The SCEAS System
Navigation Menu

Conferences in DBLP

The Cryptographer's Track at RSA Conference (CT-RSA) (ctrsa)
2007 (conf/ctrsa/2007)

  1. Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
    MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:1-19 [Conf]
  2. Eli Biham, Orr Dunkelman, Nathan Keller
    A Simple Related-Key Attack on the Full SHACAL-1. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:20-30 [Conf]
  3. Pascal Paillier
    Impossibility Proofs for RSA Signatures in the Standard Model. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:31-48 [Conf]
  4. Eric R. Verheul
    Selecting Secure Passwords. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:49-66 [Conf]
  5. Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee
    Human Identification Through Image Evaluation Using Secret Predicates. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:67-84 [Conf]
  6. Florian Mendel, Joseph Lano, Bart Preneel
    Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:85-100 [Conf]
  7. Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Second Preimages for SMASH. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:101-111 [Conf]
  8. Haifeng Qian, Zhibin Li, Zhijie Chen, Siman Yang
    A Practical Optimal Padding for Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:112-128 [Conf]
  9. Xun Yi
    Directed Transitive Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:129-144 [Conf]
  10. Mihir Bellare, Gregory Neven
    Identity-Based Multi-signatures from RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:145-162 [Conf]
  11. Matthew K. Franklin, Mark Gondree, Payman Mohassel
    Improved Efficiency for Private Stable Matching. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:163-177 [Conf]
  12. Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
    Compact E-Cash from Bounded Accumulator. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:178-195 [Conf]
  13. Koji Chida, Go Yamamoto
    Batch Processing of Interactive Proofs. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:196-207 [Conf]
  14. Joseph H. Silverman, William Whyte
    Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:208-224 [Conf]
  15. Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert
    Predicting Secret Keys Via Branch Prediction. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:225-242 [Conf]
  16. Elisabeth Oswald, Stefan Mangard
    Template Attacks on Masking - Resistance Is Futile. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:243-256 [Conf]
  17. Wieland Fischer, Berndt M. Gammel, O. Kniffler, J. Velten
    Differential Power Analysis of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:257-270 [Conf]
  18. Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
    Cache Based Remote Timing Attack on the AES. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:271-286 [Conf]
  19. Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:287-308 [Conf]
  20. Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won
    Efficient Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:309-323 [Conf]
  21. Yvo Desmedt, Goce Jakimoski
    Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:324-338 [Conf]
  22. Benoît Chevallier-Mames, Marc Joye
    A Practical and Tightly Secure Signature Scheme Without Hash Function. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:339-356 [Conf]
  23. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
    How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:357-371 [Conf]
  24. Máire McLoone, Matthew J. B. Robshaw
    Public Key Cryptography and RFID Tags. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:372-384 [Conf]
  25. Karl Scheibelhofer
    A Bit-Slice Implementation of the Whirlpool Hash Function. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:385-401 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002