The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AFRICACRYPT"( http://dblp.L3S.de/Venues/AFRICACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/africacrypt

Publication years (Num. hits)
2008 (28) 2009 (27) 2010 (26) 2011 (27) 2012 (27) 2013 (27) 2014 (28) 2016 (19) 2017-2018 (34) 2019 (23) 2020 (22) 2022 (26) 2023 (22)
Publication types (Num. hits)
inproceedings(322) proceedings(14)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 97 occurrences of 80 keywords

Results
Found 336 publication records. Showing 336 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mengce Zheng, Noboru Kunihiro, Honggang Hu Cryptanalysis of RSA Variants with Modified Euler Quotient. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Niels Samwel, Lejla Batina Practical Fault Injection on Deterministic Signatures: The Case of EdDSA. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Constanza Riera, Patrick Solé, Pantelimon Stanica A Complete Characterization of Plateaued Boolean Functions in Terms of Their Cayley Graphs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda, Junpei Yamaguchi, Michiko Ooka, Satoshi Nakamura 0004 Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Guillaume Bonnoron, Léo Ducas, Max Fillinger Large FHE Gates from Tensored Homomorphic Accumulator. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi (eds.) Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bertram Poettering Shorter Double-Authentication Preventing Signatures for Small Address Spaces. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Michel Seck, Nafissatou Diarra Unified Formulas for Some Deterministic Almost-Injective Encodings into Hyperelliptic Curves. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kaiyan Zheng, Peng Wang 0009, Dingfeng Ye Ubiquitous Weak-Key Classes of BRW-Polynomial Function. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Giulia Traverso, Denise Demirel, Johannes Buchmann 0001 Performing Computations on Hierarchically Shared Secrets. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ricardo Chaves, Lukasz Chmielewski, Francesco Regazzoni 0001, Lejla Batina SCA-Resistance for AES: How Cheap Can We Go? Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange 0001, Lorenz Panny HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jacques Patarin Two Simple Composition Theorems with H-coefficients. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Isheeta Nargis Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michel Seck, Hortense Boudjou, Nafissatou Diarra, Ahmed Youssef Ould Cheikh Khlil On Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Tolba, Ahmed Abdelkhalek 0001, Amr M. Youssef Impossible Differential Cryptanalysis of Reduced-Round SKINNY. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Meilof Veeningen Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Thalia M. Laing, Keith M. Martin Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marc Joye, Abderrahmane Nitaj (eds.) Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Saied Emam Mohamed, Albrecht Petzoldt RingRainbow - An Efficient Multivariate Ring Signature Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammad Eftekhari Cryptanalysis of Some Protocols Using Matrices over Group Rings. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Milena Djukanovic, Davide Bellizia, Giuseppe Scotti, Alessandro Trifiletti Multivariate Analysis Exploiting Static Power on Nanoscale CMOS Circuits for Cryptographic Applications. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tushar Kanti Saha, Takeshi Koshiba Private Conjunctive Query over Encrypted Data. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Haruhisa Kosuge, Hidema Tanaka Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmed Abdelkhalek 0001, Mohamed Tolba, Amr M. Youssef Impossible Differential Attack on Reduced Round SPARX-64/128. Search on Bibsonomy AFRICACRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sedat Akleylek, Nina Bindel, Johannes Buchmann 0001, Juliane Krämer, Giorgia Azzurra Marson An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Burak Gövem, Kimmo Järvinen 0001, Kris Aerts, Ingrid Verbauwhede, Nele Mentens A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Augustin P. Sarr, Philippe Elbaz-Vincent On the Security of the (F)HMQV Protocol. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Rasmus Winther Zakarias Fast Oblivious AES A Dedicated Application of the MiniMac Protocol. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Florian Göpfert, Rachel Player, Thomas Wunderer On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anja Becker 0001, Thijs Laarhoven Efficient (Ideal) Lattice Sieving Using Cross-Polytope LSH. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Magali Bardet, Vlad Dragoi, Jean-Gabriel Luque, Ayoub Otmani Weak Keys for the Quasi-Cyclic MDPC Public Key Encryption Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, Roch Lescuyer Software-Only Two-Factor Authentication Secure Against Active Servers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang 0001, Danilo Sijacic, Nele Mentens Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Clear, Ciaran McGoldrick Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Srinivasa Rao Subramanya Rao Three Dimensional Montgomery Ladder, Differential Point Tripling on Montgomery Curves and Point Quintupling on Weierstrass' and Edwards Curves. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1John Preuß Mattsson, Magnus Westerlund Authentication Key Recovery on Galois/Counter Mode (GCM). Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia 0005 Non-Interactive Verifiable Secret Sharing for Monotone Circuits. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shahram Rasoolzadeh, Håvard Raddum Cryptanalysis of PRINCE with Minimal Data. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sumanta Sarkar, Siang Meng Sim A Deeper Understanding of the XOR Count Distribution in the Context of Lightweight Cryptography. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi (eds.) Progress in Cryptology - AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sourav Das, Willi Meier Differential Biases in Reduced-Round Keccak. