The SCEAS System
Navigation Menu

Conferences in DBLP

The Cryptographer's Track at RSA Conference (CT-RSA) (ctrsa)
2002 (conf/ctrsa/2002)

  1. Burton S. Kaliski Jr.
    On Hash Function Firewalls in Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:1-16 [Conf]
  2. Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung
    Observability Analysis - Detecting When Improved Cryptosystems Fail. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:17-29 [Conf]
  3. Colin D. Walter
    Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:30-39 [Conf]
  4. Lejla Batina, Geeke Muurling
    Montgomery in Practice: How to Do It More Efficiently in Hardware. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:40-52 [Conf]
  5. Colin D. Walter
    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:53-66 [Conf]
  6. Johannes Wolkerstorfer, Elisabeth Oswald, Mario Lamberger
    An ASIC Implementation of the AES SBoxes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:67-78 [Conf]
  7. Marc Fischlin
    On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:79-95 [Conf]
  8. Marc Fischlin, Roger Fischlin
    The Representation Problem Based on Factoring. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:96-113 [Conf]
  9. John Black, Phillip Rogaway
    Ciphers with Arbitrary Finite Domains. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:114-130 [Conf]
  10. Atsuko Miyaji, Masao Nonaka, Yoshinori Takii
    Known Plaintext Correlation Attack against RC5. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:131-148 [Conf]
  11. Silvio Micali, Ronald L. Rivest
    Micropayments Revisited. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:149-163 [Conf]
  12. Markus Jakobsson, Ari Juels, Phong Q. Nguyen
    Proprietary Certificates. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:164-181 [Conf]
  13. Giuseppe Ateniese, Cristina Nita-Rotaru
    Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:182-199 [Conf]
  14. Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson
    RSA-Based Undeniable Signatures for General Moduli. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:200-217 [Conf]
  15. Greg Maitland, Colin Boyd
    Co-operatively Formed Group Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:218-235 [Conf]
  16. Silvio Micali, Ronald L. Rivest
    Transitive Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:236-243 [Conf]
  17. Robert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner
    Homomorphic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:244-262 [Conf]
  18. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    GEM: A Generic Chosen-Ciphertext Secure Encryption Method. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:263-276 [Conf]
  19. Masayuki Abe
    Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:277-289 [Conf]
  20. Qi Cheng, Shigenori Uchiyama
    Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:290-299 [Conf]
  21. Cheng-Fen Lu, Shiuh-Pyng Winston Shieh
    Secure Key-Evolving Protocols for Discrete Logarithm Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:300-310 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002