Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
86 | Pierre Gérard, Olivier Sigaud |
Designing Efficient Exploration with MACS: Modules and Function Approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation - GECCO 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part II, pp. 1882-1893, 2003, Springer, 3-540-40603-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
73 | Kelvin Sim, Vivekanand Gopalkrishnan, Hon Nian Chua, See-Kiong Ng |
MACs: Multi-Attribute Co-clusters with High Correlation Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML/PKDD (2) ![In: Machine Learning and Knowledge Discovery in Databases, European Conference, ECML PKDD 2009, Bled, Slovenia, September 7-11, 2009, Proceedings, Part II, pp. 398-413, 2009, Springer, 978-3-642-04173-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Kazuhiko Minematsu, Yukiyasu Tsunoo |
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 226-241, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Differentially-uniform permutation, MAC, Block cipher, AES |
73 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild |
Threshold MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 237-252, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
67 | Michel Abdalla, Chanathip Namprempre, Gregory Neven |
On the (Im)possibility of Blind Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 262-279, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
blind MACs, provable security, blind signatures |
67 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 205-217, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
61 | Michael Semanko |
L-collision Attacks against Randomized MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 216-228, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
L-collision, MACs, randomness, message authentication codes, birthday attacks |
60 | Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu 0007 |
Towards Secure and Practical MACs for Body Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 182-198, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Albrecht Schmidt 0001 |
Engineering interactive ubiquitous computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EICS ![In: Proceedings of the 3rd ACM SIGCHI Symposium on Engineering Interactive Computing System, EICS 2011, Pisa, Italy, June 13-16, 2011, pp. 229-230, 2011, ACM, 978-1-4503-0670-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
53 | John Black, Martin Cochran |
MAC Reforgeability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 345-362, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Message Authentication Codes, Birthday Attacks |
53 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 173-186, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
51 | |
Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![ACM The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Marius Marin, Leon Moonen, Arie van Deursen |
An approach to aspect refactoring based on crosscutting concern types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 10:1-10:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Xiaoqing Wu, Barrett R. Bryant, Jeff Gray 0001, Marjan Mernik |
Pattern transformation for two-dimensional separation of concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 8:1-8:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Wesley Coelho, Gail C. Murphy |
ActiveAspect: presenting crosscutting structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 12:1-12:4, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Vladimir Jakobac, Nenad Medvidovic, Alexander Egyed |
Separating architectural concerns to ease program understanding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 7:1-7:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Martin P. Robillard, Gail C. Murphy |
Just-in-time concern modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 13:1-13:3, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Juri Memmert |
Concern patterns and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 16:1-16:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Mazen Saleh, Hassan Gomaa |
Separation of concerns in software product line engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 3:1-3:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | William H. Harrison, Harold Ossher, Stanley M. Sutton Jr., Peri L. Tarr |
Concern modeling in the concern manipulation environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 15:1-15:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Haitham S. Hamza |
Separation of concerns for evolving systems: a stability-driven approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 2:1-2:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Annie T. T. Ying, James L. Wright, Steven Abrams |
An exploration of how comments are used for marking related code fragments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 4:1-4:4, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Jing Zhang 0003, Jeff Gray 0001, Yuehua Lin |
A model-driven approach to enforce crosscutting assertion checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 9:1-9:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Robert R. Painter, David Coppit |
A model for software plans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 11:1-11:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Jing (Janet) Liu, Robyn R. Lutz, Jeffrey M. Thompson |
Mapping concern space to software architecture: a connector-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 14:1-14:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | David Shepherd, Lori L. Pollock, Tom Tourwé |
Using language clues to discover crosscutting concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 1:1-1:6, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | José Juan Pazos-Arias, Jorge García Duque, Martín López Nores |
Locating crosscutting concerns in the formal specification of distributed reactive systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 6:1-6:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Naoyasu Ubayashi, Tetsuo Tamai |
Concern management for constructing model compilers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MACS@ICSE ![In: Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005, pp. 5:1-5:5, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Fatiha Elghibari, Rachid Elouahbi, Fatima El Khoukhi, Layla Ezzahri, Labo Macs, Said Amali |
