The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CRYPTO"( http://dblp.L3S.de/Venues/CRYPTO )

URL (DBLP): http://dblp.uni-trier.de/db/conf/crypto

Publication years (Num. hits)
1981 (40) 1982 (36) 1983 (30) 1984 (41) 1985 (45) 1986 (37) 1987 (44) 1988 (44) 1989 (60) 1990 (49) 1991 (39) 1992 (44) 1993 (41) 1994 (40) 1995 (37) 1996 (31) 1997 (38) 1998 (36) 1999 (40) 2000 (34) 2001 (34) 2002 (40) 2003 (37) 2004 (35) 2005 (34) 2006 (37) 2007 (35) 2008 (33) 2009 (40) 2010 (40) 2011 (44) 2012 (51)
Publication types (Num. hits)
inproceedings(1234) proceedings(32)
Venues (Conferences, Journals, ...)
CRYPTO(1266)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 559 occurrences of 325 keywords

Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Craig Gentry Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky Password-Authenticated Session-Key Generation on the Internet in the Plain Model. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Orr Dunkelman, Nathan Keller, Adi Shamir A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chris Peikert An Efficient and Parallel Gaussian Sampler for Lattices. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hemanta K. Maji, Manoj Prabhakaran 0001, Mike Rosulek A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto, Katsuyuki Takashima Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Eyal Kushilevitz, Anat Paskin Secure Multiparty Computation with Minimal Interaction. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Nathalie Casati, Thomas Gross 0001, Victor Shoup Credential Authenticated Identification and Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Niek J. Bouman, Serge Fehr Sampling in a Quantum Population, and Applications. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chongwon Cho, Chen-Kuei Lee, Rafail Ostrovsky Equivalence of Uniform Key Agreement and Composition Insecurity. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shafi Goldwasser, Guy N. Rothblum Securing Computation against Continuous Leakage. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Craig Gentry, Bryan Parno Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Carlos Aguilar Melchor, Philippe Gaborit, Javier Herranz Additively Homomorphic Encryption with d-Operand Multiplications. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hugo Krawczyk Cryptographic Extraction and Key Derivation: The HKDF Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anindya De, Luca Trevisan, Madhur Tulsiani Time Space Tradeoffs for Attacks against One-Way Functions and PRGs. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Shafi Goldwasser Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back). Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, Mehdi Tibouchi Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hoeteck Wee Efficient Chosen-Ciphertext Security via Extractable Hash Proofs. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Tzachy Reinman Oblivious RAM Revisited. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kai-Min Chung, Yael Tauman Kalai, Salil P. Vadhan Improved Delegation of Computation Using Fully Homomorphic Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Claudio Orlandi Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Severin Winkler, Jürg Wullschleger On the Efficiency of Classical and Quantum Oblivious Transfer Reductions. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dominique Unruh, Jörn Müller-Quade Universally Composable Incoercibility. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ali Juma, Yevgeniy Vahlis Protecting Cryptographic Keys against Continual Leakage. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Huijia Lin, Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam Concurrent Non-Malleable Zero Knowledge Proofs. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wilko Henecka, Alexander May 0001, Alexander Meurer Correcting Errors in RSA Private Keys. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo Structure-Preserving Signatures and Commitments to Group Elements. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, Paul Zimmermann Factorization of a 768-Bit RSA Modulus. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shweta Agrawal, Dan Boneh, Xavier Boyen Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thomas Peyrin Improved Differential Attacks for ECHO and Grøstl. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Shai Halevi, Vinod Vaikuntanathan i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Eran Omri, Ilan Orlov Protocols for Multiparty Coin Toss with Dishonest Majority. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Viet Tung Hoang, Phillip Rogaway On Generalized Feistel Networks. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tal Rabin (eds.) Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Joël Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, Abhi Shelat, Ivan Visconti Collusion-Free Multiparty Computation in the Mediated Model. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Vadim Lyubashevsky, Daniele Micciancio On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky Position Based Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ben Morris, Phillip Rogaway, Till Stegers How to Encipher Messages on a Small Domain. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yael Tauman Kalai, Ran Raz Probabilistically Checkable Arguments. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Moni Naor, Gil Segev 0001 Public-Key Cryptosystems Resilient to Key Leakage. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Arpita Patra, Ashish Choudhary, Tal Rabin, C. Pandu Rangan The Round Complexity of Verifiable Secret Sharing Revisited. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz Cryptanalysis of C2. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF S-box recovery, Cryptomeria, block cipher, C2, key recovery, boomerang attack
1Ueli M. Maurer, Stefano Tessaro Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Céline Chevalier, David Pointcheval Smooth Projective Hashing for Conditionally Extractable Commitments. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Serge Fehr, Carolin Lunemann, Louis Salvail, Christian Schaffner Improving the Security of Quantum Protocols via Commit-and-Open. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joël Alwen, Yevgeniy Dodis, Daniel Wichs Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Eike Kiltz The Group of Signed Quadratic Residues and Applications. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hybrid ElGamal/DHIES, Public-key encryption, chosen-ciphertext security
