|
Conferences in DBLP
(africacrypt) 2010 (conf/africacrypt/2010)
A New RSA-Based Signature Scheme. [Citation Graph (, )][DBLP]
Fair Blind Signatures without Random Oracles. [Citation Graph (, )][DBLP]
Fair Partially Blind Signatures. [Citation Graph (, )][DBLP]
Parallel Shortest Lattice Vector Enumeration on Graphics Cards. [Citation Graph (, )][DBLP]
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. [Citation Graph (, )][DBLP]
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits. [Citation Graph (, )][DBLP]
Proofs of Restricted Shuffles. [Citation Graph (, )][DBLP]
Batch Range Proof for Practical Small Ranges. [Citation Graph (, )][DBLP]
Optimistic Fair Priced Oblivious Transfer. [Citation Graph (, )][DBLP]
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. [Citation Graph (, )][DBLP]
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. [Citation Graph (, )][DBLP]
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. [Citation Graph (, )][DBLP]
Avoiding Full Extension Field Arithmetic in Pairing Computations. [Citation Graph (, )][DBLP]
ECC2K-130 on Cell CPUs. [Citation Graph (, )][DBLP]
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. [Citation Graph (, )][DBLP]
Differential Fault Analysis of HC-128. [Citation Graph (, )][DBLP]
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. [Citation Graph (, )][DBLP]
Strong Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]
Efficient Unidirectional Proxy Re-Encryption. [Citation Graph (, )][DBLP]
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. [Citation Graph (, )][DBLP]
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. [Citation Graph (, )][DBLP]
Quantum Readout of Physical Unclonable Functions. [Citation Graph (, )][DBLP]
Parallelizing the Camellia and SMS4 Block Ciphers. [Citation Graph (, )][DBLP]
Improved Linear Differential Attacks on CubeHash. [Citation Graph (, )][DBLP]
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. [Citation Graph (, )][DBLP]
|