Intelligent model for measuring learners' satisfaction towards new contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITHET ![In: 15th International Conference on Information Technology Based Higher Education and Training, ITHET 2016, Istanbul, Turkey, September 8-10, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-0778-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Shweta Agrawal, Dan Boneh |
Homomorphic MACs: MAC-Based Integrity for Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 292-305, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 |
New Birthday Attacks on Some MACs Based on Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 209-230, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack |
46 | Kan Yasuda |
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 268-285, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension |
46 | Ueli M. Maurer, Johan Sjödin |
Single-Key AIL-MACs from Any FIL-MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp. 472-484, 2005, Springer, 3-540-27580-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
arbitrary-input-length (AIL), variable-input-length (VIL), fixed-input-length (FIL), Message authentication code (MAC) |
46 | Olivier Sigaud, Thierry Gourdin, Pierre-Henri Wuillemin |
Improving MACS Thanks to a Comparison with 2TBNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (2) ![In: Genetic and Evolutionary Computation - GECCO 2004, Genetic and Evolutionary Computation Conference, Seattle, WA, USA, June 26-30, 2004, Proceedings, Part II, pp. 810-823, 2004, Springer, 3-540-22343-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Jee Hea An, Mihir Bellare |
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 252-269, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
46 | Bart Preneel, Paul C. van Oorschot |
MDx-MAC and Building Fast MACs from Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 1-14, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
40 | Shengtian Yang, Yan Chen, Peiliang Qiu |
Linear-Codes-Based Lossless Joint Source-Channel Coding for Multiple-Access Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 55(4), pp. 1468-1486, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Junichi Hoshino, Katsutoki Hamana, Shiratori Kazuto, Atsushi Nakano |
Distributed Episode Control System for Interactive Narrative Entertainment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2009, 8th International Conference, Paris, France, September 3-5, 2009. Proceedings, pp. 145-156, 2009, Springer, 978-3-642-04051-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
narrative entertainment, massive action, episode tree, lifelike |
40 | Graciela Corral-Briones, Mario Rafael Hueda, Carmen E. Rodríguez |
Joint multiuser equalization and Group decoding for asynchronous trellis-coded multiple-access channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 54(3), pp. 445-452, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Anne Frenkel, Hamideh Afsarmanesh, Gert B. Eijkel, Louis O. Hertzberger |
Information Management for Material Science Applications in a Virtual Laboratory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 12th International Conference, DEXA 2001 Munich, Germany, September 3-5, 2001, Proceedings, pp. 165-174, 2001, Springer, 3-540-42527-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Shingo Sato, Shoichi Hirose, Junji Shikata |
Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 9(1), pp. 2-23, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Shingo Sato, Shoichi Hirose, Junji Shikata |
Generic Construction of Sequential Aggregate MACs from Any MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings, pp. 295-312, 2018, Springer, 978-3-030-01445-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
33 | Kan Yasuda |
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 242-259, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension |
33 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 349-361, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CBC, MAC, Distinguishing attack, Second preimage attack |
33 | Peng Wang 0009, Dengguo Feng, Changlu Lin, Wenling Wu |
Security of Truncated MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 96-114, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Robust unforgeability, Message authentication code, Universal hash function, Unforgeability, Unpredictability |
33 | Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi, Allen Clement |
Matrix Signatures: From MACs to Digital Signatures in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 22nd International Symposium, DISC 2008, Arcachon, France, September 22-24, 2008. Proceedings, pp. 16-31, 2008, Springer, 978-3-540-87778-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Yevgeniy Dodis, Krzysztof Pietrzak |
Improving the Security of MACs Via Randomized Message Preprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 414-433, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Martin P. Robillard |
Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-3, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
separation of concerns, software modeling, software analysis |
33 | Ueli M. Maurer, Johan Sjödin |
Domain Expansion of MACs: Alternative Uses of the FIL-MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 168-185, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
arbitrary-input-length (AIL), variable-input-length (VIL), fixed-input-length (FIL), Message authentication code (MAC) |
33 | Martin P. Robillard, Peri L. Tarr |
First international workshop on the modeling and analysis of concerns in software (MACS 2005). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 685, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
separation of concerns, software modeling, software analysis |
33 | Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway |
Improved Security Analyses for CBC MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 527-545, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Antoine Joux, Guillaume Poupard, Jacques Stern |
New Attacks against Standardized MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 170-181, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Karl Brincat, Chris J. Mitchell |
