The SCEAS System
Navigation Menu

Conferences in DBLP

Inf. Conf. on Cryptology in Malaysia (mycrypt)
2005 (conf/mycrypt/2005)

  1. Hideki Imai
    Trends and Challenges for Securer Cryptography in Practice. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:1- [Conf]
  2. Simon Künzli 0002, Pascal Junod, Willi Meier
    Distinguishing Attacks on T-Functions. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:2-15 [Conf]
  3. Frederik Armknecht, Gwénolé Ars
    Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:16-32 [Conf]
  4. Christopher Wolf, Bart Preneel
    Equivalent Keys in HFE, C*, and Variations. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:33-49 [Conf]
  5. Raphael Overbeck
    A New Structural Attack for GPT and Variants. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:50-63 [Conf]
  6. Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
    A Family of Fast Syndrome Based Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:64-83 [Conf]
  7. Kun Peng, Colin Boyd, Ed Dawson
    Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:84-98 [Conf]
  8. Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Identity Based Delegation Network. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:99-115 [Conf]
  9. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    On Session Key Construction in Provably-Secure Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:116-131 [Conf]
  10. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    On the Security of Probabilistic Multisignature Schemes and Their Optimality. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:132-150 [Conf]
  11. Aggelos Kiayias, Moti Yung
    Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:151-170 [Conf]
  12. Mathieu Ciet, Francesco Sica
    An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:171-182 [Conf]
  13. Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha
    Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:183-195 [Conf]
  14. Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
    Optimization of the MOVA Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:196-209 [Conf]
  15. Adam Young, Moti Yung
    Questionable Encryption and Its Applications. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:210-221 [Conf]
  16. Arjen K. Lenstra, Benjamin M. M. de Weger
    Twin RSA. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:222-228 [Conf]
  17. Colin Boyd, Kim-Kwang Raymond Choo
    Security of Two-Party Identity-Based Key Agreement. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:229-243 [Conf]
  18. Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee
    Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:244-262 [Conf]
  19. Raphael Chung-Wei Phan
    Advanced Slide Attacks Revisited: Realigning Slide on DES. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:263-276 [Conf]
  20. Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan
    New Multiset Attacks on Rijndael with Large Blocks. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:277-295 [Conf]
  21. Katja Schmidt-Samoa, Tsuyoshi Takagi
    Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:296-313 [Conf]
  22. Kristian Gjøsteen
    Homomorphic Cryptosystems Based on Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:314-327 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002