|
Conferences in DBLP
(africacrypt) 2009 (conf/africacrypt/2009)
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. [Citation Graph (, )][DBLP]
Cryptanalysis of Vortex. [Citation Graph (, )][DBLP]
Two Passes of Tiger Are Not One-Way. [Citation Graph (, )][DBLP]
Generic Attacks on Feistel Networks with Internal Permutations. [Citation Graph (, )][DBLP]
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. [Citation Graph (, )][DBLP]
Reducing Key Length of the McEliece Cryptosystem. [Citation Graph (, )][DBLP]
Cryptanalysis of RSA Using the Ratio of the Primes. [Citation Graph (, )][DBLP]
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. [Citation Graph (, )][DBLP]
A Schnorr-Like Lightweight Identity-Based Signature Scheme. [Citation Graph (, )][DBLP]
On the Theoretical Gap between Group Signatures with and without Unlinkability. [Citation Graph (, )][DBLP]
Practical Threshold Signatures with Linear Secret Sharing Schemes. [Citation Graph (, )][DBLP]
Certified Encryption Revisited. [Citation Graph (, )][DBLP]
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. [Citation Graph (, )][DBLP]
Anonymity from Public Key Encryption to Undeniable Signatures. [Citation Graph (, )][DBLP]
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. [Citation Graph (, )][DBLP]
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. [Citation Graph (, )][DBLP]
Unifying Zero-Knowledge Proofs of Knowledge. [Citation Graph (, )][DBLP]
Co-sound Zero-Knowledge with Public Keys. [Citation Graph (, )][DBLP]
Another Look at Extended Private Information Retrieval Protocols. [Citation Graph (, )][DBLP]
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. [Citation Graph (, )][DBLP]
Exponent Recoding and Regular Exponentiation Algorithms. [Citation Graph (, )][DBLP]
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. [Citation Graph (, )][DBLP]
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. [Citation Graph (, )][DBLP]
On Modular Decomposition of Integers. [Citation Graph (, )][DBLP]
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. [Citation Graph (, )][DBLP]
An Improved Fault Based Attack of the Advanced Encryption Standard. [Citation Graph (, )][DBLP]
|