The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IMACC"( http://dblp.L3S.de/Venues/IMACC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ima

Publication years (Num. hits)
1995 (31) 1997 (36) 1999 (36) 2001 (39) 2003 (30) 2005 (30) 2007 (25) 2009 (29) 2011 (29) 2013 (21) 2015 (20) 2017 (20) 2019 (18) 2021 (15) 2023-2024 (15)
Publication types (Num. hits)
inproceedings(379) proceedings(15)
Venues (Conferences, Journals, ...)
IMACC(394)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 141 occurrences of 116 keywords

Results
Found 394 publication records. Showing 394 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, David A. Wilson On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Mehdi Tibouchi, Jean-Christophe Zapalowicz Recovering Private Keys Generated with Weak PRNGs. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Guilhem Castagnos, Soline Renner, Gilles Zémor High-order Masking by Using Coding Theory and Its Application to AES. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer Differential Cryptanalysis of Keccak Variants. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1James McLaughlin 0003, John A. Clark Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Silvia Mella, Ruggero Susella On the Homomorphic Computation of Symmetric Cryptographic Primitives. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hidenori Kuwakado, Shoichi Hirose Hashing Mode Using a Lightweight Blockcipher. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rintaro Nakano, Junji Shikata Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sihem Mesnager Semi-bent Functions from Oval Polynomials. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Duc-Phong Le, Chik How Tan Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Delphine Boucher, Felix Ulmer A Note on the Dual Codes of Module Skew Codes. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guilin Wang, Fubiao Xia, Yunlei Zhao Designated Confirmer Signatures with Unified Verification. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liqun Chen (eds.) Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Diego F. Aranha, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez Parallelizing the Weil and Tate Pairings. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Scott On the Efficient Implementation of Pairing-Based Protocols. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu, Tetsu Iwata Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Malika Izabachène, Benoît Libert, Damien Vergnaud Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yasushi Osaki, Tetsu Iwata Security of Hash-then-CBC Key Wrapping Revisited. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jean-Pierre Flori, Sihem Mesnager, Gérard D. Cohen Binary Kloosterman Sums with Value 4. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kun Peng A Secure and Efficient Proof of Integer in an Interval Range. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vincent Herbert, Sumanta Sarkar On the Triple-Error-Correcting Cyclic Codes with Zero Set {1, 2 i + 1, 2 j + 1}. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Juanma González Nieto On Forward Secrecy in One-Round Key Exchange. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai 0001, Kazuo Ohta Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi On Constructing Homomorphic Encryption Schemes from Coding Theory. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xusheng Zhang, Dongdai Lin Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Martijn Stam The Symbiosis between Collision and Preimage Resistance. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stephen C. Williams Analysis of the SSH Key Exchange Protocol. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marc Mouffron, Guillaume Vergne Enhanced Count of Balanced Symmetric Functions and Balanced Alternating Functions. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matthew Geoffrey Parker, Constanza Riera Generalised Complementary Arrays. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Kenneth G. Paterson Breaking an Identity-Based Encryption Scheme Based on DHIES. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junji Shikata, Daisuke Yamanaka Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner, Mathieu David Cryptanalysis of the Light-Weight Cipher A2U2. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuki Shibuya, Junji Shikata Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Go Yamamoto, Tetsutaro Kobayashi Self-correctors for Cryptographic Modules. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Peter Scholl, Nigel P. Smart Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alex J. Burrage, Ana Salagean, Raphael C.-W. Phan On the Stability of m-Sequences. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel Augot, Morgan Barbier, Caroline Fontaine Ensuring Message Embedding in Wet Paper Steganography. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion Can a Program Reverse-Engineer Itself? Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Michael Gorski, Stefan Lucks Security of Cyclic Double Block Length Hash Functions. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Cyclic-DM, Abreast-DM, cryptographic hash function, ideal cipher model, proof of security
1Sanjit Chatterjee, Koray Karabina, Alfred Menezes A New Protocol for the Nearby Friend Problem. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Hideki Imai Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Onur Özen, Martijn Stam Another Glance at Double-Length Hashing. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Azadeh Khaleghi, Danilo Silva 0001, Frank R. Kschischang Subspace Codes. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Julia Borghoff, Lars R. Knudsen, Mathias Stolpe Bivium as a Mixed-Integer Linear Programming Problem. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gregor Leander, Erik Zenner, Philip Hawkes Cache Timing Analysis of LFSR-Based Stream Ciphers. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Léonard Dallot, Damien Vergnaud Provably Secure Code-Based Threshold Ring Signatures. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sean Murphy, Maura B. Paterson Geometric Ideas for Cryptographic Equation Solving in Even Characteristic. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GeometricXL Algorithm, EGHAM process, XL Algorithm
1Dalia Khader, Liqun Chen 0002, James H. Davenport Certificate-Free Attribute Authentication. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Koichi Betsumiya, Rowena Alma L. Betty, Akihiro Munemasa Mass Formula for Even Codes over. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Matthew Geoffrey Parker (eds.) Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eirik Rosnes On Linear Programming Decoding on a Quantized Additive White Gaussian Noise Channel. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sdhp, ffs, nfs, dlp
1Benoît Gérard, Jean-Pierre Tillich On Linear Cryptanalysis with Many Linear Approximations. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple linear approximations, information theory, linear cryptanalysis
