Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
93 | Jolyon Clulow |
On the Security of PKCS#11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 411-425, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
85 | Vlastimil Klíma, Tomás Rosa |
Further Results and Considerations on Side Channel Attacks on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 244-259, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
85 | Celeste Campo, Andrés Marín López, Arturo García, Ignacio Díaz, Peter T. Breuer, Carlos Delgado Kloos, Carlos García |
JCCM: Flexible Certificates for Smartcards with Java Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-smart ![In: Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, pp. 34-42, 2001, Springer, 3-540-42610-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
84 | James Manger |
A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 230-238, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
PKCS, RSA, chosen ciphertext attack, OAEP |
84 | Daniel Bleichenbacher |
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 1-12, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
PKCS, RSA, SSL, chosen ciphertext attack |
76 | Sanghoon Song, Taekyoung Kwon 0002, Ki Song Yoon |
Practical Security Improvement of PKCS#5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2003, 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings, pp. 869-876, 2003, Springer, 3-540-20409-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
68 | Yuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai |
Similar Keys of Multivariate Quadratic Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 211-222, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
MQ, similar key, digital signature, public key cryptosystem, multivariate |
59 | Adam L. Young, Moti Yung |
A Key Recovery System as Secure as Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 129-142, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Rabin, Blum integer, pseudosquare, PKCS #1, standard compatibility, RSA, public key cryptography, zero-knowledge, chosen ciphertext security, key recovery, semantic Security, quadratic residue |
59 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 264-276, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
59 | Sibylle B. Fröschle, Graham Steel |
Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARSPA-WITS ![In: Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers, pp. 92-106, 2009, Springer, 978-3-642-03458-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 383-397, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
42 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 97-115, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
42 | Stéphanie Delaune, Steve Kremer, Graham Steel |
Formal Analysis of PKCS#11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 331-344, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PKCS11, Key management, Security API |
42 | Kun-Won Jang, Junho Choun, Myung-Hee Kim, Moon-Seog Jun |
Design and Verification of Security API Structure Based on PKCS #11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 165, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
New Attacks on PKCS#1 v1.5 Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 369-381, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen |
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 73-88, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, embedded system, efficient implementation, motes, digital signature schemes, Multivariate public-key cryptosystem |
34 | Frances F. Yao, Yiqun Lisa Yin |
Design and Analysis of Password-Based Key Derivation Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 51(9), pp. 3292-3297, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Frances F. Yao, Yiqun Lisa Yin |
Design and Analysis of Password-Based Key Derivation Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 245-261, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen |
TTS: High-Speed Signatures on a Low-Cost Smart Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 371-385, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
8051, smart card, finite field, Multivariate public-key cryptosystem |
34 | Vlastimil Klíma, Ondrej Pokorný, Tomás Rosa |
Attacking RSA-Based Sessions in SSL/TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 426-440, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Ingrid Biehl, Tsuyoshi Takagi |
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 1-16, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Distributed RSA, quadratic fields, parallel computation, primality test |
34 | Shimon Even, Yacov Yacobi |
Cryptocomplexity and NP-Completeness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 7th Colloquium, Noordweijkerhout, The Netherlands, July 14-18, 1980, Proceedings, pp. 195-207, 1980, Springer, 3-540-10003-2. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
|
25 | Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert |
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 156-171, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
generalized El Gamal signatures, LFSR-based PKCs, DSR, secure routing, multisignatures, small-world graphs, PGP |
25 | Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka |
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 54-72, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Bleichenbacher’s forgery attack, RSASSA-PKCS-v1_5, time-stamp forgery, Acrobat, Acrobat Reader |
25 | Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert |
Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 607-613, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multicast acknowledgements, authenticated feedback, Ack implosion, generalized El-Gamal signatures, LFSR-based PKCs, multisignatures |
25 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(3), pp. 177-185, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
25 | Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 138-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform |
25 | Falko Strenzke |
ForgedAttributes: An Existential Forgery Vulnerability of CMS and PKCS#7 Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1801, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
25 | Moosa Yahyazadeh, Sze Yiu Chau, Li Li, Man Hong Hue, Joyanta Debnath, Sheung Chiu Ip, Chun Ngai Li, Md. Endadul Hoque, Omar Chowdhury |
Morpheus: Bringing The (PKCS) One To Meet the Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pp. 2474-2496, 2021, ACM, 978-1-4503-8454-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes 0001 |
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 462, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes 0001 |
How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 32nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, June 25-28, 2019, pp. 62-77, 2019, IEEE, 978-1-7281-1407-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li |
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019, 2019, The Internet Society, 1-891562-55-X. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Sean Leonard |
The PKCS #8 EncryptedPrivateKeyInfo Media Type. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8351, pp. 1-7, June 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Nikos Mavrogiannopoulos |
