|
Conferences in DBLP
Related-Key Cryptanalysis of the Full AES-192 and AES-256. [Citation Graph (, )][DBLP]
The Key-Dependent Attack on Block Ciphers. [Citation Graph (, )][DBLP]
Cascade Encryption Revisited. [Citation Graph (, )][DBLP]
Quantum-Secure Coin-Flipping and Applications. [Citation Graph (, )][DBLP]
On the Power of Two-Party Quantum Cryptography. [Citation Graph (, )][DBLP]
Security Bounds for the Design of Code-Based Cryptosystems. [Citation Graph (, )][DBLP]
Rebound Attack on the Full Lane Compression Function. [Citation Graph (, )][DBLP]
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. [Citation Graph (, )][DBLP]
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. [Citation Graph (, )][DBLP]
The Intel AES Instructions Set and the SHA-3 Candidates. [Citation Graph (, )][DBLP]
Group Encryption: Non-interactive Realization in the Standard Model. [Citation Graph (, )][DBLP]
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. [Citation Graph (, )][DBLP]
Hierarchical Predicate Encryption for Inner-Products. [Citation Graph (, )][DBLP]
Hedged Public-Key Encryption: How to Protect against Bad Randomness. [Citation Graph (, )][DBLP]
Secure Two-Party Computation Is Practical. [Citation Graph (, )][DBLP]
Secure Multi-party Computation Minimizing Online Rounds. [Citation Graph (, )][DBLP]
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. [Citation Graph (, )][DBLP]
Non-malleable Statistically Hiding Commitment from Any One-Way Function. [Citation Graph (, )][DBLP]
Proofs of Storage from Homomorphic Identification Protocols. [Citation Graph (, )][DBLP]
Simple Adaptive Oblivious Transfer without Random Oracle. [Citation Graph (, )][DBLP]
Improved Generic Algorithms for 3-Collisions. [Citation Graph (, )][DBLP]
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. [Citation Graph (, )][DBLP]
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! [Citation Graph (, )][DBLP]
On the Analysis of Cryptographic Assumptions in the Generic Ring Model. [Citation Graph (, )][DBLP]
Zero Knowledge in the Random Oracle Model, Revisited. [Citation Graph (, )][DBLP]
A Framework for Universally Composable Non-committing Blind Signatures. [Citation Graph (, )][DBLP]
Cryptanalysis of the Square Cryptosystems. [Citation Graph (, )][DBLP]
Factoring pq2 with Quadratic Forms: Nice Cryptanalyses. [Citation Graph (, )][DBLP]
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? [Citation Graph (, )][DBLP]
Security Notions and Generic Constructions for Client Puzzles. [Citation Graph (, )][DBLP]
Foundations of Non-malleable Hash and One-Way Functions. [Citation Graph (, )][DBLP]
Improved Cryptanalysis of Skein. [Citation Graph (, )][DBLP]
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. [Citation Graph (, )][DBLP]
Preimages for Step-Reduced SHA-2. [Citation Graph (, )][DBLP]
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. [Citation Graph (, )][DBLP]
Efficient Public Key Encryption Based on Ideal Lattices. [Citation Graph (, )][DBLP]
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. [Citation Graph (, )][DBLP]
PSS Is Secure against Random Fault Attacks. [Citation Graph (, )][DBLP]
Cache-Timing Template Attacks. [Citation Graph (, )][DBLP]
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]
Signature Schemes with Bounded Leakage Resilience. [Citation Graph (, )][DBLP]
|