|
Conferences in DBLP
- Amos Beimel, Matthew K. Franklin
Edge Eavesdropping Games. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:1-17 [Conf]
- Alejandro Hevia
Universally Composable Simultaneous Broadcast. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:18-33 [Conf]
- Kaoru Kurosawa, Swee-Huay Heng
Relations Among Security Notions for Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:34-48 [Conf]
- Aggelos Kiayias, Hong-Sheng Zhou
Concurrent Blind Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:49-62 [Conf]
- Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:63-77 [Conf]
- Joan Daemen, Vincent Rijmen
Understanding Two-Round Differentials in AES. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:78-94 [Conf]
- Jiqiang Lu, Changhoon Lee, Jongsung Kim
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:95-110 [Conf]
- Man Ho Au, Willy Susilo, Yi Mu
Constant-Size Dynamic k-TAA. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:111-125 [Conf]
- Amir Herzberg, Igal Yoffe
On Secure Orders in the Presence of Faults. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:126-140 [Conf]
- Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
Balancing Accountability and Privacy Using E-Cash (Extended Abstract). [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:141-155 [Conf]
- Sébastien Kunz-Jacques, David Pointcheval
About the Security of MTI/C0 and MQV. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:156-172 [Conf]
- David Galindo, Eike Kiltz
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:173-185 [Conf]
- Sébastien Kunz-Jacques, David Pointcheval
A New Key Exchange Protocol Based on MQV Assuming Public Computations. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:186-200 [Conf]
- Jaume Martí-Farré, Carles Padró
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:201-215 [Conf]
- Roberto De Prisco, Alfredo De Santis
Cheating Immune (2, n)-Threshold Visual Secret Sharing. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:216-228 [Conf]
- S. Dov Gordon, Jonathan Katz
Rational Secret Sharing, Revisited. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:229-241 [Conf]
- Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:242-256 [Conf]
- Joan Daemen, Gilles Van Assche
Distinguishing Stream Ciphers with Convolutional Filters. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:257-270 [Conf]
- Fida El Haje, Yuri Golubev, Pierre-Yvan Liardet, Yannick Teglia
On Statistical Testing of Random Numbers Generators. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:271-287 [Conf]
- Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest
Lightweight Email Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:288-302 [Conf]
- Daniel V. Bailey, Ari Juels
Shoehorning Security into the EPC Tag Standard. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:303-320 [Conf]
- Walid Bagga, Stefano Crosta, Refik Molva
Proof-Carrying Proxy Certificates. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:321-335 [Conf]
- Olivier Billet, Henri Gilbert
Cryptanalysis of Rainbow. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:336-347 [Conf]
- Éric Levieil, Pierre-Alain Fouque
An Improved LPN Algorithm. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:348-359 [Conf]
- Ivan Damgård
Theory and Practice of Multiparty Computation. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:360-364 [Conf]
|