1Lars Eirik Danielsen, Matthew Geoffrey Parker, Patrick Solé The Rayleigh Quotient of Bent Functions. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Rayleigh quotient, plateaued functions, Boolean functions, bent functions, Walsh Hadamard transform
1Martin Geisler 0001, Nigel P. Smart Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Koray Karabina Double-Exponentiation in Factor-4 Groups and Its Applications. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stefania Fanali On Linear Codes from Maximal Curves. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF maximal curves, linear codes, algebraic geometric codes
1Yves Edel, Alexander Pott On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Masaaki Harada, Akihiro Munemasa On the Classification of Self-dual -Codes. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Julien Cathalo, David Naccache, Jean-Jacques Quisquater Comparing with RSA. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hans Georg Schaathun On Higher Weights and Code Existence. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hao Chen 0095, San Ling, Carles Padró, Huaxiong Wang, Chaoping Xing Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Steven D. Galbraith, Raminder S. Ruprai An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF discrete logarithm problem (DLP)
1Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi Practical Zero-Knowledge Proofs for Circuit Evaluation. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sihem Mesnager A New Family of Hyper-Bent Boolean Functions in Polynomial Form. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hyper-bent functions, Maximum nonlinearity, Kloosterman sums, Cubic sums, Boolean function, Bent functions, Walsh-Hadamard transformation
1Delphine Boucher, Felix Ulmer Codes as Modules over Skew Polynomial Rings. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Werner Schindler, Colin D. Walter Optimal Recovery of Secret Keys from Weak Side Channel Traces. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF power analysis, Side channel leakage, optimal strategy
1Laurie Law, Brian J. Matt Finding Invalid Signatures in Pairing-Based Batches. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pairing-based signatures, ID-based signatures, Batch verification
1Reza Rezaeian Farashahi Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Kummer surface, Deterministic extractor, Hyperelliptic curve, Jacobian
1M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto On the Connection Between Signcryption and One-Pass Key Establishment. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Signcryption KEM, Signcryption, Key establishment
1Patrick Solé, Dmitrii Zinoviev Galois Rings and Pseudo-random Sequences. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MSB, Correlation, OFDM, CDMA, PAPR, Galois Rings
1Andrew Moss, Dan Page, Nigel P. Smart Toward Acceleration of RSA Using 3D Graphics Hardware. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alexandra Alecu, Ana Salagean Modified Berlekamp-Massey Algorithm for Approximating the k -Error Linear Complexity of Binary Sequences. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream ciphers, linear complexity, pseudorandom sequences, k-error linear complexity
1Hoon Wei Lim, Kenneth G. Paterson Multi-key Hierarchical Identity-Based Signatures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kamel Bentahar, Nigel P. Smart Efficient 15, 360-bit RSA Using Woop-Optimised Montgomery Arithmetic. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF second order nonlinearity, low-order approximations, Boolean functions, Reed-Muller codes, covering radius, bent functions
1Panagiotis Rizomiliotis Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Chris J. Mitchell Cryptanalysis of the EPBC Authenticated Encryption Mode. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
1Gregory V. Bard Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Modes of Encryption, Blockwise-Adaptive Chosen-Plaintext Attack, BACPA, MACPA, Online-ness, CBC, CTR, OFB, CFB, IGE, HCBC, HPCBC, XCBC, ABC, ECB
1Tor E. Bjørstad, Alexander W. Dent, Nigel P. Smart Efficient KEMs with Partial Message Recovery. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Philipp Grabher, Johann Großschädl, Dan Page Cryptographic Side-Channels from Low-Power Cache Memory. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Steven D. Galbraith (eds.) Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto Verifier-Key-Flexible Universal Designated-Verifier Signatures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF universal designated-verifier signature, verifier-key-flexible, random oracle, ECDSA
1Jonathan Katz Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bleichenbacher’s forgery attack, RSASSA-PKCS-v1_5, time-stamp forgery, Acrobat, Acrobat Reader
1Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire On the Walsh Spectrum of a New APN Function. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Manuel Barbosa, Pooya Farshim Randomness Reuse: Extensions and Improvements. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Randomness Reuse, Multi-Recipient, Hybrid Encryption
1Juan M. Estévez-Tapiador, John A. Clark, Julio César Hernández Castro Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eiji Okamoto Optimised Versions of the Ate and Twisted Ate Pairings. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Waldyr D. Benits Junior, Steven D. Galbraith Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pairing-friendly elliptic curves, Gröbner bases
1Nicolas T. Courtois, Gregory V. Bard Algebraic Cryptanalysis of the Data Encryption Standard. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF s5DES, solving overdefined and sparse systems of multivariate equations, ElimLin algorithm, Gröbner bases, logical cryptanalysis, block ciphers, AES, DES, SAT solvers, algebraic cryptanalysis
1John Malone-Lee A General Construction for Simultaneous Signing and Encrypting. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Caroline Kudla, Kenneth G. Paterson Non-interactive Designated Verifier Proofs and Undeniable Signatures. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer Abstract Models of Computation in Cryptography. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart (eds.) Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Martijn Stam A Key Encapsulation Mechanism for NTRU. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Encapsulation, Random Oracle Model, NTRU, Plaintext Awareness
1Robert König, Ueli M. Maurer Generalized Strong Extractors and Deterministic Privacy Amplification. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Alexander W. Dent, John Malone-Lee The Physically Observable Security of Signature Schemes. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Dukjae Moon Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-H64, Cobra-H128, Block Ciphers, Related-Key Attacks, Data-Dependent Permutations
Displaying result #101 - #200 of 394 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license