The SCEAS System
Navigation Menu

Conferences in DBLP

The Cryptographer's Track at RSA Conference (CT-RSA) (ctrsa)
2004 (conf/ctrsa/2004)

  1. Alexandra Boldyreva, Nut Taesombut
    Online Encryption Schemes: New Security Notions and Constructions. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:1-14 [Conf]
  2. Raphael Chung-Wei Phan
    Related-Key Attacks on Triple-DES and DESX Variants. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:15-24 [Conf]
  3. Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih
    Design of AES Based on Dual Cipher and Composite Field. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:25-38 [Conf]
  4. Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen
    Periodic Properties of Counter Assisted Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:39-53 [Conf]
  5. Maneli Noorkami, Faramarz Fekri
    A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:54-66 [Conf]
  6. Swee-Huay Heng, Kaoru Kurosawa
    k-Resilient Identity-Based Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:67-80 [Conf]
  7. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
    A Generic Construction for Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:81-98 [Conf]
  8. Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn
    A Certificate-Based Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:99-111 [Conf]
  9. Benoît Libert, Jean-Jacques Quisquater
    Identity Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:112-125 [Conf]
  10. Daniel Bleichenbacher
    Compressing Rabin Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:126-128 [Conf]
  11. Adam Young, Moti Yung
    A Key Recovery System as Secure as Factoring. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:129-142 [Conf]
  12. Kemal Bicakci, Nazife Baykal
    Server Assisted Signatures Revisited. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:143-156 [Conf]
  13. Jean-Sébastien Coron, David Naccache
    Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:157-162 [Conf]
  14. Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson
    Universal Re-encryption for Mixnets. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:163-178 [Conf]
  15. Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai
    Bit String Commitment Reductions with a Non-zero Rate. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:179-193 [Conf]
  16. Qinglin Jiang, Douglas S. Reeves, Peng Ning
    Improving Robustness of PGP Keyrings by Conflict Detection. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:194-207 [Conf]
  17. Colin D. Walter
    Issues of Security with the Oswald-Aigner Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:208-221 [Conf]
  18. Stefan Mangard
    Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:222-235 [Conf]
  19. Benoît Chevallier-Mames
    Self-Randomized Exponentiation Algorithms. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:236-249 [Conf]
  20. Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs
    Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:250-263 [Conf]
  21. Wieland Fischer, Jean-Pierre Seifert
    High-Speed Modular Multiplication. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:264-277 [Conf]
  22. Willi Geiselmann, Rainer Steinwandt
    Yet Another Sieving Device. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:278-291 [Conf]
  23. Shai Halevi, Phillip Rogaway
    A Parallelizable Enciphering Mode. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:292-304 [Conf]
  24. Kenneth G. Paterson, Arnold K. L. Yau
    Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:305-323 [Conf]
  25. Roar Lien, Tim Grembowski, Kris Gaj
    A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:324-338 [Conf]
  26. Marc Fischlin
    Fast Verification of Hash Chains. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:339-352 [Conf]
  27. Quang Viet Duong, Kaoru Kurosawa
    Almost Ideal Contrast Visual Cryptography with Reversing. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:353-365 [Conf]
  28. Alfred Menezes, Edlyn Teske, Annegret Weng
    Weak Fields for ECC. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:366-386 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002