|
Conferences in DBLP
- Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:1-19 [Conf]
- Eli Biham, Orr Dunkelman, Nathan Keller
A Simple Related-Key Attack on the Full SHACAL-1. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:20-30 [Conf]
- Pascal Paillier
Impossibility Proofs for RSA Signatures in the Standard Model. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:31-48 [Conf]
- Eric R. Verheul
Selecting Secure Passwords. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:49-66 [Conf]
- Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee
Human Identification Through Image Evaluation Using Secret Predicates. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:67-84 [Conf]
- Florian Mendel, Joseph Lano, Bart Preneel
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:85-100 [Conf]
- Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Second Preimages for SMASH. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:101-111 [Conf]
- Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang
A Practical Optimal Padding for Signature Schemes. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:112-128 [Conf]
- Xun Yi
Directed Transitive Signature Scheme. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:129-144 [Conf]
- Mihir Bellare, Gregory Neven
Identity-Based Multi-signatures from RSA. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:145-162 [Conf]
- Matthew K. Franklin, Mark Gondree, Payman Mohassel
Improved Efficiency for Private Stable Matching. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:163-177 [Conf]
- Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
Compact E-Cash from Bounded Accumulator. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:178-195 [Conf]
- Koji Chida, Go Yamamoto
Batch Processing of Interactive Proofs. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:196-207 [Conf]
- Joseph H. Silverman, William Whyte
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:208-224 [Conf]
- Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert
Predicting Secret Keys Via Branch Prediction. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:225-242 [Conf]
- Elisabeth Oswald, Stefan Mangard
Template Attacks on Masking - Resistance Is Futile. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:243-256 [Conf]
- Wieland Fischer, Berndt M. Gammel, O. Kniffler, J. Velten
Differential Power Analysis of Stream Ciphers. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:257-270 [Conf]
- Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
Cache Based Remote Timing Attack on the AES. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:271-286 [Conf]
- Stanislaw Jarecki, Jihye Kim, Gene Tsudik
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:287-308 [Conf]
- Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:309-323 [Conf]
- Yvo Desmedt, Goce Jakimoski
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:324-338 [Conf]
- Benoît Chevallier-Mames, Marc Joye
A Practical and Tightly Secure Signature Scheme Without Hash Function. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:339-356 [Conf]
- Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:357-371 [Conf]
- Máire McLoone, Matthew J. B. Robshaw
Public Key Cryptography and RFID Tags. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:372-384 [Conf]
- Karl Scheibelhofer
A Bit-Slice Implementation of the Whirlpool Hash Function. [Citation Graph (0, 0)][DBLP] CT-RSA, 2007, pp:385-401 [Conf]
|