|
Conferences in DBLP
Subspace Codes. [Citation Graph (, )][DBLP]
On Linear Programming Decoding on a Quantized Additive White Gaussian Noise Channel. [Citation Graph (, )][DBLP]
Codes as Modules over Skew Polynomial Rings. [Citation Graph (, )][DBLP]
On Higher Weights and Code Existence. [Citation Graph (, )][DBLP]
Mass Formula for Even Codes over. [Citation Graph (, )][DBLP]
On the Classification of Self-dual -Codes. [Citation Graph (, )][DBLP]
On Linear Codes from Maximal Curves. [Citation Graph (, )][DBLP]
On Linear Cryptanalysis with Many Linear Approximations. [Citation Graph (, )][DBLP]
Bivium as a Mixed-Integer Linear Programming Problem. [Citation Graph (, )][DBLP]
Security of Cyclic Double Block Length Hash Functions. [Citation Graph (, )][DBLP]
Another Glance at Double-Length Hashing. [Citation Graph (, )][DBLP]
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic. [Citation Graph (, )][DBLP]
Provably Secure Code-Based Threshold Ring Signatures. [Citation Graph (, )][DBLP]
A New Protocol for the Nearby Friend Problem. [Citation Graph (, )][DBLP]
Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems. [Citation Graph (, )][DBLP]
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. [Citation Graph (, )][DBLP]
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. [Citation Graph (, )][DBLP]
Certificate-Free Attribute Authentication. [Citation Graph (, )][DBLP]
Comparing with RSA. [Citation Graph (, )][DBLP]
Double-Exponentiation in Factor-4 Groups and Its Applications. [Citation Graph (, )][DBLP]
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. [Citation Graph (, )][DBLP]
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems. [Citation Graph (, )][DBLP]
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions. [Citation Graph (, )][DBLP]
A New Family of Hyper-Bent Boolean Functions in Polynomial Form. [Citation Graph (, )][DBLP]
The Rayleigh Quotient of Bent Functions. [Citation Graph (, )][DBLP]
Cache Timing Analysis of LFSR-Based Stream Ciphers. [Citation Graph (, )][DBLP]
Optimal Recovery of Secret Keys from Weak Side Channel Traces. [Citation Graph (, )][DBLP]
Practical Zero-Knowledge Proofs for Circuit Evaluation. [Citation Graph (, )][DBLP]
|