The SCEAS System
Navigation Menu

Conferences in DBLP

EUROCRYPT (eurocrypt)
2006 (conf/eurocrypt/2006)

  1. Jung Hee Cheon
    Security Analysis of the Strong Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:1-11 [Conf]
  2. Kenneth G. Paterson, Arnold K. L. Yau
    Cryptography in Theory and Practice: The Case of Encryption in IPsec. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:12-29 [Conf]
  3. Jean-Charles Faugère, Ludovic Perret
    Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:30-47 [Conf]
  4. Vanessa Gratzer, David Naccache
    Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:48-58 [Conf]
  5. Ee-Chien Chang, Qiming Li
    Hiding Secret Points Amidst Chaff. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:59-72 [Conf]
  6. Jonathan Katz, Ji Sun Shin
    Parallel and Concurrent Security of the HB and HB+ Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:73-87 [Conf]
  7. Tal Moran, Moni Naor
    Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:88-108 [Conf]
  8. Côme Berbain, Henri Gilbert, Jacques Patarin
    QUAD: A Practical Stream Cipher with Provable Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:109-128 [Conf]
  9. Aline Gouget, Hervé Sibert
    How to Strengthen Pseudo-random Generators by Using Compression. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:129-146 [Conf]
  10. Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta
    Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:147-164 [Conf]
  11. Scott Contini, Arjen K. Lenstra, Ron Steinfeld
    VSH, an Efficient and Provable Collision-Resistant Hash Function. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:165-182 [Conf]
  12. John Kelsey, Tadayoshi Kohno
    Herding Hash Functions and the Nostradamus Attack. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:183-200 [Conf]
  13. Claude Crépeau, George Savvides
    Optimal Reductions Between Oblivious Transfers Using Interactive Hashing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:201-221 [Conf]
  14. Stefan Wolf, Jürg Wullschleger
    Oblivious Transfer Is Symmetric. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:222-232 [Conf]
  15. Nicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen
    Symplectic Lattice Reduction and NTRU. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:233-253 [Conf]
  16. Antoine Joux, Reynald Lercier
    The Function Field Sieve in the Medium Prime Case. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:254-270 [Conf]
  17. Phong Q. Nguyen, Oded Regev
    Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:271-288 [Conf]
  18. Alexander W. Dent
    The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:289-307 [Conf]
  19. Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David Wagner
    Private Circuits II: Keeping Secrets in Tamperable Circuits. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:308-327 [Conf]
  20. Krzysztof Pietrzak
    Composition Implies Adaptive Security in Minicrypt. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:328-338 [Conf]
  21. Jens Groth, Rafail Ostrovsky, Amit Sahai
    Perfect Non-interactive Zero Knowledge for NP. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:339-358 [Conf]
  22. Kevin S. McCurley
    Language Modeling and Encryption on Packet Switched Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:359-372 [Conf]
  23. Phillip Rogaway, Thomas Shrimpton
    A Provable-Security Treatment of the Key-Wrap Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:373-390 [Conf]
  24. Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin
    Luby-Rackoff Ciphers from Weak Round Functions? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:391-408 [Conf]
  25. Mihir Bellare, Phillip Rogaway
    The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:409-426 [Conf]
  26. Xavier Boyen, Brent Waters
    Compact Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:427-444 [Conf]
  27. Craig Gentry
    Practical Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:445-464 [Conf]
  28. Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
    Sequential Aggregate Signatures and Multisignatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:465-485 [Conf]
  29. Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor
    Our Data, Ourselves: Privacy Via Distributed Noise Generation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:486-503 [Conf]
  30. Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
    On the (Im-)Possibility of Extending Coin Toss. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:504-521 [Conf]
  31. Berry Schoenmakers, Pim Tuyls
    Efficient Binary Conversion for Paillier Encrypted Values. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:522-537 [Conf]
  32. Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
    Information-Theoretic Conditions for Two-Party Secure Function Evaluation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:538-554 [Conf]
  33. Ivan Damgård, Kasper Dupont, Michael Østergaard Pedersen
    Unclonable Group Identification. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:555-572 [Conf]
  34. Dan Boneh, Amit Sahai, Brent Waters
    Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:573-592 [Conf]
  35. Jesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen
    Simplified Threshold RSA with Adaptive and Proactive Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:593-611 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002