|
Conferences in DBLP
Time-Specific Encryption. [Citation Graph (, )][DBLP]
Public-Key Encryption with Efficient Amortized Updates. [Citation Graph (, )][DBLP]
Generic Constructions of Parallel Key-Insulated Encryption. [Citation Graph (, )][DBLP]
Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk). [Citation Graph (, )][DBLP]
Differential Fault Analysis of LEX. [Citation Graph (, )][DBLP]
Generalized RC4 Key Collisions and Hash Collisions. [Citation Graph (, )][DBLP]
On the Indifferentiability of the Grøstl Hash Function. [Citation Graph (, )][DBLP]
Algorithmic Tamper-Proof Security under Probing Attacks. [Citation Graph (, )][DBLP]
Leakage-Resilient Storage. [Citation Graph (, )][DBLP]
Searching Keywords with Wildcards on Encrypted Data. [Citation Graph (, )][DBLP]
Threshold Attribute-Based Signcryption. [Citation Graph (, )][DBLP]
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. [Citation Graph (, )][DBLP]
Improved Primitives for Secure Multiparty Integer Computation. [Citation Graph (, )][DBLP]
How to Pair with a Human. [Citation Graph (, )][DBLP]
A New Security Model for Authenticated Key Agreement. [Citation Graph (, )][DBLP]
A Security Enhancement and Proof for Authentication and Key Agreement (AKA). [Citation Graph (, )][DBLP]
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. [Citation Graph (, )][DBLP]
Kleptography from Standard Assumptions and Applications. [Citation Graph (, )][DBLP]
Provably Secure Convertible Undeniable Signatures with Unambiguity. [Citation Graph (, )][DBLP]
History-Free Aggregate Message Authentication Codes. [Citation Graph (, )][DBLP]
Recursive Lattice Reduction. [Citation Graph (, )][DBLP]
Adaptively Secure Identity-Based Identification from Lattices without Random Oracles. [Citation Graph (, )][DBLP]
The Fiat-Shamir Transform for Group and Ring Signature Schemes. [Citation Graph (, )][DBLP]
Get Shorty via Group Signatures without Encryption. [Citation Graph (, )][DBLP]
Group Message Authentication. [Citation Graph (, )][DBLP]
Fast Secure Computation of Set Intersection. [Citation Graph (, )][DBLP]
Distributed Private-Key Generators for Identity-Based Cryptography. [Citation Graph (, )][DBLP]
Solving Revocation with Efficient Update of Anonymous Credentials. [Citation Graph (, )][DBLP]
|