The SCEAS System
Navigation Menu

Conferences in DBLP

(africacrypt)
2010 (conf/africacrypt/2010)


  1. A New RSA-Based Signature Scheme. [Citation Graph (, )][DBLP]


  2. Fair Blind Signatures without Random Oracles. [Citation Graph (, )][DBLP]


  3. Fair Partially Blind Signatures. [Citation Graph (, )][DBLP]


  4. Parallel Shortest Lattice Vector Enumeration on Graphics Cards. [Citation Graph (, )][DBLP]


  5. Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. [Citation Graph (, )][DBLP]


  6. Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits. [Citation Graph (, )][DBLP]


  7. Proofs of Restricted Shuffles. [Citation Graph (, )][DBLP]


  8. Batch Range Proof for Practical Small Ranges. [Citation Graph (, )][DBLP]


  9. Optimistic Fair Priced Oblivious Transfer. [Citation Graph (, )][DBLP]


  10. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. [Citation Graph (, )][DBLP]


  11. Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. [Citation Graph (, )][DBLP]


  12. Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. [Citation Graph (, )][DBLP]


  13. Avoiding Full Extension Field Arithmetic in Pairing Computations. [Citation Graph (, )][DBLP]


  14. ECC2K-130 on Cell CPUs. [Citation Graph (, )][DBLP]


  15. Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. [Citation Graph (, )][DBLP]


  16. Differential Fault Analysis of HC-128. [Citation Graph (, )][DBLP]


  17. Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. [Citation Graph (, )][DBLP]


  18. Strong Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]


  19. Efficient Unidirectional Proxy Re-Encryption. [Citation Graph (, )][DBLP]


  20. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. [Citation Graph (, )][DBLP]


  21. Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. [Citation Graph (, )][DBLP]


  22. Quantum Readout of Physical Unclonable Functions. [Citation Graph (, )][DBLP]


  23. Parallelizing the Camellia and SMS4 Block Ciphers. [Citation Graph (, )][DBLP]


  24. Improved Linear Differential Attacks on CubeHash. [Citation Graph (, )][DBLP]


  25. Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002