|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25 occurrences of 25 keywords
|
|
|
Results
Found 54 publication records. Showing 54 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Raphael C.-W. Phan, Moti Yung (eds.) |
Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![Springer, 978-3-319-61272-0 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone |
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 193-211, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar 0001 |
Another Look at Tightness II: Practical Issues in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 21-55, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache |
Honey Encryption for Language - Robbing Shannon to Pay Turing? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 127-144, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois |
Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 506-520, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin |
A Virtual Wiretap Channel for Secure Message Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 171-192, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Herman Galteland, Kristian Gjøsteen |
Malware, Encryption, and Rerandomization - Everything Is Under Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 233-251, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Miroslaw Kutylowski, Jacek Cichon, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen 0001, Jianfeng Wang |
Protecting Electronic Signatures in Case of Key Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 252-274, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michal Kulis, Pawel Lorek, Filip Zagórski |
Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 145-167, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alfred Menezes, Palash Sarkar 0001, Shashank Singh 0001 |
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 83-108, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski |
Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 215-232, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yosuke Todo |
Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 553-571, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Claude Crépeau, Nan Yang 0010 |
Multi-prover Interactive Proofs: Unsound Foundations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 485-493, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer |
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 364-388, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 3-10, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marine Minier, Raphael C.-W. Phan |
Tuple Cryptanalysis: Slicing and Fusing Multisets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 294-320, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka |
One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 436-460, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Nishimaki |
Watermarking Cryptographic Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 521-543, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Subhabrata Samajder, Palash Sarkar 0001 |
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 277-293, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow, Anthony Man-Cho So |
Another Look at Anonymous Communication - Security and Modular Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 56-82, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Neal Koblitz |
Time for a Paradigm Shift in Our Disciplinary Culture? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 11-18, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Veronika Kuchta, Olivier Markowitch |
Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 409-435, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tyge Tiessen |
From Higher-Order Differentials to Polytopic Cryptyanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 544-552, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka |
Towards User-Friendly Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 481-484, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines |
Key Recovery: Inert and Public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 111-126, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Afonso Arriaga, Vincenzo Iovino, Qiang Tang 0001 |
Updatable Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 347-363, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Volte, Valérie Nachef, Nicolas Marrière |
Improvements of Attacks on Various Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 321-344, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng |
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 474-477, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Herman Galteland, Stig Fr. Mjølsnes, Ruxandra F. Olimid |
Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 463-473, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Britta Hale, Christopher Carr, Danilo Gligoroski |
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 389-408, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Houda Ferradi, Rémi Géraud, David Naccache |
Human Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers, pp. 494-505, 2016, Springer, 978-3-319-61272-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ed Dawson, Serge Vaudenay (eds.) |
Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![Springer, 3-540-28938-0 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura |
On the Security of Probabilistic Multisignature Schemes and Their Optimality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 132-150, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Optimal security, Provable security, Random oracle model, Multisignature, Aggregate signature |
1 | Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002 |
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 244-262, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cobra-S128, Cobra-F64, Block Cipher, Related-Key Attack, Data-Dependent Permutation |
1 | Raphael Chung-Wei Phan |
Advanced Slide Attacks Revisited: Realigning Slide on DES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 263-276, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Overbeck |
A New Structural Attack for GPT and Variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 50-63, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
rank distance codes, Gabidulin codes, public key cryptography, code based cryptography |
1 | Frederik Armknecht, Gwénolé Ars |
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 16-32, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Ciet, Francesco Sica 0001 |
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 171-182, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Delegation Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 99-115, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Delegation network, bilinear pairings, proxy signature, identity-based cryptography, batch verification |
1 | Katja Schmidt-Samoa, Tsuyoshi Takagi |
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 296-313, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Simon Künzli 0002, Pascal Junod, Willi Meier |
Distinguishing Attacks on T-Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 2-15, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
T-function, square mapping, statistical cryptanalysis, Stream cipher, distinguishing attack |
1 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
On Session Key Construction in Provably-Secure Key Establishment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 116-131, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan |
New Multiset Attacks on Rijndael with Large Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 277-295, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
higher-order multiset attacks, cryptanalysis, Rijndael |
1 | Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha |
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 183-195, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack |
1 | Hideki Imai |
Trends and Challenges for Securer Cryptography in Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 1, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Adam L. Young, Moti Yung |
Questionable Encryption and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 210-221, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay |
Optimization of the MOVA Undeniable Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 196-209, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
optimization, Undeniable signatures |
1 | Arjen K. Lenstra, Benjamin M. M. de Weger |
Twin RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 222-228, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Kim-Kwang Raymond Choo |
Security of Two-Party Identity-Based Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 229-243, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Wolf, Bart Preneel |
Equivalent Keys in HFE, C*, and Variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 33-49, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Gjøsteen |
Homomorphic Cryptosystems Based on Subgroup Membership Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 314-327, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
homomorphic cryptosystems, subgroup membership problem, public key encryption |
1 | Aggelos Kiayias, Moti Yung |
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 151-170, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Colin Boyd, Ed Dawson |
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 84-98, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Augot, Matthieu Finiasz, Nicolas Sendrier |
A Family of Fast Syndrome Based Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 64-83, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #54 of 54 (100 per page; Change: )
|
|