Conferences in DBLP
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. [Citation Graph (, )][DBLP ] Distributed Attribute-Based Encryption. [Citation Graph (, )][DBLP ] Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. [Citation Graph (, )][DBLP ] Simple Algorithms for Computing a Sequence of 2-Isogenies. [Citation Graph (, )][DBLP ] Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. [Citation Graph (, )][DBLP ] Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images. [Citation Graph (, )][DBLP ] The Swiss-Knife RFID Distance Bounding Protocol. [Citation Graph (, )][DBLP ] Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. [Citation Graph (, )][DBLP ] Anonymous Fingerprinting for Predelivery of Contents. [Citation Graph (, )][DBLP ] Instruction Set Limitation in Support of Software Diversity. [Citation Graph (, )][DBLP ] Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. [Citation Graph (, )][DBLP ] How to Balance Privacy with Authenticity. [Citation Graph (, )][DBLP ] Efficient Vote Validity Check in Homomorphic Electronic Voting. [Citation Graph (, )][DBLP ] Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. [Citation Graph (, )][DBLP ] Novel PUF-Based Error Detection Methods in Finite State Machines. [Citation Graph (, )][DBLP ] Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. [Citation Graph (, )][DBLP ] A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. [Citation Graph (, )][DBLP ] Extended Models for Message Authentication. [Citation Graph (, )][DBLP ] A Preimage Attack for 52-Step HAS-160. [Citation Graph (, )][DBLP ] Essentially Optimal Universally Composable Oblivious Transfer. [Citation Graph (, )][DBLP ] Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. [Citation Graph (, )][DBLP ] Proving a Shuffle Using Representations of the Symmetric Group. [Citation Graph (, )][DBLP ] On Formal Verification of Arithmetic-Based Cryptographic Primitives. [Citation Graph (, )][DBLP ] A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. [Citation Graph (, )][DBLP ] Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. [Citation Graph (, )][DBLP ] Higher Order Differential Attacks on Reduced-Round MISTY1. [Citation Graph (, )][DBLP ]