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, pp. 63-72, 2001, Springer, 3-540-43026-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
cryptographic API, cryptanalysis, Message Authentication Code |
33 | Mihir Bellare, Roch Guérin, Phillip Rogaway |
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 15-28, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
27 | Di Ma, Gene Tsudik |
A new approach to secure logging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Storage ![In: ACM Trans. Storage 5(1), pp. 2:1-2:21, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Secure logging, forward secure sequential aggregate (FssAgg) authentication, forward-secure stream integrity, MACs, signatures, truncation attack |
27 | Di Ma, Gene Tsudik |
A New Approach to Secure Logging. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 48-63, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secure logging, forward secure stream integrity, MACs, signatures, truncation attack |
27 | Yevgeniy Dodis, Prashant Puniya |
Feistel Networks Made Public, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 534-554, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network |
27 | Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Security Amplification for InteractiveCryptographic Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 128-145, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Rodrigo Martins da Silva, Nadia Nedjah, Luiza de Macedo Mourelle |
Reconfigurable MAC-Based Architecture for Parallel Hardware Implementation on FPGAs of Artificial Neural Networks Using Fractional Fixed Point Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (1) ![In: Artificial Neural Networks - ICANN 2009, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, Proceedings, Part I, pp. 475-484, 2009, Springer, 978-3-642-04273-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Yi Hong 0001, Emanuele Viterbo |
Algebraic multiuser space-time block codes for 2 × 2 MIMO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Abner Corrêa Barros, Victor Wanderley Costa de Medeiros, Viviane Lucy Santos de Souza, Paulo Sérgio Brandão do Nascimento, Ângelo Mazer, João Paulo Fernandes Barbosa, Bruno P. Neves, Ismael Santos 0001, Manoel Eusébio de Lima |
Implementation of a double-precision multiplier accumulator with exception treatment to a dense matrix multiplier module in FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 21st Annual Symposium on Integrated Circuits and Systems Design, SBCCI 2008, Gramado, Brazil, September 1-4, 2008, pp. 40-45, 2008, ACM, 978-1-60558-231-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
FPGA, scientific computing, floating-point, HPC |
27 | Jonathan M. Dixon, Ryan Thomas Sharpe |
Doing more with mini. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 36th Annual ACM SIGUCCS Conference on User Services 2008, Portland, OR, USA, October 19-22, 2008, pp. 253-256, 2008, ACM, 978-1-60558-074-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intel mac, parallels, virtualization |
27 | Ming Yang 0003, Zhou Kang, Lishan Kang |
A Parallel Multi-algorithm Solver for Dynamic Multi-Objective TSP (DMO-TSP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 164-173, 2008, Springer, 978-3-540-85983-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dynamic multi-objective TSP, parallel multi-algorithm, Pareto optimal front |
27 | Ananth Rao, Ion Stoica |
Adaptive Distributed Time-Slot Based Scheduling for Fairness in Multi-Hop Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 874-882, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Byung Hee Kim, Tae Ho Cho |
Efficient selection method of message authentication codes for filtering scheme in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2008, Suwon, Korea, January 31 - February 01, 2008, pp. 511-514, 2008, ACM, 978-1-59593-993-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fabricated report, sensor network, message authentication code |
27 | Jonathan Katz, Andrew Y. Lindell |
Aggregate Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 155-169, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 130-145, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Nadia Nedjah, Rodrigo Martins da Silva, Luiza de Macedo Mourelle, Marcus Vinícius Carvalho da Silva |
Reconfigurable MAC-Based Architecture for Parallel Hardware Implementation on FPGAs of Artificial Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks - ICANN 2008, 18th International Conference, Prague, Czech Republic, September 3-6, 2008, Proceedings, Part II, pp. 169-178, 2008, Springer, 978-3-540-87558-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ivana Maric, Roy D. Yates, Gerhard Kramer |
Capacity of Interference Channels With Partial Transmitter Cooperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 53(10), pp. 3536-3548, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Carol Currie Sobczak, James Kessler, David Eldridge |
The dual os classroom: if you build it, will they come? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services 2007, Orlando, Florida, USA, October 7-10, 2007, pp. 321-324, 2007, ACM, 978-1-59593-634-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
boot camp, deep freeze, intel dual core, winbatch, parallels, imaging, deployment, support, classroom technology |
27 | Gautam A. Gupta, Stavros Toumpis |
Power Allocation Over Parallel Gaussian Multiple Access and Broadcast Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 52(7), pp. 3274-3282, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yu Liu, Charles G. Boncelet Jr. |
The CRC-NTMAC for Noisy Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(4), pp. 517-523, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Qing Li 0034, Wade Trappe |
Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(2), pp. 190-204, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Md. Abdul Hamid, Mustafizur Rahman 0001, Choong Seon Hong |
Energy Conserving Security Mechanism for Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 866-875, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jens-Peter Kaps, Kaan Yüksel, Berk Sunar |
Energy Scalable Universal Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 54(12), pp. 1484-1495, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
