Conferences in DBLP
Hideki Imai Trends and Challenges for Securer Cryptography in Practice. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:1- [Conf ] Simon Künzli 0002 , Pascal Junod , Willi Meier Distinguishing Attacks on T-Functions. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:2-15 [Conf ] Frederik Armknecht , Gwénolé Ars Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:16-32 [Conf ] Christopher Wolf , Bart Preneel Equivalent Keys in HFE, C* , and Variations. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:33-49 [Conf ] Raphael Overbeck A New Structural Attack for GPT and Variants. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:50-63 [Conf ] Daniel Augot , Matthieu Finiasz , Nicolas Sendrier A Family of Fast Syndrome Based Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:64-83 [Conf ] Kun Peng , Colin Boyd , Ed Dawson Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:84-98 [Conf ] Sherman S. M. Chow , Richard W. C. Lui , Lucas Chi Kwong Hui , Siu-Ming Yiu Identity Based Delegation Network. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:99-115 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock On Session Key Construction in Provably-Secure Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:116-131 [Conf ] Yuichi Komano , Kazuo Ohta , Atsushi Shimbo , Shin-ichi Kawamura On the Security of Probabilistic Multisignature Schemes and Their Optimality. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:132-150 [Conf ] Aggelos Kiayias , Moti Yung Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:151-170 [Conf ] Mathieu Ciet , Francesco Sica An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:171-182 [Conf ] Sung-Ming Yen , Wei-Chih Lien , Sang-Jae Moon , JaeCheol Ha Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:183-195 [Conf ] Jean Monnerat , Yvonne Anne Oswald , Serge Vaudenay Optimization of the MOVA Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:196-209 [Conf ] Adam Young , Moti Yung Questionable Encryption and Its Applications. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:210-221 [Conf ] Arjen K. Lenstra , Benjamin M. M. de Weger Twin RSA. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:222-228 [Conf ] Colin Boyd , Kim-Kwang Raymond Choo Security of Two-Party Identity-Based Key Agreement. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:229-243 [Conf ] Changhoon Lee , Jongsung Kim , Seokhie Hong , Jaechul Sung , Sangjin Lee Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:244-262 [Conf ] Raphael Chung-Wei Phan Advanced Slide Attacks Revisited: Realigning Slide on DES. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:263-276 [Conf ] Jorge Nakahara Jr. , Daniel Santana de Freitas , Raphael Chung-Wei Phan New Multiset Attacks on Rijndael with Large Blocks. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:277-295 [Conf ] Katja Schmidt-Samoa , Tsuyoshi Takagi Paillier's Cryptosystem Modulo p2 q and Its Applications to Trapdoor Commitment Schemes. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:296-313 [Conf ] Kristian Gjøsteen Homomorphic Cryptosystems Based on Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:314-327 [Conf ]