithmetic. [Citation Graph (, )][DBLP]


  22. Toward Acceleration of RSA Using 3D Graphics Hardware. [Citation Graph (, )][DBLP]


  23. Multi-key Hierarchical Identity-Based Signatures. [Citation Graph (, )][DBLP]


  24. Verifier-Key-Flexible Universal Designated-Verifier Signatures. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002