The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Mycrypt"( http://dblp.L3S.de/Venues/Mycrypt )

URL (DBLP): http://dblp.uni-trier.de/db/conf/mycrypt

Publication years (Num. hits)
2005 (23) 2016 (30) 2017 (1)
Publication types (Num. hits)
inproceedings(52) proceedings(2)
Venues (Conferences, Journals, ...)
Mycrypt(54)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25 occurrences of 25 keywords

Results
Found 54 publication records. Showing 54 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Raphael C.-W. Phan, Moti Yung (eds.) Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers Search on Bibsonomy Mycrypt The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar 0001 Another Look at Tightness II: Practical Issues in Cryptography. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache Honey Encryption for Language - Robbing Shannon to Pay Turing? Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin A Virtual Wiretap Channel for Secure Message Transmission. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Herman Galteland, Kristian Gjøsteen Malware, Encryption, and Rerandomization - Everything Is Under Attack. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen 0001, Jianfeng Wang Protecting Electronic Signatures in Case of Key Leakage. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michal Kulis, Pawel Lorek, Filip Zagórski Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alfred Menezes, Palash Sarkar 0001, Shashank Singh 0001 Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yosuke Todo Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, Nan Yang 0010 Multi-prover Interactive Proofs: Unsound Foundations. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xavier Boyen The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture). Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marine Minier, Raphael C.-W. Phan Tuple Cryptanalysis: Slicing and Fusing Multisets. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ryo Nishimaki Watermarking Cryptographic Programs. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Subhabrata Samajder, Palash Sarkar 0001 A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow, Anthony Man-Cho So Another Look at Anonymous Communication - Security and Modular Constructions. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Neal Koblitz Time for a Paradigm Shift in Our Disciplinary Culture? Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Olivier Markowitch Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tyge Tiessen From Higher-Order Differentials to Polytopic Cryptyanalysis. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka Towards User-Friendly Cryptography. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines Key Recovery: Inert and Public. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Afonso Arriaga, Vincenzo Iovino, Qiang Tang 0001 Updatable Functional Encryption. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Emmanuel Volte, Valérie Nachef, Nicolas Marrière Improvements of Attacks on Various Feistel Schemes. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Herman Galteland, Stig Fr. Mjølsnes, Ruxandra F. Olimid Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Britta Hale, Christopher Carr, Danilo Gligoroski CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Houda Ferradi, Rémi Géraud, David Naccache Human Public-Key Encryption. Search on Bibsonomy Mycrypt The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ed Dawson, Serge Vaudenay (eds.) Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura On the Security of Probabilistic Multisignature Schemes and Their Optimality. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Optimal security, Provable security, Random oracle model, Multisignature, Aggregate signature
1Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002 Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-S128, Cobra-F64, Block Cipher, Related-Key Attack, Data-Dependent Permutation
1Raphael Chung-Wei Phan Advanced Slide Attacks Revisited: Realigning Slide on DES. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Raphael Overbeck A New Structural Attack for GPT and Variants. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rank distance codes, Gabidulin codes, public key cryptography, code based cryptography
1Frederik Armknecht, Gwénolé Ars Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mathieu Ciet, Francesco Sica 0001 An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu Identity Based Delegation Network. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Delegation network, bilinear pairings, proxy signature, identity-based cryptography, batch verification
1Katja Schmidt-Samoa, Tsuyoshi Takagi Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Simon Künzli 0002, Pascal Junod, Willi Meier Distinguishing Attacks on T-Functions. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF T-function, square mapping, statistical cryptanalysis, Stream cipher, distinguishing attack
1Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock On Session Key Construction in Provably-Secure Key Establishment Protocols. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan New Multiset Attacks on Rijndael with Large Blocks. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF higher-order multiset attacks, cryptanalysis, Rijndael
1Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack
1Hideki Imai Trends and Challenges for Securer Cryptography in Practice. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Adam L. Young, Moti Yung Questionable Encryption and Its Applications. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay Optimization of the MOVA Undeniable Signature Scheme. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF optimization, Undeniable signatures
1Arjen K. Lenstra, Benjamin M. M. de Weger Twin RSA. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Kim-Kwang Raymond Choo Security of Two-Party Identity-Based Key Agreement. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Christopher Wolf, Bart Preneel Equivalent Keys in HFE, C*, and Variations. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kristian Gjøsteen Homomorphic Cryptosystems Based on Subgroup Membership Problems. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF homomorphic cryptosystems, subgroup membership problem, public key encryption
1Aggelos Kiayias, Moti Yung Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kun Peng, Colin Boyd, Ed Dawson Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Daniel Augot, Matthieu Finiasz, Nicolas Sendrier A Family of Fast Syndrome Based Cryptographic Hash Functions. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #54 of 54 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license