Storing Validation Parameters in PKCS#8. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8479, pp. 1-8, September 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Tibor Jager, Saqib A. Kakvi, Alexander May 0001 |
On the Security of the PKCS#1 v1.5 Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 855, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Tibor Jager, Saqib A. Kakvi, Alexander May 0001 |
On the Security of the PKCS#1 v1.5 Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pp. 1195-1208, 2018, ACM, 978-1-4503-5693-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Iulian Aciobanitei, Lorena Leahu, Mihai Pura |
A PKCS#11 Driver for Cryptography in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, June 28-30, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-4901-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Kathleen M. Moriarty, Burt Kaliski, Andreas Rusch |
PKCS #5: Password-Based Cryptography Specification Version 2.1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8018, pp. 1-40, January 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Ryan Stanley-Oakes |
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 134, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Ryan Stanley-Oakes |
A Provably Secure PKCS#11 Configuration Without Authenticated Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers, pp. 145-162, 2017, Springer, 978-3-319-70971-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Kathleen M. Moriarty, Burt Kaliski, Jakob Jonsson, Andreas Rusch |
PKCS #1: RSA Cryptography Specifications Version 2.2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8017, pp. 1-78, November 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel |
APDU-Level Attacks in PKCS#11 Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings, pp. 97-117, 2016, Springer, 978-3-319-45718-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Jan Pechanec, Darren J. Moffat |
The PKCS #11 URI Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7512, pp. 1-20, April 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Simon Josefsson, Sean Leonard |
Textual Encodings of PKIX, PKCS, and CMS Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7468, pp. 1-20, April 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Ryad Benadjila, Thomas Calderon 0002, Marion Daubignard |
CamlCrush: A PKCS\#11 Filtering Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 63, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
25 | Tibor Jager, Jörg Schwenk, Juraj Somorovsky |
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pp. 1185-1196, 2015, ACM, 978-1-4503-3832-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Robert Künnemann |
Automated Backward Analysis of PKCS#11 v2.20. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, pp. 219-238, 2015, Springer, 978-3-662-46665-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Antonio González-Burgueño, Sonia Santiago, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 |
Analysis of the PKCS#11 API Using the Maude-NPA Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSR ![In: Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings, pp. 86-106, 2015, Springer, 978-3-319-27151-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Kathleen M. Moriarty, Magnus Nyström, Sean Parkinson, Andreas Rusch, Michael Scott |
PKCS #12: Personal Information Exchange Syntax v1.1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7292, pp. 1-29, July 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Ryad Benadjila, Thomas Calderon 0002, Marion Daubignard |
Caml Crush: A PKCS#11 Filtering Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers, pp. 173-192, 2014, Springer, 978-3-319-16762-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Steffen Lindert, Phoebe L. Stewart, Jens Meiler |
Computational determination of the orientation of a heat repeat-like domain of DNA-PKcs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Biol. Chem. ![In: Comput. Biol. Chem. 42, pp. 1-4, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio |
Type-based analysis of key management in PKCS#11 cryptographic devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 21(6), pp. 971-1007, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Zhi-Chun Li, Chunxiao Zhang |
Digital Rights Management System Based on PKCS#12. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013, Beijing, China, October 16-18, 2013, pp. 634-637, 2013, IEEE, 978-0-7695-5120-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Si Gao, Hua Chen 0011, Limin Fan |
Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 39-56, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Yongge Wang |
Public Key Cryptography Standards: PKCS ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1207.5446, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
25 | Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio |
Type-Based Analysis of PKCS#11 Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings, pp. 349-368, 2012, Springer, 978-3-642-28640-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Tibor Jager, Sebastian Schinzel, Juraj Somorovsky |
Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 752-769, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Peter Landrock, Danny De Cock |
PKCS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 934-935, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Simon Josefsson |
PKCS #5: Password-Based Key Derivation Function 2 (PBKDF2) Test Vectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6070, pp. 1-5, January 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | John Manuel Delgado Barroso, Luis Joyanes Aguilar, Pablo García Gundín, Jayguer Vasquezr |
An Approach to the Integration of Cryptographic Services in the Cloud Computing Supported on a Standard Interfaces to the Execution of Cryptographic Processes on Demand. Study Case: Key Management Protocol Interoperability vs. RSA PKCS # 11 Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEIS ![In: Digital Enterprise and Information Systems - International Conference, DEIS 2011, London, UK, July 20 - 22, 2011. Proceedings, pp. 691-702, 2011, Springer, 978-3-642-22602-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Sibylle B. Fröschle, Nils Sommer |
Concepts and Proofs for Configuring PKCS#11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers, pp. 131-147, 2011, Springer, 978-3-642-29419-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud |
On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 135, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
25 | Stéphanie Delaune, Steve Kremer, Graham Steel |
Formal security analysis of PKCS#11 and proprietary extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 18(6), pp. 1211-1245, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Matteo Bortolozzo, Matteo Centenaro, Riccardo Focardi, Graham Steel |
Attacking and fixing PKCS#11 security tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pp. 260-269, 2010, ACM, 978-1-4503-0245-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud |
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings, pp. 1-18, 2010, 978-3-642-13707-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Andrea Falcone, Riccardo Focardi |
Formal Analysis of Key Integrity in PKCS#11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARSPA-WITS ![In: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers, pp. 77-94, 2010, Springer, 978-3-642-16073-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Sibylle B. Fröschle, Nils Sommer |
