The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CT-RSA"( http://dblp.L3S.de/Venues/CT-RSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ctrsa

Publication years (Num. hits)
2001 (34) 2002 (22) 2003 (29) 2004 (29) 2005 (26) 2006 (24) 2007 (25) 2008 (28) 2009 (32) 2010 (27) 2011 (26) 2012 (27) 2013 (26) 2014 (26) 2015 (27) 2016 (27) 2017 (26) 2018 (27) 2019 (29) 2020 (29) 2021 (28) 2022 (25) 2023 (27) 2024 (19)
Publication types (Num. hits)
inproceedings(621) proceedings(24)
Venues (Conferences, Journals, ...)
CT-RSA(645)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 329 occurrences of 199 keywords

Results
Found 645 publication records. Showing 645 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Fernando Krell, Gabriela F. Ciocarlie, Ashish Gehani, Mariana Raykova 0001 Low-Leakage Secure Search for Boolean Expressions. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marc Joye, Benoît Libert Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Si Gao, Hua Chen 0011, Wenling Wu, Limin Fan, Weiqiong Cao, Xiangliang Ma My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Noboru Kunihiro, Yuki Takahashi Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yohei Watanabe 0001, Keita Emura, Jae Hong Seo New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michele Orrù, Emmanuela Orsini, Peter Scholl Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng Gauss Sieve Algorithm on GPUs. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Louiza Khati, Nicky Mouha, Damien Vergnaud Full Disk Encryption: Bridging Theory and Practice. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eik List, Mridul Nandi Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Prastudy Fauzi, Helger Lipmaa Efficient Culpably Sound NIZK Shuffle Argument Without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Céline Chevalier, Damien Vergnaud Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung Towards a Unified Security Model for Physically Unclonable Functions. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ana Costache, Nigel P. Smart Which Ring Based Somewhat Homomorphic Encryption Scheme is Best? Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sebastian Gajek Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Johannes Blömer, Gennadij Liske Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun Factoring N=p^rq^s for Large r and s. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Avik Chakraborti, Nilanjan Datta, Mridul Nandi INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Pointcheval, Olivier Sanders Short Randomizable Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yanbin Pan Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak Constrained PRFs for Unbounded Inputs. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Eyal Kushilevitz, Steve Lu 0001, Rafail Ostrovsky Private Large-Scale Databases with Distributed Searchable Symmetric Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Essam Ghadafi Short Structure-Preserving Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001, Lei Wang 0031 Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhen Li Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carlos Aguilar Melchor, Joris Barrier, Serge Guelton, Adrien Guinet, Marc-Olivier Killijian, Tancrède Lepoint NFLlib: NTT-Based Fast Lattice Library. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peter Pessl, Stefan Mangard Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yanfeng Wang, Wenling Wu New Observations on Piccolo Block Cipher. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chongwon Cho, Dana Dachman-Soled, Stanislaw Jarecki Efficient Concurrent Covert Computation of String Equality and Set Intersection. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kazue Sako (eds.) Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1James Alderman, Christian Janson, Carlos Cid, Jason Crampton Hybrid Publicly Verifiable Computation. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu 0001, Guomin Yang, Willy Susilo, Fuchun Guo Strongly Leakage-Resilient Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gunnar Hartung Secure Audit Logs with Verifiable Excerpts. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley Cache Storage Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marcin Andrychowicz, Ivan Damgård, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou Efficient Leakage Resilient Circuit Compilers. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang 0001 Improved Attacks on Reduced-Round Camellia-128/192/256. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang 0005 Communication Optimal Tardos-Based Asymmetric Fingerprinting. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Essam Ghadafi Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Handan Kilinç, Alptekin Küpçü Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Céline Chevalier, Damien Vergnaud Non-Interactive Zero-Knowledge Proofs of Non-Membership. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yusi Zhang Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Junwei Wang 0003, Praveen Kumar Vadnala, Johann Großschädl, Qiuliang Xu Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jae Hong Seo, Keita Emura Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Kan Yasuda How to Incorporate Associated Data in Sponge-Based Authenticated Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer Cryptanalysis of Ascon. