The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Maria Isabel Gonzalez Vasco: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Maria Isabel Gonzalez Vasco, Mats Näslund, Igor Shparlinski
    The Hidden Number Problem in Extension Fields and Its Applications. [Citation Graph (0, 0)][DBLP]
    LATIN, 2002, pp:105-117 [Conf]
  2. Maria Isabel Gonzalez Vasco, Mats Näslund, Igor Shparlinski
    New Results on the Hardness of Diffie-Hellman Bits. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:159-172 [Conf]
  3. Maria Isabel Gonzalez Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar
    A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:495-509 [Conf]
  4. Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    (Password) Authenticated Key Establishment: From 2-Party to Group. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:499-514 [Conf]
  5. Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    A Reaction Attack on a Public Key Cryptosystem Based on the Word Problem. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2004, v:14, n:5, pp:335-340 [Journal]
  6. Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. [Citation Graph (0, 0)][DBLP]
    Appl. Math. Lett., 2006, v:19, n:10, pp:1037-1041 [Journal]
  7. Maria Isabel Gonzalez Vasco, David Pérez-García
    Attacking a public key cryptosystem based on tree replacement. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2007, v:155, n:1, pp:61-67 [Journal]
  8. Jens-Matthias Bohli, Rainer Steinwandt, Maria Isabel Gonzalez Vasco, Consuelo Martínez
    Weak Keys in MST1. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:509-524 [Journal]
  9. Maria Isabel Gonzalez Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt
    On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:207-216 [Journal]
  10. Maria Isabel Gonzalez Vasco, Consuelo Martínez, Rainer Steinwandt
    Towards a Uniform Description of Several Group Based Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:33, n:3, pp:215-226 [Journal]
  11. Maria Isabel Gonzalez Vasco, Igor Shparlinski
    Security of the Most Significant Bits of the Shamir Message Passing Scheme [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2000, v:7, n:40, pp:- [Journal]
  12. Maria Isabel Gonzalez Vasco, Igor Shparlinski
    On the Security of Diffie-Hellman Bits [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2000, v:7, n:45, pp:- [Journal]
  13. Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Clouds over a public key cryptosystem based on Lyndon words. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:80, n:5, pp:239-242 [Journal]
  14. Maria Isabel Gonzalez Vasco, Igor Shparlinski
    Security of the most significant bits of the Shamir message passing scheme. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2002, v:71, n:237, pp:333-342 [Journal]
  15. Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    A Subliminal-Free Variant of ECDSA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:375-387 [Conf]
  16. Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Secure group key establishment revisited. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:4, pp:243-254 [Journal]
  17. Willi Geiselmann, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Entwurf asymmetrischer kryptographischer Verfahren unter Berücksichtigung von Quantenalgorithmen (Design of Asymmetric Cryptographic Schemes Taking Into Account Quantum Algorithms). [Citation Graph (0, 0)][DBLP]
    it - Information Technology, 2006, v:48, n:6, pp:327-0 [Journal]

  18. In search of mathematical primitives for deriving universal projective hash families. [Citation Graph (, )][DBLP]


  19. Applications of algebra to cryptography. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002