|
Conferences in DBLP
Storage Encryption: A Cryptographer's View. [Citation Graph (, )][DBLP]
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. [Citation Graph (, )][DBLP]
CLL: A Cryptographic Link Layer for Local Area Networks. [Citation Graph (, )][DBLP]
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. [Citation Graph (, )][DBLP]
Privacy Preserving Data Mining within Anonymous Credential Systems. [Citation Graph (, )][DBLP]
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. [Citation Graph (, )][DBLP]
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. [Citation Graph (, )][DBLP]
Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. [Citation Graph (, )][DBLP]
General Certificateless Encryption and Timed-Release Encryption. [Citation Graph (, )][DBLP]
Efficient Certificate-Based Encryption in the Standard Model. [Citation Graph (, )][DBLP]
An Improved Robust Fuzzy Extractor. [Citation Graph (, )][DBLP]
On Linear Secret Sharing for Connectivity in Directed Graphs. [Citation Graph (, )][DBLP]
Expressive Subgroup Signatures. [Citation Graph (, )][DBLP]
Anonymous Proxy Signatures. [Citation Graph (, )][DBLP]
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. [Citation Graph (, )][DBLP]
Using Normal Bases for Compact Hardware Implementations of the AES S-Box. [Citation Graph (, )][DBLP]
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. [Citation Graph (, )][DBLP]
Full Cryptanalysis of LPS and Morgenstern Hash Functions. [Citation Graph (, )][DBLP]
A New DPA Countermeasure Based on Permutation Tables. [Citation Graph (, )][DBLP]
Simplified Submission of Inputs to Protocols. [Citation Graph (, )][DBLP]
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited. [Citation Graph (, )][DBLP]
Linear Bandwidth Naccache-Stern Encryption. [Citation Graph (, )][DBLP]
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. [Citation Graph (, )][DBLP]
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]
New Anonymity Notions for Identity-Based Encryption. [Citation Graph (, )][DBLP]
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. [Citation Graph (, )][DBLP]
An Identity-Based Key Agreement Protocol for the Network Layer. [Citation Graph (, )][DBLP]
|