Conferences in DBLP
Alexandra Boldyreva , Nut Taesombut Online Encryption Schemes: New Security Notions and Constructions. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:1-14 [Conf ] Raphael Chung-Wei Phan Related-Key Attacks on Triple-DES and DESX Variants. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:15-24 [Conf ] Shee-Yau Wu , Shih-Chuan Lu , Chi-Sung Laih Design of AES Based on Dual Cipher and Composite Field. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:25-38 [Conf ] Ove Scavenius , Martin Boesgaard , Thomas Pedersen , Jesper Christiansen , Vincent Rijmen Periodic Properties of Counter Assisted Stream Ciphers. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:39-53 [Conf ] Maneli Noorkami , Faramarz Fekri A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:54-66 [Conf ] Swee-Huay Heng , Kaoru Kurosawa k-Resilient Identity-Based Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:67-80 [Conf ] Yevgeniy Dodis , Matthew K. Franklin , Jonathan Katz , Atsuko Miyaji , Moti Yung A Generic Construction for Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:81-98 [Conf ] Bo Gyeong Kang , Je Hong Park , Sang Geun Hahn A Certificate-Based Signature Scheme. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:99-111 [Conf ] Benoît Libert , Jean-Jacques Quisquater Identity Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:112-125 [Conf ] Daniel Bleichenbacher Compressing Rabin Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:126-128 [Conf ] Adam Young , Moti Yung A Key Recovery System as Secure as Factoring. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:129-142 [Conf ] Kemal Bicakci , Nazife Baykal Server Assisted Signatures Revisited. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:143-156 [Conf ] Jean-Sébastien Coron , David Naccache Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:157-162 [Conf ] Philippe Golle , Markus Jakobsson , Ari Juels , Paul F. Syverson Universal Re-encryption for Mixnets. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:163-178 [Conf ] Anderson C. A. Nascimento , Jörn Müller-Quade , Hideki Imai Bit String Commitment Reductions with a Non-zero Rate. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:179-193 [Conf ] Qinglin Jiang , Douglas S. Reeves , Peng Ning Improving Robustness of PGP Keyrings by Conflict Detection. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:194-207 [Conf ] Colin D. Walter Issues of Security with the Oswald-Aigner Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:208-221 [Conf ] Stefan Mangard Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:222-235 [Conf ] Benoît Chevallier-Mames Self-Randomized Exponentiation Algorithms. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:236-249 [Conf ] Lejla Batina , Geeke Bruin-Muurling , Siddika Berna Örs Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:250-263 [Conf ] Wieland Fischer , Jean-Pierre Seifert High-Speed Modular Multiplication. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:264-277 [Conf ] Willi Geiselmann , Rainer Steinwandt Yet Another Sieving Device. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:278-291 [Conf ] Shai Halevi , Phillip Rogaway A Parallelizable Enciphering Mode. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:292-304 [Conf ] Kenneth G. Paterson , Arnold K. L. Yau Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:305-323 [Conf ] Roar Lien , Tim Grembowski , Kris Gaj A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:324-338 [Conf ] Marc Fischlin Fast Verification of Hash Chains. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:339-352 [Conf ] Quang Viet Duong , Kaoru Kurosawa Almost Ideal Contrast Visual Cryptography with Reversing. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:353-365 [Conf ] Alfred Menezes , Edlyn Teske , Annegret Weng Weak Fields for ECC. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:366-386 [Conf ]