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Shota Yamada 0001 Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Koji Nuida, Naoto Itakura, Kaoru Kurosawa A Simple and Improved Algorithm for Integer Factorization with Implicit Hints. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guilhem Castagnos, Fabien Laguillaumie Linearly Homomorphic Encryption from $$\mathsf {DDH}$$. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kaisa Nyberg (eds.) Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka Completeness of Single-Bit Projection-KDM Security for Public Key Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joop van de Pol, Nigel P. Smart, Yuval Yarom Just a Little Bit More. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Conrado Porto Lopes Gouvêa, Julio César López-Hernández Implementing GCM on ARMv8. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Neil Hanley, HeeSeok Kim, Michael Tunstall Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Florian Maury, Jean-René Reinhard, Olivier Levillain, Henri Gilbert Format Oracles on OpenPGP. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Derler, Christian Hanser, Daniel Slamanig Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam Hash Functions from Defective Ideal Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wei Wei, Mingjie Liu, Xiaoyun Wang 0001 Finding Shortest Lattice Vectors in the Presence of Gaps. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bertram Poettering, Dale L. Sibborn Cold Boot Attacks in the Discrete Logarithm Setting. Search on Bibsonomy CT-RSA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nelly Fazio, Antonio Nicolosi, Irippuge Milinda Perera Broadcast Steganography. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gaoli Wang Practical Collision Attack on 40-Step RIPEMD-128. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu 0001 Practical Distributed Signatures in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lubos Gaspar, Gaëtan Leurent, François-Xavier Standaert Hardware Implementation and Side-Channel Analysis of Lapin. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Emmanuel Prouff, Matthieu Rivain, Thomas Roche On the Practical Security of a Leakage Resilient Masking Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qiong Huang 0001, Duncan S. Wong, Willy Susilo P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Vesselin Velichkov Automatic Search for Differential Trails in ARX Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shi Bai 0001, Steven D. Galbraith An Improved Compression Technique for Signatures Based on Learning with Errors. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Christoph Striecks A Generic View on Trace-and-Revoke Broadcast Encryption Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Jun Furukawa 0001 2-Pass Key Exchange Protocols from CPA-Secure KEM. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gareth T. Davies, Martijn Stam KDM Security in the Hybrid Framework. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jeroen Delvaux, Ingrid Verbauwhede Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Vasily Mikhalev On Increasing the Throughput of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Josh Benaloh (eds.) Topics in Cryptology - CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen CBEAM: Efficient Authenticated Encryption from Feebly One-Way ϕ Functions. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali El Kaafarani, Essam Ghadafi, Dalia Khader Decentralized Traceable Attribute-Based Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Yuuki Tokushige, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Ohta An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dmitry Khovratovich Key Wrapping with a Fixed Permutation. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Duc-Phong Le, Matthieu Rivain, Chik How Tan On Double Exponentiation for Securing RSA against Fault Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jian Guo 0001, Pierre Karpman, Ivica Nikolic, Lei Wang 0031, Shuang Wu Analysis of BLAKE2. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benoît Libert, Marc Joye Group Signatures with Message-Dependent Opening in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carolyn Whitnall, Elisabeth Oswald, François-Xavier Standaert The Myth of Generic DPA...and the Magic of Learning. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications. Search on Bibsonomy CT-RSA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu, Wun-She Yap, Yongzhuang Wei Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici Collisions for the WIDEA-8 Compression Function. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cyril Arnaud, Pierre-Alain Fouque Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schläffer, Peter Schwabe, David Seywald, Wolfgang Wieser Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng 0001 Accountable Authority Identity-Based Encryption with Public Traceability. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Amit Datta, Aniket Kate Asynchronous Computational VSS with Reduced Communication Complexity. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yannick Seurin, Joana Treger A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mike Bond, George French, Nigel P. Smart, Gaven J. Watson The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Karyn Benson, Hovav Shacham, Brent Waters The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 645 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license