The SCEAS System
Navigation Menu

Conferences in DBLP

The Cryptographer's Track at RSA Conference (CT-RSA) (ctrsa)
2005 (conf/ctrsa/2005)

  1. Cynthia Dwork
    Sub-linear Queries Statistical Databases: Privacy with Power. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:1-6 [Conf]
  2. Adam Young, Moti Yung
    Malicious Cryptography: Kleptographic Aspects. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:7-18 [Conf]
  3. Olivier Billet, Henri Gilbert
    Resistance of SNOW 2.0 Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:19-28 [Conf]
  4. An Braeken, Christopher Wolf, Bart Preneel
    A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:29-43 [Conf]
  5. Zvi Gutterman, Dahlia Malkhi
    Hold Your Sessions: An Attack on Java Session-Id Generation. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:44-57 [Conf]
  6. Vincent Rijmen, Elisabeth Oswald
    Update on SHA-1. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:58-71 [Conf]
  7. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    A Fast Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:72-86 [Conf]
  8. Dan Boneh, Jonathan Katz
    Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:87-103 [Conf]
  9. Yang Cui, Kazukuni Kobara, Hideki Imai
    A Generic Conversion with Optimal Redundancy. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:104-117 [Conf]
  10. Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
    Choosing Parameter Sets forwithand. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:118-135 [Conf]
  11. Mihir Bellare, Haixia Shi, Chong Zhang
    Foundations of Group Signatures: The Case of Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:136-153 [Conf]
  12. Fabien Laguillaumie, Damien Vergnaud
    Time-Selective Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:154-171 [Conf]
  13. Amir Herzberg
    On Tolerant Cryptographic Constructions. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:172-190 [Conf]
  14. Michel Abdalla, David Pointcheval
    Simple Password-Based Encrypted Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:191-208 [Conf]
  15. Philip D. MacKenzie, Sarvar Patel
    Hard Bits of the Discrete Log with Applications to Password Authentication. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:209-226 [Conf]
  16. Michael Szydlo, Burton S. Kaliski Jr.
    Proofs for Two-Server Password Authentication. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:227-244 [Conf]
  17. Frances F. Yao, Yiqun Lisa Yin
    Design and Analysis of Password-Based Key Derivation Functions. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:245-261 [Conf]
  18. Noel McCullagh, Paulo S. L. M. Barreto
    A New Two-Party Identity-Based Authenticated Key Agreement. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:262-274 [Conf]
  19. Lan Nguyen
    Accumulators from Bilinear Pairings and Applications. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:275-292 [Conf]
  20. Michael Scott
    Computing the Tate Pairing. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:293-304 [Conf]
  21. Tsz Hon Yuen, Victor K. Wei
    Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:305-322 [Conf]
  22. Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
    A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:323-333 [Conf]
  23. Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck
    CryptoGraphics: Secret Key Cryptography Using Graphics Cards. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:334-350 [Conf]
  24. Stefan Mangard, Thomas Popp, Berndt M. Gammel
    Side-Channel Leakage of Masked CMOS Gates. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:351-365 [Conf]
  25. James A. Muir, Douglas R. Stinson
    New Minimal Weight Representations for Left-to-Right Window Methods. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:366-383 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002