Conferences in DBLP
Elad Barkan , Eli Biham Conditional Estimators: An Effective Attack on A5/1. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:1-19 [Conf ] Éliane Jaulmes , Frédéric Muller Cryptanalysis of the F-FCSR Stream Cipher Family. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:20-35 [Conf ] Frederik Armknecht , Willi Meier Fault Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:36-50 [Conf ] Duo Lei , Chao Li , Keqin Feng New Observation on Camellia. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:51-64 [Conf ] Thomas Baignères , Serge Vaudenay Proving the Security of AES Substitution-Permutation Network. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:65-81 [Conf ] Serge Mister , Robert J. Zuccherato An Attack on CFB Mode Encryption as Used by OpenPGP. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:82-94 [Conf ] W. Eric Hall , Charanjit S. Jutla Parallelizable Authentication Trees. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:95-109 [Conf ] Alex Biryukov , Sourav Mukhopadhyay , Palash Sarkar Improved Time-Memory Trade-Offs with Multiple Data. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:110-127 [Conf ] Adam Young , Moti Yung A Space Efficient Backdoor in RSA and Its Applications. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:128-143 [Conf ] Taek-Young Youn , Young-Ho Park , Chang Han Kim , Jongin Lim An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:144-158 [Conf ] An Braeken , Joseph Lano On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:159-174 [Conf ] Matthew Henricksen , Ed Dawson Rekeying Issues in the MUGI Stream Cipher. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:175-188 [Conf ] JooYoung Lee , Douglas R. Stinson Tree-Based Key Distribution Patterns. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:189-204 [Conf ] Sanggon Lee , Yvonne Hitchcock , Youngho Park , Sangjae Moon Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:205-220 [Conf ] Jiang Wu , Ruizhong Wei An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:221-232 [Conf ] Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Breaking a New Hash Function Design Strategy Called SMASH. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:233-244 [Conf ] Hirotaka Yoshida , Alex Biryukov Analysis of a SHA-256 Variant. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:245-260 [Conf ] Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Impact of Rotations in SHA-1 and Related Hash Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:261-275 [Conf ] David Molnar , Andrea Soppera , David Wagner A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:276-290 [Conf ] Gildas Avoine , Etienne Dysli , Philippe Oechslin Reducing Time Complexity in RFID Systems. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:291-306 [Conf ] Adrian Antipa , Daniel R. L. Brown , Robert P. Gallant , Robert J. Lambert , René Struik , Scott A. Vanstone Accelerated Verification of ECDSA Signatures. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:307-318 [Conf ] Paulo S. L. M. Barreto , Michael Naehrig Pairing-Friendly Elliptic Curves of Prime Order. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:319-331 [Conf ] Roberto Maria Avanzi , Clemens Heuberger , Helmut Prodinger Minimality of the Hamming Weight of the T -NAF for Koblitz Curves and Improved Combination with Point Halving. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:332-344 [Conf ] Nicolas Thériault SPA Resistant Left-to-Right Integer Recodings. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:345-358 [Conf ] Joachim von zur Gathen , Jamshid Shokrollahi Efficient FPGA-Based Karatsuba Multipliers for Polynomials over F2 . [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:359-369 [Conf ]