Reasoning with Past to Prove PKCS#11 Keys Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers, pp. 96-110, 2010, Springer, 978-3-642-19750-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang |
SSE Implementation of Multivariate PKCs on Modern x86 CPUs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 33-48, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multivariate public key cryptosystem (MPKC), ?IC, vector instructions, SSSE3, Wiedemann, TTS, rainbow, SSE2 |
25 | Burt Kaliski |
Public-Key Cryptography Standards (PKCS) #8: Private-Key Information Syntax Specification Version 1.2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5208, pp. 1-8, May 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Li, Bo-Yin Yang |
Small Odd Prime Field Multivariate PKCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 498, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang |
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, pp. 95-108, 2008, Springer, 978-3-540-88402-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Gröbner basis, multivariate public key cryptosystem |
25 | Ulrich Kühn 0001, Andrei Pyshkin, Erik Tews, Ralf-Philipp Weinmann |
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss., pp. 97-109, 2008, GI, 978-3-88579-222-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Saeid Saryazdi, Mohamed Cheriet |
PKCS: A Polynomial Kernel Family With Compact Support for Scale- Space Image Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 16(9), pp. 2299-2308, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Ulrich Kühn 0001 |
Aktuelle Entwicklungen bei RSA-Signaturen - Implementierungsfehler beim PKCS#1-Padding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 30(12), pp. 763-767, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Peter Landrock |
PKCS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Bo-Yin Yang, Jiun-Ming Chen |
TTS: Rank Attacks in Tame-Like Multivariate PKCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 61, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
25 | Jakob Jonsson, Burt Kaliski |
Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3447, pp. 1-72, February 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Vlastimil Klíma, Tomás Rosa |
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 98, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
25 | Don Davis |
Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Annual Technical Conference, General Track ![In: Proceedings of the General Track: 2001 USENIX Annual Technical Conference, June 25-30, 2001, Boston, Massachusetts, USA, pp. 65-78, 2001, USENIX, 1-880446-09-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
25 | Burt Kaliski |
PKCS #5: Password-Based Cryptography Specification Version 2.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2898, pp. 1-34, September 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Magnus Nyström, Burt Kaliski |
PKCS #9: Selected Object Classes and Attribute Types Version 2.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2985, pp. 1-42, November 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Magnus Nyström, Burt Kaliski |
PKCS #10: Certification Request Syntax Specification Version 1.7. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2986, pp. 1-14, November 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Magnus Nyström |
PKCS#15 - A Cryptographic Token Information Format Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Smartcard ![In: Proceedings of the 1st Workshop on Smartcard Technology, Smartcard 1999, Chicago, Illinois, USA, May 10-11, 1999, 1999, USENIX Association. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
25 | Abdellatif Errami, Dong Ming He, Anna A. Friedl, Wilhelmina J. I. Overkamp, Bruno Morolli, Eric A. Hendrickson, Friederike Eckardt-Schupp, Mitsuo Oshimura, Paul H. M. Lohman, Stephen P. Jackson, Malgorzata Z. Zdzienicka |
XR-C1, a new CHO cell mutant which is defective in DNA-PKcs, is impaired in both V(D)J coding and signal joint formation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nucleic Acids Res. ![In: Nucleic Acids Res. 26(13), pp. 3146-3153, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Burt Kaliski, Jessica Staddon |
PKCS #1: RSA Cryptography Specifications Version 2.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2437, pp. 1-39, October 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Burt Kaliski |
PKCS #1: RSA Encryption Version 1.5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2313, pp. 1-19, March 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Burt Kaliski |
PKCS #7: Cryptographic Message Syntax Version 1.5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2315, pp. 1-32, March 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Burt Kaliski |
PKCS #10: Certification Request Syntax Version 1.5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2314, pp. 1-8, March 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Klaus Gaarder, Einar Snekkenes |
On The Formal Analysis of PKCS Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUSCRYPT ![In: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings, pp. 106-121, 1990, Springer, 3-540-53000-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Alexandra Boldyreva |
Strengthening Security of RSA-OAEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 399-413, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Gaëtan Leurent, Phong Q. Nguyen |
How Risky Is the Random-Oracle Model? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 445-464, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yoginder S. Dandass |
Using FPGAs to Parallelize Dictionary Attacks for Password Cracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 485, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Daniel Díaz Sánchez, Andrés Marín López, Florina Almenárez Mendoza |
A Smart Card Solution for Access Control and Trust Management for Nomadic Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 62-77, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai |
A "Medium-Field" Multivariate Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 132-149, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Adam L. Young, Moti Yung |
Hiding Information Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 161-171, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jan Jürjens |
Verification of low-level crypto-protocol implementations using automated theorem proving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MEMOCODE ![In: 3rd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2005), 11-14 July 2005, Verona, Italy, Proceedings, pp. 89-98, 2005, IEEE Computer Society, 0-7803-9227-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk |
Secure XMaiL or How to Get Rid of Legacy Code in Secure E-Mail Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 291-300, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 344-353, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
17 | Bo-Yin Yang, Jiun-Ming Chen |
Theoretical Analysis of XL over Small Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 277-288, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli |
Biometrics to Enhance Smartcard Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 324-332, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|