The SCEAS System
Navigation Menu

Conferences in DBLP

(africacrypt)
2009 (conf/africacrypt/2009)


  1. Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. [Citation Graph (, )][DBLP]


  2. Cryptanalysis of Vortex. [Citation Graph (, )][DBLP]


  3. Two Passes of Tiger Are Not One-Way. [Citation Graph (, )][DBLP]


  4. Generic Attacks on Feistel Networks with Internal Permutations. [Citation Graph (, )][DBLP]


  5. Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. [Citation Graph (, )][DBLP]


  6. Reducing Key Length of the McEliece Cryptosystem. [Citation Graph (, )][DBLP]


  7. Cryptanalysis of RSA Using the Ratio of the Primes. [Citation Graph (, )][DBLP]


  8. New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. [Citation Graph (, )][DBLP]


  9. A Schnorr-Like Lightweight Identity-Based Signature Scheme. [Citation Graph (, )][DBLP]


  10. On the Theoretical Gap between Group Signatures with and without Unlinkability. [Citation Graph (, )][DBLP]


  11. Practical Threshold Signatures with Linear Secret Sharing Schemes. [Citation Graph (, )][DBLP]


  12. Certified Encryption Revisited. [Citation Graph (, )][DBLP]


  13. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. [Citation Graph (, )][DBLP]


  14. Anonymity from Public Key Encryption to Undeniable Signatures. [Citation Graph (, )][DBLP]


  15. Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. [Citation Graph (, )][DBLP]


  16. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. [Citation Graph (, )][DBLP]


  17. Unifying Zero-Knowledge Proofs of Knowledge. [Citation Graph (, )][DBLP]


  18. Co-sound Zero-Knowledge with Public Keys. [Citation Graph (, )][DBLP]


  19. Another Look at Extended Private Information Retrieval Protocols. [Citation Graph (, )][DBLP]


  20. Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. [Citation Graph (, )][DBLP]


  21. Exponent Recoding and Regular Exponentiation Algorithms. [Citation Graph (, )][DBLP]


  22. Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. [Citation Graph (, )][DBLP]


  23. Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. [Citation Graph (, )][DBLP]


  24. On Modular Decomposition of Integers. [Citation Graph (, )][DBLP]


  25. Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. [Citation Graph (, )][DBLP]


  26. An Improved Fault Based Attack of the Advanced Encryption Standard. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002