The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CRYPTO"( http://dblp.L3S.de/Venues/CRYPTO )

URL (DBLP): http://dblp.uni-trier.de/db/conf/crypto

Publication years (Num. hits)
1981 (40) 1982 (36) 1983 (30) 1984 (41) 1985 (45) 1986 (37) 1987 (44) 1988 (44) 1989 (60) 1990 (49) 1991 (39) 1992 (44) 1993 (41) 1994 (40) 1995 (37) 1996 (31) 1997 (38) 1998 (36) 1999 (40) 2000 (34) 2001 (34) 2002 (40) 2003 (37) 2004 (35) 2005 (34) 2006 (37) 2007 (35) 2008 (33) 2009 (40) 2010 (40) 2011 (44) 2012 (51)
Publication types (Num. hits)
inproceedings(1234) proceedings(32)
Venues (Conferences, Journals, ...)
CRYPTO(1266)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 559 occurrences of 325 keywords

Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Manoj Prabhakaran 0001, Mike Rosulek Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam D. Smith Scalable Multiparty Computation with Nearly Optimal Work and Resilience. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Helena Handschuh, Bart Preneel Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum One-Time Programs. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rafail Ostrovsky, William E. Skeith III Communication Complexity in Algebraic Two-Party Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fully homomorphic encryption, PIR writing, algebraic lower bounds, communication complexity, keyword search, private information retrieval, homomorphic encryption
1Dimitar Jetchev, Ramarathnam Venkatesan Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Kobbi Nissim, Eran Omri Distributed Private Data Analysis: Simultaneously Solving How and What. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Christophe De Cannière, Christian Rechberger Preimages for Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0
1Ronald Cramer, Eike Kiltz, Carles Padró A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Guillaume Hanrot, Damien Stehlé Improved Analysis of Kannan's Shortest Lattice Vector Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets Chernoff-Type Direct Product Theorems. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Dominique Unruh Random Oracles and Auxiliary Input. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF auxiliary input, proof techniques, Random oracles, foundations
1Aggelos Kiayias, Serdar Pehlivanoglu Pirate Evolution: How to Make the Most of Your Traitor Keys. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Ronald L. Rivest, Madhu Sudan 0001, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee Amplifying Collision Resistance: A Complexity-Theoretic Treatment. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, combiners, collision resistance, hardness amplification
1Omer Horvitz, Jonathan Katz Universally-Composable Two-Party Computation in Two Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alfred Menezes (eds.) Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Vipul Goyal Reducing Trust in the PKG in Identity Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Melissa Chase, Anna Lysyanskaya Simulatable VRFs with Applications to Multi-theorem NIZK. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Coppersmith’s theorem, cryptanalysis, lattice reduction
1Benny Applebaum, Yuval Ishai, Eyal Kushilevitz Cryptography with Constant Input Locality. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path
1Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner Secure Identification and QKD in the Bounded-Quantum-Storage Model. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Anja Lehmann Security-Amplifying Combiners for Collision-Resistant Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Daniel R. L. Brown, Kristian Gjøsteen A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptography, Random Number Generation
1Ross J. Anderson, Tyler Moore 0001 Information Security Economics - and Beyond. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Danny Harnik, Yuval Ishai, Eyal Kushilevitz How Many Oblivious Transfers Are Needed for Secure Multiparty Computation? Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jens Groth, Rafail Ostrovsky Cryptography in the Multi-string Model. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Common random string model, multi-string model, universally composable commitment, multi-party computation, non-interactive zero-knowledge
1Mihir Bellare, Alexandra Boldyreva, Adam O'Neill Deterministic and Efficiently Searchable Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Nick Howgrave-Graham A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb How Should We Solve Search Problems Privately? Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Jesper Buus Nielsen Scalable and Unconditionally Secure Multiparty Computation. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang On Secure Multi-party Computation in Black-Box Groups. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Planar Graph, Graph Colouring, Black-Box, Multi-Party Computation, Non-Abelian Group
1Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern Practical Cryptanalysis of SFLASH. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III Public Key Encryption That Allows PIR Queries. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data
1Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Protocol Security, Provable Scurity, Computational Soundness, Diffie-Hellman Assumptions
1Shai Halevi Invertible Universal Hashing and the TET Encryption Mode. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Manoj Prabhakaran 0001, Mike Rosulek Rerandomizable RCCA Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Antoine Joux, Thomas Peyrin Hash Functions and the (Amplified) Boomerang Attack. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, SHA-1, boomerang attack
1Dennis Hofheinz, Eike Kiltz Secure Hybrid Encryption from Weakened Key Encapsulation. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ellen Jochemsz, Alexander May 0001 A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT
1Ueli M. Maurer, Stefano Tessaro Domain Extension of Public Random Functions: Beyond the Birthday Barrier. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner Indistinguishability Amplification. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan A Method for Making Password-Based Key Exchange Resilient to Server Compromise. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Moni Naor, Gil Segev 0001, Adam D. Smith Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam D. Smith Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Louis Granboulan, Antoine Joux, Jacques Stern Inverting HFE Is Quasipolynomial. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Claude Carlet On the Higher Order Nonlinearities of Algebraic Immune Functions. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF higher order nonlinearity, Boolean function, stream cipher, block cipher, algebraic attack, algebraic immunity, algebraic degree
