|
Conferences in DBLP
Linearization Attacks Against Syndrome Based Hashes. [Citation Graph (, )][DBLP]
A Meet-in-the-Middle Collision Attack Against the New FORK-256. [Citation Graph (, )][DBLP]
Multilane HMAC - Security beyond the Birthday Limit. [Citation Graph (, )][DBLP]
On the Bits of Elliptic Curve Diffie-Hellman Keys. [Citation Graph (, )][DBLP]
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography. [Citation Graph (, )][DBLP]
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. [Citation Graph (, )][DBLP]
Related-Key Differential-Linear Attacks on Reduced AES-192. [Citation Graph (, )][DBLP]
Improved Meet-in-the-Middle Attacks on Reduced-Round DES. [Citation Graph (, )][DBLP]
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. [Citation Graph (, )][DBLP]
Secret Swarm UnitReactive k-Secret Sharing. [Citation Graph (, )][DBLP]
New Formulae for Efficient Elliptic Curve Arithmetic. [Citation Graph (, )][DBLP]
A Graph Theoretic Analysis of Double Base Number Systems. [Citation Graph (, )][DBLP]
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication. [Citation Graph (, )][DBLP]
Transitive Signatures from Braid Groups. [Citation Graph (, )][DBLP]
Proxy Re-signature Schemes Without Random Oracles. [Citation Graph (, )][DBLP]
First-Order Differential Power Analysis on the Duplication Method. [Citation Graph (, )][DBLP]
Solving Discrete Logarithms from Partial Knowledge of the Key. [Citation Graph (, )][DBLP]
New Description of SMS4 by an Embedding overGF(28). [Citation Graph (, )][DBLP]
Tweakable Enciphering Schemes from Hash-Sum-Expansion. [Citation Graph (, )][DBLP]
A Framework for Chosen IV Statistical Analysis of Stream Ciphers. [Citation Graph (, )][DBLP]
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. [Citation Graph (, )][DBLP]
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. [Citation Graph (, )][DBLP]
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. [Citation Graph (, )][DBLP]
On the k -Operation Linear Complexity of Periodic Sequences. [Citation Graph (, )][DBLP]
Trade-Off Traitor Tracing. [Citation Graph (, )][DBLP]
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. [Citation Graph (, )][DBLP]
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. [Citation Graph (, )][DBLP]
Extended Multi-Property-Preserving and ECM-Construction. [Citation Graph (, )][DBLP]
Design of a Differential Power Analysis Resistant Masked AES S-Box. [Citation Graph (, )][DBLP]
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. [Citation Graph (, )][DBLP]
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. [Citation Graph (, )][DBLP]
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function. [Citation Graph (, )][DBLP]
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. [Citation Graph (, )][DBLP]
|