1Boaz Barak, Mohammad Mahmoody-Ghidary Merkle Puzzles Are Optimal - An O(n2)-Query Attack on Any Key Exchange from a Random Oracle. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 New Birthday Attacks on Some MACs Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack
1Yevgeniy Dodis, John P. Steinberger Message Authentication Codes from Unpredictable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Xiaomin Liu Private Mutual Authentication and Conditional Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan Computational Differential Privacy. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikström On the Composition of Public-Coin Zero-Knowledge Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shai Halevi (eds.) Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Benny Applebaum, David Cash, Chris Peikert, Amit Sahai Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-dependent message security, Learning problems, Encryption, Lattice-based cryptography
1Daniel J. Bernstein Batch Binary Edwards. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF batch throughput, Karatsuba, Toom, binary Edwards curves, differential addition, complete addition formulas, elliptic curves, vectorization, Scalar multiplication, Diffie-Hellman
1Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham Randomizable Proofs and Delegatable Anonymous Credentials. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos Privacy-Enhancing Auctions Using Rational Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic Distinguisher and Related-Key Attack on the Full AES-256. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack
1Thomas Icart How to Hash into Elliptic Curves. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård On the Amortized Complexity of Zero-Knowledge Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gaëtan Leurent, Phong Q. Nguyen How Risky Is the Random-Oracle Model? Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kazumaro Aoki, Yu Sasaki Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-1, preimage, one-way, meet-in-the-middle, SHA-0
1Nadia Heninger, Hovav Shacham Reconstructing RSA Private Keys from Random Key Bits. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer Abstraction in Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Brent Waters Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jens Groth Linear Algebra with Sub-linear Zero-Knowledge Arguments. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Sub-linear size zero-knowledge arguments, public-coin special honest verifier zero-knowledge, Pedersen commitments, linear algebra, circuit satisfiability
1Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv
1Adi Akavia Solving Hidden Number Problem with One Bit Oracle and Advice. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell Utility Dependence in Correct and Fair Rational Secret Sharing. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Susan Hohenberger, Brent Waters Short and Stateless Signatures from the RSA Assumption. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marc Stevens 0001, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PlayStation 3, certificate, collision attack, MD5
1Ignacio Cascudo Pueyo, Hao Chen 0095, Ronald Cramer, Chaoping Xing Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joël Alwen, Abhi Shelat, Ivan Visconti Collusion-Free Protocols in the Mediated Model. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Collusion Free, ZKPoK, Commitments, Mediated Communication
1Krzysztof Pietrzak Compression from Collisions, or Why CRHF Combiners Have a Long Output. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Alexander Maximov, Dmitry Khovratovich New State Recovery Attack on RC4. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF state recovery attack, RC4, key recovery attack
1Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Manoj Prabhakaran 0001, Amit Sahai Founding Cryptography on Oblivious Transfer - Efficiently. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam Improved Bounds on Security Reductions for Discrete Log Based Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Schnorr Signature Scheme, Provable Security, Random Oracle Model
1Cynthia Dwork, Sergey Yekhanin New Efficient Attacks on Statistical Disclosure Control Mechanisms. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chris Peikert, Vinod Vaikuntanathan Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Serge Fehr, Adam O'Neill On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Eli Biham, Yaniv Carmeli, Adi Shamir Bug Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bug attack, Pohlig-Hellman, RSA, ECC, Fault attack
1Yevgeniy Dodis, Victor Shoup, Shabsi Walfish Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan Adaptive One-Way Functions and Applications. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptographic Assumptions, Non-malleable Commitment, Non-malleable Zero-knowledge
1David A. Wagner 0001 (eds.) Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jean-Charles Faugère, Françoise Levy-dit-Vehel, Ludovic Perret Cryptanalysis of MinRank. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Phillip Rogaway, John P. Steinberger Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF blockcipher-based hashing, collision-resistant hashing, cryptographic hash functions, compression functions, ideal-cipher model
1Thomas Eisenbarth 0001, Timo Kasper, Amir Moradi 0001, Christof Paar, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Martijn Stam Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Payman Mohassel, Enav Weinreb Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Eike Kiltz Programmable Hash Functions and Their Applications. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Brett Hemenway, Rafail Ostrovsky Public-Key Locally-Decodable Codes. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bounded Channel Model, Error Correcting Codes, Public Key Cryptography, Chinese Remainder Theorem, Private Information Retrieval, Locally Decodable Codes
1Chris Peikert, Vinod Vaikuntanathan, Brent Waters A Framework for Efficient and Composable Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Cécile Delerablée, David Pointcheval Dynamic Threshold Public-Key Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky Circular-Secure Encryption from Decision Diffie-Hellman. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt Cryptanalysis of the GOST Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, collision attack, preimage attack, second preimage attack
Displaying result #101 - #200 of 1266 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license