The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AFRICACRYPT"( http://dblp.L3S.de/Venues/AFRICACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/africacrypt

Publication years (Num. hits)
2008 (28) 2009 (27) 2010 (26) 2011 (27) 2012 (27) 2013 (27) 2014 (28) 2016 (19) 2017-2018 (34) 2019 (23) 2020 (22) 2022 (26) 2023 (22)
Publication types (Num. hits)
inproceedings(322) proceedings(14)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 97 occurrences of 80 keywords

Results
Found 336 publication records. Showing 336 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Christophe Nègre, Jean-Marc Robert 0003 Impact of Optimized Field Operations AB, AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve. Search on Bibsonomy AFRICACRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang SHA-3 on ARM11 Processors. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, Pierre-Louis Cayrel Extended Security Arguments for Signature Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yue Sun, Meiqin Wang, Shujia Jiang, Qiumei Sun Differential Cryptanalysis of Reduced-Round ICEBERG. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Christian Forler, Stefan Lucks The Collision Security of MDC-4. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo 0001, Thomas Peyrin, Axel Poschmann, Chik How Tan SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Willi Meier Stream Ciphers, a Perspective. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin Bounds and Constructions for 1-Round (0, δ)-Secure Message Transmission against Generalized Adversary. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nashwa A. F. Mohamed, Mohsin H. A. Hashim, Michael Hutter Improved Fixed-Base Comb Method for Fast Scalar Multiplication. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Bart Mennink, Bart Preneel, Marjan Skrobot Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammed Meziani, Gerhard Hoffmann, Pierre-Louis Cayrel Improving the Performance of the SYND Stream Cipher. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Stefan Katzenbeisser 0001, Andreas Peter Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, Claudio Soriente Size-Hiding in Private Set Intersection: Existential Results and Constructions. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marc Fischlin Black-Box Reductions and Separations in Cryptography. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sabyasachi Karati, Abhijit Das 0004, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer Batch Verification of ECDSA Signatures. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Augustin P. Sarr, Philippe Elbaz-Vincent A Complementary Analysis of the (s)YZ and DIKE Protocols. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Enrico Thomae, Christopher Wolf Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Houssem Maghrebi, Claude Carlet, Sylvain Guilley, Jean-Luc Danger Optimal First-Order Masking with Linear and Non-linear Bijections. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aikaterini Mitrokotsa, Serge Vaudenay (eds.) Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Amandine Jambert, Roch Lescuyer Sanitizable Signatures with Several Signers and Sanitizers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier, Gaël Thomas 0002 The GLUON Family: A Lightweight Hash Function Family Based on FCSRs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, Mélanie Favre Fuzzy Vault for Multiple Users. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiazhe Chen, Meiqin Wang, Bart Preneel Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Xiao Round-Optimal Black-Box Statistically Binding Selective-Opening Secure Commitments. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abderrahmane Nitaj A New Attack on RSA and CRT-RSA. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thomas Eisenbarth 0001, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni 0001, François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. Search on Bibsonomy AFRICACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel Loebenberger, Michael Nüsken Analyzing Standards for RSA Integers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Damien Vergnaud Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abderrahmane Nitaj, David Pointcheval (eds.) Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nadia El Mrabet, Aurore Guillevic, Sorina Ionica Efficient Multiplication in Finite Field Extensions of Degree 5. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert On the Security of the Winternitz One-Time Signature Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Laurie Genelle, Emmanuel Prouff, Michaël Quisquater Montgomery's Trick and Fast Implementation of Masked AES. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Seiko Arita Identification Schemes from Key Encapsulation Mechanisms. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Carsten Elsner, Martin Schmidt 0006 Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Subidh Ali, Debdeep Mukhopadhyay An Improved Differential Fault Analysis on AES-256. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mathias Herrmann Improved Cryptanalysis of the Multi-Prime φ - Hiding Assumption. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Abdoul Aziz Ciss, Djiby Sow On Randomness Extraction in Elliptic Curves. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bart Preneel The NIST SHA-3 Competition: A Perspective on the Final Year. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sandip Karmakar, Dipanwita Roy Chowdhury Fault Analysis of Grain-128 by Targeting NFSR. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto, Katsuyuki Takashima Some Key Techniques on Pairing Vector Spaces. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yaser Esmaeili Salehani, Aleksandar Kircanski, Amr M. Youssef Differential Fault Analysis of Sosemanuk. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Hutter, Marc Joye, Yannick Sierra Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Sasaki Collisions of MMO-MD5 and Their Impact on Original MD5. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters, Peter Schwabe Really Fast Syndrome-Based Hashing. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alex Escala, Javier Herranz, Paz Morillo Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Reza Rezaeian Farashahi Hashing into Hessian Curves. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Carolin Lunemann, Jesper Buus Nielsen Fully Simulatable Quantum-Secure Coin-Flipping and Applications. