Conferences in DBLP
Total Break of the l -IC Signature Scheme. [Citation Graph (, )][DBLP ] Recovering NTRU Secret Key from Inversion Oracles. [Citation Graph (, )][DBLP ] Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? [Citation Graph (, )][DBLP ] Relations Among Notions of Plaintext Awareness. [Citation Graph (, )][DBLP ] Completely Non-malleable Encryption Revisited. [Citation Graph (, )][DBLP ] Cryptographic Test Correction. [Citation Graph (, )][DBLP ] Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. [Citation Graph (, )][DBLP ] Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. [Citation Graph (, )][DBLP ] Proxy Signatures Secure Against Proxy Key Exposure. [Citation Graph (, )][DBLP ] Lattice-Based Identification Schemes Secure Under Active Attacks. [Citation Graph (, )][DBLP ] Efficient Simultaneous Broadcast. [Citation Graph (, )][DBLP ] SAS-Based Group Authentication and Key Agreement Protocols. [Citation Graph (, )][DBLP ] An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm. [Citation Graph (, )][DBLP ] New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. [Citation Graph (, )][DBLP ] Online-Untransferable Signatures. [Citation Graph (, )][DBLP ] Security of Digital Signature Schemes in Weakened Random Oracle Models. [Citation Graph (, )][DBLP ] A Digital Signature Scheme Based on CVPinfinity . [Citation Graph (, )][DBLP ] An Analysis of the Vector Decomposition Problem. [Citation Graph (, )][DBLP ] A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents. [Citation Graph (, )][DBLP ] Certificateless Encryption Schemes Strongly Secure in the Standard Model. [Citation Graph (, )][DBLP ] Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. [Citation Graph (, )][DBLP ] Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. [Citation Graph (, )][DBLP ]