scalability, low-power, provable security, low-energy, message authentication codes, Universal hashing |
27 | Fan Ye 0003, Haiyun Luo, Songwu Lu, Lixia Zhang 0001 |
Statistical en-route filtering of injected false data in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 23(4), pp. 839-850, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar |
Public Key Cryptography in Sensor Networks - Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, pp. 2-18, 2004, Springer, 3-540-24396-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Simon R. Blackburn, Kenneth G. Paterson |
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 446-453, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, MAC, Message authentication, matrix groups, birthday paradox |
27 | Marc Fischlin |
Progressive Verification: The Case of Message Authentication: (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 416-429, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | R. Luo, Demetrios Belis, R. M. Edwards 0001, Gordon A. Manson |
A simulation design for link connection-oriented wireless mesh networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN ![In: Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, MWCN 2002, September 9-11, 2002, Stockholm, Sweden, pp. 665-669, 2002, IEEE. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Karl Brincat, Chris J. Mitchell |
New CBC-MAC Forgery Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 3-14, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Rinku Rani Das, Rajalekshmi TR, Sruthi Pallathuvalappil, Alex Pappachen James |
FETs for Analog Neural MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 54019-54048, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Yusuke Naito 0001 |
The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings, pp. 51-77, 2024, Springer, 978-3-031-58867-9. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Yihan Zhang 0001 |
Zero-Error Communication Over Adversarial MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 69(7), pp. 4093-4127, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Gangadhar Karevvanavar, Rajshekhar V. Bhat |
Importance-Aware Fresh Delivery of Versions over Energy Harvesting MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.16143, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Soshi Shimada, Franziska Mueller 0001, Jan Bednarík, Bardia Doosti, Bernd Bickel, Danhang Tang, Vladislav Golyanik, Jonathan Taylor 0001, Christian Theobalt, Thabo Beeler |
MACS: Mass Conditioned 3D Hand and Object Motion Synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.14929, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Vitaly Kiryukhin |
About "k-bit security" of MACs based on hash function Streebog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1305, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser |
Putting the Online Phase on a Diet: Covert Security from Short MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 52, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao 0001 |
Quantum Attacks on Beyond-Birthday-Bound MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 25, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Carsten Baum, Nikolas Melissaris, Rahul Rachuri, Peter Scholl |
Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1548, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Yaobin Shen, François-Xavier Standaert, Lei Wang 0031 |
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1431, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Jiehui Nan, Honggang Hu, Ping Zhang 0020, Yiyuan Luo |
Quantum attacks against BBB secure PRFs or MACs built from public random permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 22(1), pp. 26, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yaobin Shen, François-Xavier Standaert, Lei Wang 0031 |
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (3) ![In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III, pp. 169-189, 2023, Springer, 978-981-99-8726-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Peihong Yuan, Ken R. Duffy, Muriel Médard |
Time-Shift Coding for Uncoordinated MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATINCOM ![In: IEEE Latin-American Conference on Communications, LATINCOM 2023, Panama City, Panama, November 15-17, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-2687-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser |
Putting the Online Phase on a Diet: Covert Security from Short MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2023 - Cryptographers' Track at the RSA Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings, pp. 360-386, 2023, Springer, 978-3-031-30871-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Melissa Chase, F. Betül Durak, Serge Vaudenay |
Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![In: Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II, pp. 418-449, 2023, Springer, 978-3-031-38544-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Gholamreza Ramezan, Manvir Schneider, Mel McCann |
MACS: A Multi-Asset Coin Selection Algorithm for UTXO-based Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain ![In: IEEE International Conference on Blockchain, Blockchain 2023, Danzhou, China, December 17-21, 2023, pp. 121-126, 2023, IEEE, 979-8-3503-1929-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Jörg Brauchle, Veronika Gstaiger, Seyed Majid Azimi, Manuel Muehlhaus, Florian Nikodem, Patrick Dern, Derek Griffith |
MACS-HAP: Design and Image Processing Features of the DLR HAP Camera System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGARSS ![In: IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2023, Pasadena, CA, USA, July 16-21, 2023, pp. 4804-4807, 2023, IEEE, 979-8-3503-2010-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Vasileios Asteriou, Anastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Georgios Papadimitriou 0001, Petros Nicopolitidis |
LoRaWAN-Based Adaptive MACs for Event Response Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 97465-97480, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Mehrasa Ahmadipour, Michèle A. Wigger, Mari Kobayashi |
Coding for Sensing: An Improved Scheme for Integrated Sensing and Communication over MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.00989, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|