The SCEAS System
Navigation Menu

Conferences in DBLP

INDOCRYPT (indocrypt)
2007 (conf/indocrypt/2007)


  1. Linearization Attacks Against Syndrome Based Hashes. [Citation Graph (, )][DBLP]


  2. A Meet-in-the-Middle Collision Attack Against the New FORK-256. [Citation Graph (, )][DBLP]


  3. Multilane HMAC - Security beyond the Birthday Limit. [Citation Graph (, )][DBLP]


  4. On the Bits of Elliptic Curve Diffie-Hellman Keys. [Citation Graph (, )][DBLP]


  5. A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]


  6. Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. [Citation Graph (, )][DBLP]


  7. Related-Key Differential-Linear Attacks on Reduced AES-192. [Citation Graph (, )][DBLP]


  8. Improved Meet-in-the-Middle Attacks on Reduced-Round DES. [Citation Graph (, )][DBLP]


  9. Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. [Citation Graph (, )][DBLP]


  10. Secret Swarm UnitReactive k-Secret Sharing. [Citation Graph (, )][DBLP]


  11. New Formulae for Efficient Elliptic Curve Arithmetic. [Citation Graph (, )][DBLP]


  12. A Graph Theoretic Analysis of Double Base Number Systems. [Citation Graph (, )][DBLP]


  13. Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication. [Citation Graph (, )][DBLP]


  14. Transitive Signatures from Braid Groups. [Citation Graph (, )][DBLP]


  15. Proxy Re-signature Schemes Without Random Oracles. [Citation Graph (, )][DBLP]


  16. First-Order Differential Power Analysis on the Duplication Method. [Citation Graph (, )][DBLP]


  17. Solving Discrete Logarithms from Partial Knowledge of the Key. [Citation Graph (, )][DBLP]


  18. New Description of SMS4 by an Embedding overGF(28). [Citation Graph (, )][DBLP]


  19. Tweakable Enciphering Schemes from Hash-Sum-Expansion. [Citation Graph (, )][DBLP]


  20. A Framework for Chosen IV Statistical Analysis of Stream Ciphers. [Citation Graph (, )][DBLP]


  21. Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. [Citation Graph (, )][DBLP]


  22. A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]


  23. Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. [Citation Graph (, )][DBLP]


  24. On the k -Operation Linear Complexity of Periodic Sequences. [Citation Graph (, )][DBLP]


  25. Trade-Off Traitor Tracing. [Citation Graph (, )][DBLP]


  26. X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. [Citation Graph (, )][DBLP]


  27. Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. [Citation Graph (, )][DBLP]


  28. Extended Multi-Property-Preserving and ECM-Construction. [Citation Graph (, )][DBLP]


  29. Design of a Differential Power Analysis Resistant Masked AES S-Box. [Citation Graph (, )][DBLP]


  30. LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. [Citation Graph (, )][DBLP]


  31. An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. [Citation Graph (, )][DBLP]


  32. Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function. [Citation Graph (, )][DBLP]


  33. Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002