|
Conferences in DBLP
- Cynthia Dwork
Sub-linear Queries Statistical Databases: Privacy with Power. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:1-6 [Conf]
- Adam Young, Moti Yung
Malicious Cryptography: Kleptographic Aspects. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:7-18 [Conf]
- Olivier Billet, Henri Gilbert
Resistance of SNOW 2.0 Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:19-28 [Conf]
- An Braeken, Christopher Wolf, Bart Preneel
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:29-43 [Conf]
- Zvi Gutterman, Dahlia Malkhi
Hold Your Sessions: An Attack on Java Session-Id Generation. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:44-57 [Conf]
- Vincent Rijmen, Elisabeth Oswald
Update on SHA-1. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:58-71 [Conf]
- Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
A Fast Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:72-86 [Conf]
- Dan Boneh, Jonathan Katz
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:87-103 [Conf]
- Yang Cui, Kazukuni Kobara, Hideki Imai
A Generic Conversion with Optimal Redundancy. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:104-117 [Conf]
- Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
Choosing Parameter Sets forwithand. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:118-135 [Conf]
- Mihir Bellare, Haixia Shi, Chong Zhang
Foundations of Group Signatures: The Case of Dynamic Groups. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:136-153 [Conf]
- Fabien Laguillaumie, Damien Vergnaud
Time-Selective Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:154-171 [Conf]
- Amir Herzberg
On Tolerant Cryptographic Constructions. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:172-190 [Conf]
- Michel Abdalla, David Pointcheval
Simple Password-Based Encrypted Key Exchange Protocols. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:191-208 [Conf]
- Philip D. MacKenzie, Sarvar Patel
Hard Bits of the Discrete Log with Applications to Password Authentication. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:209-226 [Conf]
- Michael Szydlo, Burton S. Kaliski Jr.
Proofs for Two-Server Password Authentication. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:227-244 [Conf]
- Frances F. Yao, Yiqun Lisa Yin
Design and Analysis of Password-Based Key Derivation Functions. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:245-261 [Conf]
- Noel McCullagh, Paulo S. L. M. Barreto
A New Two-Party Identity-Based Authenticated Key Agreement. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:262-274 [Conf]
- Lan Nguyen
Accumulators from Bilinear Pairings and Applications. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:275-292 [Conf]
- Michael Scott
Computing the Tate Pairing. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:293-304 [Conf]
- Tsz Hon Yuen, Victor K. Wei
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:305-322 [Conf]
- Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:323-333 [Conf]
- Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck
CryptoGraphics: Secret Key Cryptography Using Graphics Cards. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:334-350 [Conf]
- Stefan Mangard, Thomas Popp, Berndt M. Gammel
Side-Channel Leakage of Masked CMOS Gates. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:351-365 [Conf]
- James A. Muir, Douglas R. Stinson
New Minimal Weight Representations for Left-to-Right Window Methods. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:366-383 [Conf]
|