The SCEAS System
Navigation Menu

Conferences in DBLP

Selected Areas in Cryptography (SAC) (sacrypt)
2005 (conf/sacrypt/2005)

  1. Elad Barkan, Eli Biham
    Conditional Estimators: An Effective Attack on A5/1. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:1-19 [Conf]
  2. Éliane Jaulmes, Frédéric Muller
    Cryptanalysis of the F-FCSR Stream Cipher Family. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:20-35 [Conf]
  3. Frederik Armknecht, Willi Meier
    Fault Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:36-50 [Conf]
  4. Duo Lei, Chao Li, Keqin Feng
    New Observation on Camellia. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:51-64 [Conf]
  5. Thomas Baignères, Serge Vaudenay
    Proving the Security of AES Substitution-Permutation Network. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:65-81 [Conf]
  6. Serge Mister, Robert J. Zuccherato
    An Attack on CFB Mode Encryption as Used by OpenPGP. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:82-94 [Conf]
  7. W. Eric Hall, Charanjit S. Jutla
    Parallelizable Authentication Trees. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:95-109 [Conf]
  8. Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar
    Improved Time-Memory Trade-Offs with Multiple Data. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:110-127 [Conf]
  9. Adam Young, Moti Yung
    A Space Efficient Backdoor in RSA and Its Applications. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:128-143 [Conf]
  10. Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim
    An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:144-158 [Conf]
  11. An Braeken, Joseph Lano
    On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:159-174 [Conf]
  12. Matthew Henricksen, Ed Dawson
    Rekeying Issues in the MUGI Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:175-188 [Conf]
  13. JooYoung Lee, Douglas R. Stinson
    Tree-Based Key Distribution Patterns. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:189-204 [Conf]
  14. Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sangjae Moon
    Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:205-220 [Conf]
  15. Jiang Wu, Ruizhong Wei
    An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:221-232 [Conf]
  16. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Breaking a New Hash Function Design Strategy Called SMASH. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:233-244 [Conf]
  17. Hirotaka Yoshida, Alex Biryukov
    Analysis of a SHA-256 Variant. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:245-260 [Conf]
  18. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Impact of Rotations in SHA-1 and Related Hash Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:261-275 [Conf]
  19. David Molnar, Andrea Soppera, David Wagner
    A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:276-290 [Conf]
  20. Gildas Avoine, Etienne Dysli, Philippe Oechslin
    Reducing Time Complexity in RFID Systems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:291-306 [Conf]
  21. Adrian Antipa, Daniel R. L. Brown, Robert P. Gallant, Robert J. Lambert, René Struik, Scott A. Vanstone
    Accelerated Verification of ECDSA Signatures. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:307-318 [Conf]
  22. Paulo S. L. M. Barreto, Michael Naehrig
    Pairing-Friendly Elliptic Curves of Prime Order. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:319-331 [Conf]
  23. Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger
    Minimality of the Hamming Weight of the T-NAF for Koblitz Curves and Improved Combination with Point Halving. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:332-344 [Conf]
  24. Nicolas Thériault
    SPA Resistant Left-to-Right Integer Recodings. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:345-358 [Conf]
  25. Joachim von zur Gathen, Jamshid Shokrollahi
    Efficient FPGA-Based Karatsuba Multipliers for Polynomials over F2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:359-369 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002