Conferences in DBLP
Xiaoyun Wang , Hongbo Yu , Yiqun Lisa Yin Efficient Collision Search Attacks on SHA-0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:1-16 [Conf ] Xiaoyun Wang , Yiqun Lisa Yin , Hongbo Yu Finding Collisions in the Full SHA-1. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:17-36 [Conf ] Cynthia Dwork , Moni Naor , Hoeteck Wee Pebbling and Proofs of Work. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:37-54 [Conf ] Krzysztof Pietrzak Composition Does Not Imply Adaptive Security. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:55-65 [Conf ] Robert Granger , Frederik Vercauteren On the Discrete Logarithm Problem on Algebraic Tori. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:66-85 [Conf ] Alexei G. Myasnikov , Vladimir Shpilrain , Alexander Ushakov A Practical Attack on a Braid Group Based Cryptographic Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:86-96 [Conf ] Yi Lu 0002 , Willi Meier , Serge Vaudenay The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:97-117 [Conf ] Rafael Pass , Abhi Shelat Unconditional Characterizations of Non-interactive Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:118-134 [Conf ] Joël Alwen , Giuseppe Persiano , Ivan Visconti Impossibility and Feasibility Results for Zero Knowledge with Public Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:135-151 [Conf ] Marc Fischlin Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:152-168 [Conf ] Jan Camenisch , Anna Lysyanskaya A Formal Treatment of Onion Routing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:169-187 [Conf ] Kun Peng , Colin Boyd , Ed Dawson Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:188-204 [Conf ] Michel Abdalla , Mihir Bellare , Dario Catalano , Eike Kiltz , Tadayoshi Kohno , Tanja Lange , John Malone-Lee , Gregory Neven , Pascal Paillier , Haixia Shi Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:205-222 [Conf ] Rafail Ostrovsky , William E. Skeith III Private Searching on Streaming Data. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:223-240 [Conf ] Lea Kissner , Dawn Xiaodong Song Privacy-Preserving Set Operations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:241-257 [Conf ] Dan Boneh , Craig Gentry , Brent Waters Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:258-275 [Conf ] Jung Yeon Hwang , Dong Hoon Lee , Jongin Lim Generic Transformation for Scalable Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:276-292 [Conf ] Ari Juels , Stephen A. Weis Authenticating Pervasive Devices with Human Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:293-308 [Conf ] Serge Vaudenay Secure Communications over Insecure Channels Based on Short Authenticated Strings. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:309-326 [Conf ] Ronald Cramer , Vanesa Daza , Ignacio Gracia , Jorge Jiménez Urroz , Gregor Leander , Jaume Martí-Farré , Carles Padró On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:327-343 [Conf ] Ronald Cramer , Serge Fehr , Martijn Stam Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:344-360 [Conf ] Boaz Barak , Ran Canetti , Yehuda Lindell , Rafael Pass , Tal Rabin Secure Computation Without Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:361-377 [Conf ] Ivan Damgård , Yuval Ishai Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:378-394 [Conf ] Omer Barkol , Yuval Ishai Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:395-411 [Conf ] Alexandra Boldyreva , Marc Fischlin Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:412-429 [Conf ] Jean-Sébastien Coron , Yevgeniy Dodis , Cécile Malinaud , Prashant Puniya Merkle-Damgård Revisited: How to Construct a Hash Function. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:430-448 [Conf ] Yevgeniy Dodis , Roberto Oliveira , Krzysztof Pietrzak On the Generic Insecurity of the Full Domain Hash. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:449-466 [Conf ] Stefan Wolf , Jürg Wullschleger New Monotones and Lower Bounds in Unconditional Two-Party Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:467-477 [Conf ] Thomas Holenstein , Renato Renner One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:478-493 [Conf ] Ivan Damgård , Thomas Brochmann Pedersen , Louis Salvail A Quantum Cipher with Near Optimal Key-Recycling. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:494-510 [Conf ] Benoît Chevallier-Mames An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:511-526 [Conf ] Mihir Bellare , Krzysztof Pietrzak , Phillip Rogaway Improved Security Analyses for CBC MACs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:527-545 [Conf ] Hugo Krawczyk HMQV: A High-Performance Secure Diffie-Hellman Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:546-566 [Conf ]