The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for nonces with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1993-2002 (16) 2003-2007 (20) 2008-2019 (17) 2020-2023 (16) 2024 (1)
Publication types (Num. hits)
article(22) inproceedings(48)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 54 occurrences of 48 keywords

Results
Found 70 publication records. Showing 70 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
79Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo Using rhythmic nonces for puzzle-based DoS resistance. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security
69Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito Verification of Authentication Protocols Based on the Binding Relation. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
62Peter James Leadbitter, Nigel P. Smart Analysis of the Insecurity of ECMQV with Partially Known Nonces. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
62Ramaswamy Ramanujam, S. P. Suresh Tagging Makes Secrecy Decidable with Unbounded Nonces as Well. Search on Bibsonomy FSTTCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
55Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
55Jiazhe Chen, Mingjie Liu, Hexin Li, Hongsong Shi Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
52Erik Zenner Nonce Generators and the Nonce Reset Problem. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nonce Reset, Nonce Generator, Cryptography, Security Engineering, Nonce
50Phillip Rogaway Nonce-Based Symmetric Encryption. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Initialization vector, provable security, modes of operation, symmetric encryption, nonces
50Stephen Keung, Kai-Yeung Siu Efficient protocols secure against guessing and replay attacks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks
45Phong Q. Nguyen, Igor E. Shparlinski The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, distribution, lattices, elliptic curves, discrepancy, exponential sums, ECDSA, LLL, closest vector problem
45Phong Q. Nguyen, Igor E. Shparlinski The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Search on Bibsonomy J. Cryptol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Edwin El Mahassni, Phong Q. Nguyen, Igor E. Shparlinski The Insecurity of Nyberg-Rueppel and Other DSA-Like Signature Schemes with Partially Known Nonces. Search on Bibsonomy CaLC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Exponential Sums, DSA, Hidden Number Problem, Closest Vector Problem
35Mark Bickford Unguessable Atoms: A Logical Foundation for Security. Search on Bibsonomy VSTTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Hongjun Wu 0001, Bart Preneel Differential-Linear Attacks Against the Stream Cipher Phelix. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees
35Michele Bugliesi, Riccardo Focardi, Matteo Maffei Analysis of Typed Analyses of Authentication Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Jean Liénardy, Frédéric Lafitte A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Matteo Golinelli, Francesco Bonomi, Bruno Crispo The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Jean Liénardy, Frédéric Lafitte A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
28Dylan Rowe, Joachim Breitner, Nadia Heninger The curious case of the half-half Bitcoin ECDSA nonces. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
28Matteo Golinelli, Francesco Bonomi, Bruno Crispo The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Dylan Rowe, Joachim Breitner, Nadia Heninger The Curious Case of the Half-Half Bitcoin ECDSA Nonces. Search on Bibsonomy AFRICACRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Florian Euchner, Christian Senger PERIDOT Codes: Replacing Identifiers, Sequence Numbers and Nonces with Permutations. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Marios Adamoudis, Konstantinos A. Draziotis, Dimitrios Poulakis Attacking (EC)DSA With Partially Known Multiples of Nonces. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
28Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs Minerva: The curse of ECDSA nonces. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
28Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
28Vivek Arte, Mihir Bellare, Louiza Khati Incremental Cryptography Revisited: PRFs, Nonces and Modular Design. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
28Amber Sprenkels, Bas Westerbaan Don't throw your nonces out with the bathwater. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
28Sergey Agievich The CTR mode with encrypted nonces and its extension to AE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
28Jonas Nick, Tim Ruffing, Yannick Seurin, Pieter Wuille MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces. Search on Bibsonomy CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Vivek Arte, Mihir Bellare, Louiza Khati Incremental Cryptography Revisited: PRFs, Nonces and Modular Design. Search on Bibsonomy INDOCRYPT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Mihir Bellare, Ruth Ng, Björn Tackmann Nonces are Noticed: AEAD Revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
28Martin J. Tunnicliffe, Omego Obinna, Eckhard Pflügel Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Mihir Bellare, Ruth Ng, Björn Tackmann Nonces Are Noticed: AEAD Revisited. Search on Bibsonomy CRYPTO (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud Reusing Nonces in Schnorr Signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
28Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...). Search on Bibsonomy ESORICS (1) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Rémy Chrétien, Véronique Cortier, Stéphanie Delaune Decidability of Trace Equivalence for Protocols with Nonces. Search on Bibsonomy CSF The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Rémy Chrétien, Véronique Cortier, Stéphanie Delaune Checking Trace Equivalence: How to Get Rid of Nonces? Search on Bibsonomy ESORICS (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Yuval Yarom, Naomi Benger Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
28Mingjie Liu, Jiazhe Chen, Hexin Li Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Neil Spring, David Wetherall, David Ely Robust Explicit Congestion Notification (ECN) Signaling with Nonces. Search on Bibsonomy RFC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Peter James Leadbitter, Nigel P. Smart Cryptanalysis of MQV with partially known nonces. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
28Mihir Bellare, Phillip Rogaway Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28B. Clifford Neuman, Stuart G. Stubblebine A Note on the Use of Timestamps as Nonces. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
17Zhiyao Liang, Rakesh M. Verma Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF insecurity, Cryptographic protocols, secrecy, NP
17Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, Patrick Schaumont Physical unclonable function and true random number generator: a compact and scalable implementation. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ring oscillators (ro), trng, fpga, scalable, jitter, macro, puf
17Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer On the Security of the CCM Encryption Mode and of a Slight Variant. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCM, CBC-MAC, Counter mode
17Yuan Xue, Helmut Jürgensen, Reza Azarderakhsh, Arash Reyhani-Masoleh Key Management for Wireless Sensor Networks Using Trusted Neighbors. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Klaas Ole Kürtz, Ralf Küsters, Thomas Wilke Selecting theories and nonce generation for recursive protocols. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security protocols, decidability, automatic analysis
17Sibylle B. Fröschle The Insecurity Problem: Tackling Unbounded Data. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh Knowledge-based modelling of voting protocols. Search on Bibsonomy TARK The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Amit Mondal, Aleksandar Kuzmanovic A Poisoning-Resilient TCP Stack. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Somanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. Search on Bibsonomy PPDP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resolution strategies, verification, cryptographic protocols, horn clauses
17Hubert Comon-Lundh Intruder Theories (Ongoing Work). Search on Bibsonomy FoSSaCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Frédéric Muller Differential Attacks against the Helix Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic A Derivation System for Security Protocols and its Logical Formalization. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard The Insecurity of Esign in Practical Implementations. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Heba Kamal Aslan AUTHMAC_DH: A New Protocol for Authentication and Key Distribution. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Koji Hasebe, Mitsuhiro Okada A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Joshua D. Guttman Security Protocol Design via Authentication Tests. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Marco Bozzano, Giorgio Delzanno Automated protocol verification in linear logic. Search on Bibsonomy PPDP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model checking, linear logic, authentication protocols, bottom-up evaluation
17Andrew D. Gordon 0001, Alan Jeffrey Authenticity by Typing for Security Protocols. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Andrew D. Gordon 0001, Alan Jeffrey A Type and Effect Analysis of Security Protocols. Search on Bibsonomy SAS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Lawrence C. Paulson Inductive Analysis of the Internet Protocol TLS (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall Cryptanalytic Attacks on Pseudorandom Number Generators. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Azad Jiwa, Jennifer Seberry, Yuliang Zheng 0001 Beacon Based Authentication. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Term Index Beacon, Authentication, Network Security, Information Security, Security Protocol
17Darrell D. E. Long A Note on Bit-Mapped Free Sector Management. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #70 of 70 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license