Conferences in DBLP
Burton S. Kaliski Jr. On Hash Function Firewalls in Signature Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:1-16 [Conf ] Marc Joye , Jean-Jacques Quisquater , Sung-Ming Yen , Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:17-29 [Conf ] Colin D. Walter Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:30-39 [Conf ] Lejla Batina , Geeke Muurling Montgomery in Practice: How to Do It More Efficiently in Hardware. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:40-52 [Conf ] Colin D. Walter MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:53-66 [Conf ] Johannes Wolkerstorfer , Elisabeth Oswald , Mario Lamberger An ASIC Implementation of the AES SBoxes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:67-78 [Conf ] Marc Fischlin On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:79-95 [Conf ] Marc Fischlin , Roger Fischlin The Representation Problem Based on Factoring. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:96-113 [Conf ] John Black , Phillip Rogaway Ciphers with Arbitrary Finite Domains. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:114-130 [Conf ] Atsuko Miyaji , Masao Nonaka , Yoshinori Takii Known Plaintext Correlation Attack against RC5. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:131-148 [Conf ] Silvio Micali , Ronald L. Rivest Micropayments Revisited. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:149-163 [Conf ] Markus Jakobsson , Ari Juels , Phong Q. Nguyen Proprietary Certificates. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:164-181 [Conf ] Giuseppe Ateniese , Cristina Nita-Rotaru Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:182-199 [Conf ] Steven D. Galbraith , Wenbo Mao , Kenneth G. Paterson RSA-Based Undeniable Signatures for General Moduli. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:200-217 [Conf ] Greg Maitland , Colin Boyd Co-operatively Formed Group Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:218-235 [Conf ] Silvio Micali , Ronald L. Rivest Transitive Signature Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:236-243 [Conf ] Robert Johnson , David Molnar , Dawn Xiaodong Song , David Wagner Homomorphic Signature Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:244-262 [Conf ] Jean-Sébastien Coron , Helena Handschuh , Marc Joye , Pascal Paillier , David Pointcheval , Christophe Tymen GEM: A Generic Chosen-Ciphertext Secure Encryption Method. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:263-276 [Conf ] Masayuki Abe Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:277-289 [Conf ] Qi Cheng , Shigenori Uchiyama Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:290-299 [Conf ] Cheng-Fen Lu , Shiuh-Pyng Winston Shieh Secure Key-Evolving Protocols for Discrete Logarithm Schemes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:300-310 [Conf ]