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré Achieving Optimal Anonymity in Transferable E-Cash with a Judge. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jens Groth Efficient Zero-Knowledge Proofs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jake Loftus, Nigel P. Smart Secure Outsourced Computation. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stéphanie Kerckhof, Baudoin Collard, François-Xavier Standaert FPGA Implementation of a Statistical Saturation Attack against PRESENT. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Laurent Fousse, Pascal Lafourcade 0001, Mohamed Alnuaimi Benaloh's Dense Probabilistic Encryption Revisited. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhenyu Huang 0004, Dongdai Lin Attacking Bivium and Trivium with the Characteristic Set Method. Search on Bibsonomy AFRICACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Boris Skoric Quantum Readout of Physical Unclonable Functions. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin Schläffer Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marcel Medwed, François-Xavier Standaert, Johann Großschädl, Francesco Regazzoni 0001 Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Santanu Sarkar 0001, Sourav Sen Gupta 0001 Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sven Schäge, Jörg Schwenk A New RSA-Based Signature Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Georg Fuchsbauer, Damien Vergnaud Fair Blind Signatures without Random Oracles. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kun Peng, Feng Bao 0001 Batch Range Proof for Practical Small Ranges. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Arpita Patra, Ashish Choudhary, C. Pandu Rangan Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1M. Abdelaziz Elaabid, Sylvain Guilley Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Jian Weng 0001, Yanjiang Yang, Robert H. Deng Efficient Unidirectional Proxy Re-Encryption. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval Strong Cryptography from Weak Secrets. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markus Rückert, Dominique Schröder Fair Partially Blind Signatures. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong Avoiding Full Extension Field Arithmetic in Pairing Computations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shahram Khazaei, Simon Knellwolf, Willi Meier, Deian Stefan Improved Linear Differential Attacks on CubeHash. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter Schwabe ECC2K-130 on Cell CPUs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Huihui Yap, Khoongming Khoo, Axel Poschmann Parallelizing the Camellia and SMS4 Block Ciphers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jens Hermans, Michael Schneider 0002, Johannes Buchmann 0001, Frederik Vercauteren, Bart Preneel Parallel Shortest Lattice Vector Enumeration on Graphics Cards. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aleksandar Kircanski, Amr M. Youssef Differential Fault Analysis of HC-128. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alfredo Rial, Bart Preneel Optimistic Fair Priced Oblivious Transfer. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Björn Terelius, Douglas Wikström Proofs of Restricted Shuffles. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tanja Lange 0001 (eds.) Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Feng Bao 0001 Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF simulator, Oblivious transfer, universally composable
1Markus Kasper, Timo Kasper, Amir Moradi 0001, Christof Paar Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joana Treger, Jacques Patarin Generic Attacks on Feistel Networks with Internal Permutations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF selective/all conversion, RSA, standard model, undeniable signature
1Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen Cryptanalysis of Vortex. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Neil Costigan, Peter Schwabe Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation
1Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk Practical Threshold Signatures with Linear Secret Sharing Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear secret sharing, function sharing, threshold cryptography
1Marc Joye, Michael Tunstall Exponent Recoding and Regular Exponentiation Algorithms. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Exponent recoding, side-channel analysis, exponentiation algorithms
1Laila El Aimani Anonymity from Public Key Encryption to Undeniable Signatures. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction
1Julien Bringer, Hervé Chabanne Another Look at Extended Private Information Retrieval Protocols. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Private Information Retrieval (PIR), Extended PIR (EPIR), Batching, Polynomial Evaluation
1David Galindo, Flavio D. Garcia A Schnorr-Like Lightweight Identity-Based Signature Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Schnorr, provable security, random oracle model, identity-based signature, lightweight cryptography
1Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bart Preneel (eds.) Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Debdeep Mukhopadhyay An Improved Fault Based Attack of the Advanced Encryption Standard. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Go Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa On the Theoretical Gap between Group Signatures with and without Unlinkability. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, group signature, unlinkability
1Billy Bob Brumley, Kaisa Nyberg On Modular Decomposition of Integers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GLV method, integer decompositions, elliptic curve cryptography
1Marine Minier, Raphael C.-W. Phan, Benjamin Pousse Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF known-key distinguishers, cryptanalysis, Block ciphers, Rijndael
1Abderrahmane Nitaj Cryptanalysis of RSA Using the Ratio of the Primes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Coppersmith’s Method, Cryptanalysis, RSA, Factorization, Continued Fraction
1Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani Reducing Key Length of the McEliece Cryptosystem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Alternant code, quasi-cyclic, public-key cryptography, McEliece cryptosystem
Displaying result #201 - #300 of 336 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license