|
Conferences in DBLP
(weworc) 2005 (conf/weworc/2005)
- Heiko Stamer
Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:1-12 [Conf]
- Frederik Armknecht
Algebraic Attacks and Annihilators. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:13-21 [Conf]
- SeongHan Shin, Kazukuni Kobara, Hideki Imai
A Secure Network Storage System with Information Privacy. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:22-31 [Conf]
- Marie Virat
A cryptosystem "à la" ElGamal on an elliptic curve over Fp [epsilon]. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:32-44 [Conf]
- Adil Alsaid, Chris J. Mitchell
A Scanning Tool for PC Root Public Key Stores. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:45-52 [Conf]
- Andrey Sidorenko, Berry Schoenmakers
State Recovery Attacks on Pseudorandom Generators. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:53-63 [Conf]
- Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:64-75 [Conf]
- Cédric Lauradoux
Collision attacks on processors with cache and countermeasures. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:76-85 [Conf]
- Eabhnat Ní Fhloinn, Michael Purser
Applications of Hiding in RSA. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:86-97 [Conf]
- Alexandre Ruiz, Jorge Luis Villar
Publicly Verfiable Secret Sharing from Paillier's Cryptosystem. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:98-108 [Conf]
- Stefan Lucks, Nico Schmoigl, Emin Islam Tatli
Issues on Designing a Cryptographic Compiler. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:109-122 [Conf]
- Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Analysis of simplified variants of SHA-256. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:123-134 [Conf]
|