The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
2009 (conf/asiacrypt/2009)


  1. Related-Key Cryptanalysis of the Full AES-192 and AES-256. [Citation Graph (, )][DBLP]


  2. The Key-Dependent Attack on Block Ciphers. [Citation Graph (, )][DBLP]


  3. Cascade Encryption Revisited. [Citation Graph (, )][DBLP]


  4. Quantum-Secure Coin-Flipping and Applications. [Citation Graph (, )][DBLP]


  5. On the Power of Two-Party Quantum Cryptography. [Citation Graph (, )][DBLP]


  6. Security Bounds for the Design of Code-Based Cryptosystems. [Citation Graph (, )][DBLP]


  7. Rebound Attack on the Full Lane Compression Function. [Citation Graph (, )][DBLP]


  8. Rebound Distinguishers: Results on the Full Whirlpool Compression Function. [Citation Graph (, )][DBLP]


  9. MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. [Citation Graph (, )][DBLP]


  10. The Intel AES Instructions Set and the SHA-3 Candidates. [Citation Graph (, )][DBLP]


  11. Group Encryption: Non-interactive Realization in the Standard Model. [Citation Graph (, )][DBLP]


  12. On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. [Citation Graph (, )][DBLP]


  13. Hierarchical Predicate Encryption for Inner-Products. [Citation Graph (, )][DBLP]


  14. Hedged Public-Key Encryption: How to Protect against Bad Randomness. [Citation Graph (, )][DBLP]


  15. Secure Two-Party Computation Is Practical. [Citation Graph (, )][DBLP]


  16. Secure Multi-party Computation Minimizing Online Rounds. [Citation Graph (, )][DBLP]


  17. Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. [Citation Graph (, )][DBLP]


  18. Non-malleable Statistically Hiding Commitment from Any One-Way Function. [Citation Graph (, )][DBLP]


  19. Proofs of Storage from Homomorphic Identification Protocols. [Citation Graph (, )][DBLP]


  20. Simple Adaptive Oblivious Transfer without Random Oracle. [Citation Graph (, )][DBLP]


  21. Improved Generic Algorithms for 3-Collisions. [Citation Graph (, )][DBLP]


  22. A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. [Citation Graph (, )][DBLP]


  23. How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! [Citation Graph (, )][DBLP]


  24. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. [Citation Graph (, )][DBLP]


  25. Zero Knowledge in the Random Oracle Model, Revisited. [Citation Graph (, )][DBLP]


  26. A Framework for Universally Composable Non-committing Blind Signatures. [Citation Graph (, )][DBLP]


  27. Cryptanalysis of the Square Cryptosystems. [Citation Graph (, )][DBLP]


  28. Factoring pq2 with Quadratic Forms: Nice Cryptanalyses. [Citation Graph (, )][DBLP]


  29. Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? [Citation Graph (, )][DBLP]


  30. Security Notions and Generic Constructions for Client Puzzles. [Citation Graph (, )][DBLP]


  31. Foundations of Non-malleable Hash and One-Way Functions. [Citation Graph (, )][DBLP]


  32. Improved Cryptanalysis of Skein. [Citation Graph (, )][DBLP]


  33. Linearization Framework for Collision Attacks: Application to CubeHash and MD6. [Citation Graph (, )][DBLP]


  34. Preimages for Step-Reduced SHA-2. [Citation Graph (, )][DBLP]


  35. Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. [Citation Graph (, )][DBLP]


  36. Efficient Public Key Encryption Based on Ideal Lattices. [Citation Graph (, )][DBLP]


  37. Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. [Citation Graph (, )][DBLP]


  38. PSS Is Secure against Random Fault Attacks. [Citation Graph (, )][DBLP]


  39. Cache-Timing Template Attacks. [Citation Graph (, )][DBLP]


  40. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]


  41. Signature Schemes with Bounded Leakage Resilience. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002