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Özgür Dagdelen, Daniele Venturi 0001 A Second Look at Fischlin's Transformation. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhe Liu 0001, Johann Großschädl New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Julien Devigne, Eleonora Guerrini, Fabien Laguillaumie Proxy Re-Encryption Scheme Supporting a Selection of Delegatees. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Clear, Hitesh Tewari, Ciaran McGoldrick Anonymous IBE from Quadratic Residuosity with Improved Performance. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tancrède Lepoint, Michael Naehrig A Comparison of the Homomorphic Encryption Schemes FV and YASHE. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liqiang Peng, Lei Hu, Jun Xu 0022, Zhangjie Huang, Yonghong Xie Further Improvement of Factoring RSA Moduli with Implicit Hint. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Long Wen, Meiqin Wang, Andrey Bogdanov Multidimensional Zero-Correlation Linear Cryptanalysis of E2. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay DRECON: DPA Resistant Encryption by Construction. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel 0001 Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paul Bottinelli, Reza Reyhanitabar, Serge Vaudenay Breaking the IOC Authenticated Encryption Mode. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert Efficient Masked S-Boxes Processing - A Step Forward -. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann, Marc Stöttinger Minimizing S-Boxes in Hardware by Utilizing Linear Transformations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Basel Alomair Universal Hash-Function Families: From Hashing to Authentication. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lin Ding 0001, Chenhui Jin, Jie Guan, Chuanda Qi New Treatment of the BSW Sampling and Its Applications to Stream Ciphers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David Pointcheval, Damien Vergnaud (eds.) Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Afonso Arriaga, Qiang Tang 0001, Peter Y. A. Ryan Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Philippe Gaborit, Olivier Ruatta, Julien Schrek, Gilles Zémor New Results for Rank-Based Cryptography. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Riham AlTawy, Amr M. Youssef Preimage Attacks on Reduced-Round Stribog. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Le Trieu Phong Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski, Maciej Zdanowicz Position-Based Cryptography from Noisy Channels. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen A More Efficient AES Threshold Implementation. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christophe Tran Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic Nets. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rachid El Bansarkhani, Johannes Buchmann 0001 Towards Lattice Based Aggregate Signatures. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, Hatem M. Bahig New Attacks on the RSA Cryptosystem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Y. Sreenivasa Rao, Ratna Dutta Expressive Attribute Based Signcryption with Constant-Size Ciphertext. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Staamann An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kun Peng, Li Yi Studying a Range Proof Technique - Exception and Optimisation. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Yu 0008, Kunpeng Wang, Bao Li 0001, Song Tian Triple-Base Number System for Scalar Multiplication. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Goutam Paul 0001, Santanu Sarkar 0001, Michael Lehmann, Willi Meier New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Louis Goubin, Ange Martinelli, Matthieu Walle Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Isheeta Nargis, Payman Mohassel, Wayne Eberly Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Gstir, Martin Schläffer Fast Software Encryption Attacks on AES. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ayesha Khalid, Goutam Paul 0001, Anupam Chattopadhyay New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexandre Duc, Serge Vaudenay HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Utsab Bose, Anup Kumar Bhattacharya, Abhijit Das 0004 GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Macchetti Cryptanalysis of AES and Camellia with Related S-boxes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andreas Hülsing W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Schneider 0002 Sieving for Shortest Vectors in Ideal Lattices. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Clear, Arthur Hughes, Hitesh Tewari Homomorphic Encryption with Access Policies: Characterization and New Constructions. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Hutter, Peter Schwabe NaCl on 8-Bit AVR Microcontrollers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amr M. Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien (eds.) Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kun Peng Modification and Optimisation of an ElGamal-Based PVSS Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fabian van den Broek, Erik Poll A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Yu 0008, Kunpeng Wang, Bao Li 0001, Song Tian On the Expansion Length Of Triple-Base Number Systems. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Duong Hieu Phan, Viet Cuong Trinh Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abderrahmane Nitaj An Attack on RSA Using LSBs of Multiples of the Prime Factors. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kishan Chand Gupta, Indranil Ghosh Ray On Constructions of Involutory MDS Matrices. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade 0001 Brandt's Fully Private Auction Protocol Revisited. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hassan Aly, Mohammed ElGayyar Attacking AES Using Bernstein's Attack on Modern Processors. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 336 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license