|
Conferences in DBLP
- Eyal Kushilevitz
Some Applications of Polynomials for the Design of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:1-13 [Conf]
- Ueli M. Maurer
Secure Multi-party Computation Made Simple. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:14-28 [Conf]
- Jonathan Katz, Rafail Ostrovsky, Moti Yung
Forward Secrecy in Password-Only Key Exchange Protocols. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:29-44 [Conf]
- Gene Tsudik
Weak Forward Security in Mediated RSA. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:45-54 [Conf]
- Yevgeniy Dodis, Leonid Reyzin
On the Power of Claw-Free Permutations. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:55-73 [Conf]
- Giovanni Di Crescenzo
Equivocable and Extractable Commitment Schemes. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:74-87 [Conf]
- Nenad Dedic, Leonid Reyzin, Salil P. Vadhan
An Improved Pseudorandom Generator Based on Hardness of Factoring. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:88-101 [Conf]
- Gene Itkis
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:102-118 [Conf]
- Giovanni Di Crescenzo, Olga Kornievskaia
Efficient Re-keying Protocols for Multicast Encryption. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:119-132 [Conf]
- Frank Niedermeyer, Werner Schindler
On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:133-145 [Conf]
- Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
A Group Key Distribution Scheme with Decentralised User Join. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:146-163 [Conf]
- Yuri Borissov, Svetla Nikova, Bart Preneel, Joos Vandewalle
On a Resynchronization Weakness in a Class of Combiners with Memory. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:164-173 [Conf]
- Ali Aydin Selçuk, Ali Biçak
On Probability of Success in Linear and Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:174-185 [Conf]
- Hitoshi Yanami, Takeshi Shimoyama
Differential Cryptanalysis of a Reduced-Round SEED. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:186-198 [Conf]
- Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
Medical Information Privacy Assurance: Cryptographic and System Aspects. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:199-218 [Conf]
- Luigi Catuogno, Ivan Visconti
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:219-233 [Conf]
- Louis Granboulan
How to Repair ESIGN. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:234-240 [Conf]
- Anton Kozlov, Leonid Reyzin
Forward-Secure Signatures with Fast Key Update. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:241-256 [Conf]
- Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
Constructing Elliptic Curves with Prescribed Embedding Degrees. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:257-267 [Conf]
- Jan Camenisch, Anna Lysyanskaya
A Signature Scheme with Efficient Protocols. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:268-289 [Conf]
- Yvo Desmedt, Yongge Wang
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:290-302 [Conf]
- Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu
Reduction Zero-Knowledge. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:303-317 [Conf]
- Shirley H. C. Cheung, Xiaotie Deng, Chan H. Lee, Yunlei Zhao
A New Notion of Soundness in Bare Public-Key Model. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:318-325 [Conf]
- Amos Beimel, Yoav Stahl
Robust Information-Theoretic Private Information Retrieval. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:326-341 [Conf]
- B. Prabhu, K. Srinathan, C. Pandu Rangan
Trading Players for Efficiency in Unconditional Multiparty Computation. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:342-353 [Conf]
- Jaume Martí-Farré, Carles Padró
Secret Sharing Schemes on Access Structures with Intersection Number Equal to One. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:354-363 [Conf]
|