The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2008 (conf/icisc/2008)


  1. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  2. Distributed Attribute-Based Encryption. [Citation Graph (, )][DBLP]


  3. Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. [Citation Graph (, )][DBLP]


  4. Simple Algorithms for Computing a Sequence of 2-Isogenies. [Citation Graph (, )][DBLP]


  5. Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. [Citation Graph (, )][DBLP]


  6. Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images. [Citation Graph (, )][DBLP]


  7. The Swiss-Knife RFID Distance Bounding Protocol. [Citation Graph (, )][DBLP]


  8. Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. [Citation Graph (, )][DBLP]


  9. Anonymous Fingerprinting for Predelivery of Contents. [Citation Graph (, )][DBLP]


  10. Instruction Set Limitation in Support of Software Diversity. [Citation Graph (, )][DBLP]


  11. Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. [Citation Graph (, )][DBLP]


  12. How to Balance Privacy with Authenticity. [Citation Graph (, )][DBLP]


  13. Efficient Vote Validity Check in Homomorphic Electronic Voting. [Citation Graph (, )][DBLP]


  14. Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. [Citation Graph (, )][DBLP]


  15. Novel PUF-Based Error Detection Methods in Finite State Machines. [Citation Graph (, )][DBLP]


  16. Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. [Citation Graph (, )][DBLP]


  17. A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. [Citation Graph (, )][DBLP]


  18. Extended Models for Message Authentication. [Citation Graph (, )][DBLP]


  19. A Preimage Attack for 52-Step HAS-160. [Citation Graph (, )][DBLP]


  20. Essentially Optimal Universally Composable Oblivious Transfer. [Citation Graph (, )][DBLP]


  21. Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. [Citation Graph (, )][DBLP]


  22. Proving a Shuffle Using Representations of the Symmetric Group. [Citation Graph (, )][DBLP]


  23. On Formal Verification of Arithmetic-Based Cryptographic Primitives. [Citation Graph (, )][DBLP]


  24. A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. [Citation Graph (, )][DBLP]


  25. Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. [Citation Graph (, )][DBLP]


  26. Higher Order Differential Attacks on Reduced-Round MISTY1. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002