1Shai Halevi, Hugo Krawczyk Strengthening Digital Signatures Via Randomized Hashing. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Brent Waters Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ronen Gradwohl, Salil P. Vadhan, David Zuckerman Random Selection with an Adversarial Majority. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski On Forward-Secure Storage. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen Rankin's Constant and Blockwise Lattice Reduction. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marc Fischlin Round-Optimal Composable Blind Signatures in the Common Reference String Model. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Chiu-Yuen Koo On Expected Constant-Round Protocols for Byzantine Agreement. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Bruno Blanchet, David Pointcheval Automated Security Proofs with Sequences of Games. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Saurabh Agarwal, Ronald Cramer, Robbert de Haan Asymptotically Optimal Two-Round Perfectly Secure Message Transmission. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kamalika Chaudhuri, Nina Mishra When Random Sampling Preserves Privacy. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Remo Meier, Bartosz Przydatek On Robust Combiners for Private Information Retrieval and Other Primitives. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Antoine Joux, Reynald Lercier, Nigel P. Smart, Frederik Vercauteren The Number Field Sieve in the Medium Prime Case. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Shai Halevi, Michael Steiner 0001 Mitigating Dictionary Attacks on Password-Protected Local Storage. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Oded Regev 0001 Lattice-Based Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner Oblivious Transfer and Linear Functions. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Yuval Ishai Scalable Secure Multiparty Computation. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Non-interactive Zero-knowledge Proofs, Public-key Encryption, Semantic Security, Non-malleability
1Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zulfikar Ramzan, David P. Woodruff Fast Algorithms for the Free Riders Problem in Broadcast Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hao Chen 0095, Ronald Cramer Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Iftach Haitner, Danny Harnik, Omer Reingold On the Power of the Randomized Iterate. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Melissa Chase, Anna Lysyanskaya On Signatures of Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Tal Moran, Moni Naor Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mihir Bellare New Proofs for NMAC and HMAC: Security without collision-resistance. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Cynthia Dwork (eds.) Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Elad Barkan, Eli Biham, Adi Shamir Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Time/memory tradeoff, time/memory/data tradeoff, hidden state, stateful random graph, Hellman, lower bound, Cryptanalysis, rigorous, Rainbow
1Martin Hirt, Jesper Buus Nielsen Robust Multiparty Computation with Linear Communication Complexity. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Xavier Boyen On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Anna Lysyanskaya, Nikos Triandopoulos Rationality and Adversarial Behavior in Multi-party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jean-Charles Faugère, Ludovic Perret Cryptanalysis of 2R- Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Functional Decomposition Problem (FDP), Gröbner bases, Cryptanalysis, F5 algorithm
1Jens Groth, Rafail Ostrovsky, Amit Sahai Non-interactive Zaps and New Techniques for NIZK. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1David A. Wagner 0001 Cryptographic Protocols for Electronic Voting. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Victor Shoup (eds.) Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Lea Kissner, Dawn Xiaodong Song Privacy-Preserving Set Operations. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jung Yeon Hwang, Dong Hoon Lee 0001, Jongin Lim 0001 Generic Transformation for Scalable Broadcast Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway Improved Security Analyses for CBC MACs. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay Secure Communications over Insecure Channels Based on Short Authenticated Strings. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Yuval Ishai Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Rafael Pass, Abhi Shelat Unconditional Characterizations of Non-interactive Zero-Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Serge Fehr, Martijn Stam Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Thomas Holenstein, Renato Renner One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov A Practical Attack on a Braid Group Based Cryptographic Protocol. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ari Juels, Stephen A. Weis Authenticating Pervasive Devices with Human Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiaoyun Wang 0001, Hongbo Yu, Yiqun Lisa Yin Efficient Collision Search Attacks on SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collision search attacks, Hash functions, SHA-1, SHA-0
1Yi Lu 0002, Willi Meier, Serge Vaudenay The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF E0, Stream Ciphers, Bluetooth, Correlation
1Stefan Wolf 0001, Jürg Wullschleger New Monotones and Lower Bounds in Unconditional Two-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Cynthia Dwork, Moni Naor, Hoeteck Wee Pebbling and Proofs of Work. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Anna Lysyanskaya A Formal Treatment of Onion Routing. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joël Alwen, Giuseppe Persiano, Ivan Visconti Impossibility and Feasibility Results for Zero Knowledge with Public Keys. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Marc Fischlin Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Robert Granger, Frederik Vercauteren On the Discrete Logarithm Problem on Algebraic Tori. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1266 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license