The SCEAS System
Navigation Menu

Conferences in DBLP

International Crytology Conference (CRYPTO) (crypto)
2005 (conf/crypto/2005)

  1. Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
    Efficient Collision Search Attacks on SHA-0. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:1-16 [Conf]
  2. Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
    Finding Collisions in the Full SHA-1. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:17-36 [Conf]
  3. Cynthia Dwork, Moni Naor, Hoeteck Wee
    Pebbling and Proofs of Work. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:37-54 [Conf]
  4. Krzysztof Pietrzak
    Composition Does Not Imply Adaptive Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:55-65 [Conf]
  5. Robert Granger, Frederik Vercauteren
    On the Discrete Logarithm Problem on Algebraic Tori. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:66-85 [Conf]
  6. Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov
    A Practical Attack on a Braid Group Based Cryptographic Protocol. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:86-96 [Conf]
  7. Yi Lu 0002, Willi Meier, Serge Vaudenay
    The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:97-117 [Conf]
  8. Rafael Pass, Abhi Shelat
    Unconditional Characterizations of Non-interactive Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:118-134 [Conf]
  9. Joël Alwen, Giuseppe Persiano, Ivan Visconti
    Impossibility and Feasibility Results for Zero Knowledge with Public Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:135-151 [Conf]
  10. Marc Fischlin
    Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:152-168 [Conf]
  11. Jan Camenisch, Anna Lysyanskaya
    A Formal Treatment of Onion Routing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:169-187 [Conf]
  12. Kun Peng, Colin Boyd, Ed Dawson
    Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:188-204 [Conf]
  13. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:205-222 [Conf]
  14. Rafail Ostrovsky, William E. Skeith III
    Private Searching on Streaming Data. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:223-240 [Conf]
  15. Lea Kissner, Dawn Xiaodong Song
    Privacy-Preserving Set Operations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:241-257 [Conf]
  16. Dan Boneh, Craig Gentry, Brent Waters
    Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:258-275 [Conf]
  17. Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
    Generic Transformation for Scalable Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:276-292 [Conf]
  18. Ari Juels, Stephen A. Weis
    Authenticating Pervasive Devices with Human Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:293-308 [Conf]
  19. Serge Vaudenay
    Secure Communications over Insecure Channels Based on Short Authenticated Strings. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:309-326 [Conf]
  20. Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró
    On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:327-343 [Conf]
  21. Ronald Cramer, Serge Fehr, Martijn Stam
    Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:344-360 [Conf]
  22. Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin
    Secure Computation Without Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:361-377 [Conf]
  23. Ivan Damgård, Yuval Ishai
    Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:378-394 [Conf]
  24. Omer Barkol, Yuval Ishai
    Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:395-411 [Conf]
  25. Alexandra Boldyreva, Marc Fischlin
    Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:412-429 [Conf]
  26. Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
    Merkle-Damgård Revisited: How to Construct a Hash Function. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:430-448 [Conf]
  27. Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak
    On the Generic Insecurity of the Full Domain Hash. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:449-466 [Conf]
  28. Stefan Wolf, Jürg Wullschleger
    New Monotones and Lower Bounds in Unconditional Two-Party Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:467-477 [Conf]
  29. Thomas Holenstein, Renato Renner
    One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:478-493 [Conf]
  30. Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail
    A Quantum Cipher with Near Optimal Key-Recycling. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:494-510 [Conf]
  31. Benoît Chevallier-Mames
    An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:511-526 [Conf]
  32. Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway
    Improved Security Analyses for CBC MACs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:527-545 [Conf]
  33. Hugo Krawczyk
    HMQV: A High-Performance Secure Diffie-Hellman Protocol. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:546-566 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002