Conferences in DBLP
Dag Arne Osvik , Adi Shamir , Eran Tromer Cache Attacks and Countermeasures: The Case of AES. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:1-20 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Related-Key Impossible Differential Attacks on 8-Round AES-192. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:21-33 [Conf ] Xiaojian Tian , Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:34-51 [Conf ] Omkant Pandey , Julien Cathalo , Jean-Jacques Quisquater Fair Identification. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:52-63 [Conf ] Xinxin Fan , Thomas J. Wollinger , Yumin Wang Efficient Doubling on Genus 3 Curves over Binary Fields. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:64-81 [Conf ] M. Jason Hinek Another Look at Small RSA Exponents. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:82-98 [Conf ] Michael Szydlo , Yiqun Lisa Yin Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:99-114 [Conf ] Pim Tuyls , Lejla Batina RFID-Tags for Anti-counterfeiting. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:115-131 [Conf ] Lih-Chung Wang , Bo-Yin Yang , Yuh-Hua Hu , Feipei Lai A "Medium-Field" Multivariate Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:132-149 [Conf ] Kristian Gjøsteen A New Security Proof for Damgård's ElGamal. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:150-158 [Conf ] Huafei Zhu , Feng Bao Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:159-173 [Conf ] Yuichi Komano , Kazuo Ohta , Atsushi Shimbo , Shin-ichi Kawamura Toward the Fair Anonymous Signatures: Deniable Ring Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:174-191 [Conf ] Elisabeth Oswald , Stefan Mangard , Christoph Herbst , Stefan Tillich Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:192-207 [Conf ] Kai Schramm , Christof Paar Higher Order Masking of the AES. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:208-225 [Conf ] Dan Boneh , Xavier Boyen , Shai Halevi Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:226-243 [Conf ] Yitao Duan , John F. Canny How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:244-261 [Conf ] Michel Abdalla , Chanathip Namprempre , Gregory Neven On the (Im)possibility of Blind Message Authentication Codes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:262-279 [Conf ] Sylvain Pasini , Serge Vaudenay An Optimal Non-interactive Message Authentication Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:280-294 [Conf ] Orr Dunkelman , Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:295-312 [Conf ] Johannes Buchmann , Andrei Pyshkin , Ralf-Philipp Weinmann Block Ciphers Sensitive to Gröbner Basis Attacks. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:313-331 [Conf ] Marc Fischlin Universally Composable Oblivious Transfer in the Multi-party Setting. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:332-349 [Conf ] Shaoquan Jiang , Guang Gong A Round and Communication Efficient Secure Ranking Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:350-364 [Conf ]