The SCEAS System
Navigation Menu

Conferences in DBLP

The Cryptographer's Track at RSA Conference (CT-RSA) (ctrsa)
2006 (conf/ctrsa/2006)

  1. Dag Arne Osvik, Adi Shamir, Eran Tromer
    Cache Attacks and Countermeasures: The Case of AES. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:1-20 [Conf]
  2. Eli Biham, Orr Dunkelman, Nathan Keller
    Related-Key Impossible Differential Attacks on 8-Round AES-192. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:21-33 [Conf]
  3. Xiaojian Tian, Duncan S. Wong
    Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:34-51 [Conf]
  4. Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater
    Fair Identification. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:52-63 [Conf]
  5. Xinxin Fan, Thomas J. Wollinger, Yumin Wang
    Efficient Doubling on Genus 3 Curves over Binary Fields. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:64-81 [Conf]
  6. M. Jason Hinek
    Another Look at Small RSA Exponents. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:82-98 [Conf]
  7. Michael Szydlo, Yiqun Lisa Yin
    Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:99-114 [Conf]
  8. Pim Tuyls, Lejla Batina
    RFID-Tags for Anti-counterfeiting. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:115-131 [Conf]
  9. Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai
    A "Medium-Field" Multivariate Public-Key Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:132-149 [Conf]
  10. Kristian Gjøsteen
    A New Security Proof for Damgård's ElGamal. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:150-158 [Conf]
  11. Huafei Zhu, Feng Bao
    Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:159-173 [Conf]
  12. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    Toward the Fair Anonymous Signatures: Deniable Ring Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:174-191 [Conf]
  13. Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich
    Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:192-207 [Conf]
  14. Kai Schramm, Christof Paar
    Higher Order Masking of the AES. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:208-225 [Conf]
  15. Dan Boneh, Xavier Boyen, Shai Halevi
    Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:226-243 [Conf]
  16. Yitao Duan, John F. Canny
    How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:244-261 [Conf]
  17. Michel Abdalla, Chanathip Namprempre, Gregory Neven
    On the (Im)possibility of Blind Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:262-279 [Conf]
  18. Sylvain Pasini, Serge Vaudenay
    An Optimal Non-interactive Message Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:280-294 [Conf]
  19. Orr Dunkelman, Nathan Keller
    A New Criterion for Nonlinearity of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:295-312 [Conf]
  20. Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann
    Block Ciphers Sensitive to Gröbner Basis Attacks. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:313-331 [Conf]
  21. Marc Fischlin
    Universally Composable Oblivious Transfer in the Multi-party Setting. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:332-349 [Conf]
  22. Shaoquan Jiang, Guang Gong
    A Round and Communication Efficient Secure Ranking Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:350-364 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002