The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "EUROCRYPT"( http://dblp.L3S.de/Venues/EUROCRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eurocrypt

Publication years (Num. hits)
1982 (26) 1984 (36) 1985 (33) 1986 (36) 1987 (27) 1988 (42) 1989 (72) 1990 (49) 1991 (56) 1992 (45) 1993 (43) 1994 (48) 1995 (36) 1996 (35) 1997 (35) 1998 (45) 1999 (33) 2000 (42) 2001 (33) 2002 (36) 2003 (40) 2004 (37) 2005 (34) 2006 (36) 2007 (34) 2008 (32) 2009 (35) 2010 (35) 2011 (34) 2012 (44) 2013 (43) 2014 (39) 2016 (2)
Publication types (Num. hits)
inproceedings(1220) proceedings(33)
Venues (Conferences, Journals, ...)
EUROCRYPT(1253)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 421 occurrences of 264 keywords

Results
Found 1253 publication records. Showing 1253 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Céline Chevalier, Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer Optimal Randomness Extraction from a Diffie-Hellman Element. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christophe Doche, David R. Kohel, Francesco Sica 0001 Double-Base Number System for Multi-scalar Multiplications. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elliptic curve cryptography, scalar multiplication, Koblitz curves, Double-Base Number System
1Divesh Aggarwal, Ueli M. Maurer Breaking RSA Generically Is Equivalent to Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Guilhem Castagnos, Fabien Laguillaumie On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography
1Dennis Hofheinz, Eike Kiltz Practical Chosen Ciphertext Secure Encryption from Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF factoring, public-key encryption, chosen-ciphertext security
1Steven D. Galbraith, Xibin Lin, Michael Scott Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GLV method, elliptic curves, point multiplication, isogenies
1Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung A New Randomness Extraction Paradigm for Hybrid Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction
1Yu Sasaki, Kazumaro Aoki Finding Preimages in Full MD5 Faster Than Exhaustive Search. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, MD5, preimage, one-way, local collision
1Olivier Billet, Duong Hieu Phan Traitors Collaborating in Public: Pirates 2.0. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shafi Goldwasser Cryptography without (Hardly Any) Secrets ? Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Adi Shamir Cube Attacks on Tweakable Black Box Polynomials. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium
1Michel Abdalla, Dario Catalano, Dario Fiore 0001 Verifiable Random Functions from Identity-Based Key Encapsulation. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bhavana Kanukurthi, Leonid Reyzin Key Agreement from Close Secrets over Unsecured Channels. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Antoine Joux (eds.) Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1François-Xavier Standaert, Tal Malkin, Moti Yung A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton Salvaging Merkle-Damgård for Practical Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Praveen Gauravaram, Lars R. Knudsen On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Davies-Meyer, RMX, Digital signatures, Hash functions
1Jan Camenisch, Nishanth Chandran, Victor Shoup A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chi-Jen Lu On the Security Loss in Cryptographic Reductions. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Brent Waters Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange 0001, Bo-Yin Yang ECM on Graphics Cards. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elliptic-curve method of factorization, Edwards curves, graphics processing unit, elliptic curves, Factorization, modular arithmetic
1Mihir Bellare, Thomas Ristenpart Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eike Kiltz, Krzysztof Pietrzak On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Padding-based encryption, ideal trapdoor permutations, black-box, OAEP
1Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen Cryptanalysis of MDC-2. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDC-2, hash function, collision, preimage
1Jan Camenisch, Aggelos Kiayias, Moti Yung On the Portability of Generalized Schnorr Proofs. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kan Yasuda A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension
1Takakazu Satoh Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF point counting, hyperelliptic curve
1Khaled Ouafi, Serge Vaudenay Smashing SQUASH-0. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, cryptanalysis, MAC
1Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC
1Susan Hohenberger, Brent Waters Realizing Hash-and-Sign Signatures under Standard Assumptions. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Dennis Hofheinz, Scott Yilek Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill Order-Preserving Symmetric Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs Isolated Proofs of Knowledge and Isolated Zero Knowledge. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Ronny Ramzi Dakdouk Obfuscating Point Functions with Multibit Output. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composable obfuscation, multibit point function obfuscation, digital locker, point function obfuscation, obfuscation
1Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern Key Recovery on Hidden Monomial Multivariate Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam Precise Concurrent Zero Knowledge. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin Threshold RSA for Dynamic and Ad-Hoc Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Hash Function, Dithering
1Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel A Practical Attack on KeeLoq. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks
1Jens Groth, Yuval Ishai Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF zero-knowledge argument, sub-linear communication, homomorphic encryption, Shuffle, mix-net
1Gregory Neven Efficient Sequential Aggregate Signed Data. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Juan A. Garay, Rafail Ostrovsky Almost-Everywhere Secure Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure message transmission, almost-everywhere agreement, bounded-degree networks, Secure multi-party computation, expander graphs
1Jonathan Katz, Amit Sahai, Brent Waters Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Boaz Barak, Sharon Goldberg, David Xiao Protocols and Lower Bounds for Failure Localization in the Internet. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Failure localization, black-box separation, secure routing
1Dennis Hofheinz, Dominique Unruh Towards Key-Dependent Message Security in the Standard Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key-dependent message security, symmetric encryption schemes, security proofs
1Jens Groth, Amit Sahai Efficient Non-interactive Proof Systems for Bilinear Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Non-interactive witness-indistinguishability, common reference string, non-interactive zero-knowledge, bilinear groups
1Vipul Goyal, Payman Mohassel, Adam D. Smith Efficient Two Party and Multi Party Computation Against Covert Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart (eds.) Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Benjamin A. Smith Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dario Catalano, Dario Fiore 0001, Mariagrazia Messina Zero-Knowledge Sets with Short Proofs. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jean-Pierre Tillich, Gilles Zémor Collisions for the LPS Expander Graph Hash Function. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Kazuhiro Suzuki Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Perfectly secure message transmission, efficiency, information theoretic security
1Phillip Rogaway, John P. Steinberger Security/Efficiency Tradeoffs for Permutation-Based Hashing. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche On the Indifferentiability of the Sponge Construction. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya A New Mode of Operation for Block Ciphers and Length-Preserving MACs. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1David Cash, Eike Kiltz, Victor Shoup The Twin Diffie-Hellman Problem and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nishanth Chandran, Vipul Goyal, Amit Sahai New Constructions for UC Secure Computation Using Tamper-Proof Hardware. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin HB#: Increasing the Security and Efficiency of HB+. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LPN, authentication, RFID tags, Toeplitz matrix
1Nicolas Gama, Phong Q. Nguyen Predicting Lattice Reduction. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BKZ, DEEP Insertions, Lattice-based cryptosystems, Lattice Reduction, LLL
1Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision
1Hao Chen 0095, Ronald Cramer, Robbert de Haan, Ignacio Cascudo Pueyo Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein Proving Tight Security for Rabin-Williams Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Tal Moran, Gil Segev 0001 David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Vivien Dubois, Pierre-Alain Fouque, Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen Batch Verification of Short Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård, Robbert de Haan Atomic Secure Multi-party Multiplication with Low Communication. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Rune Thorbek Non-interactive Proofs for Integer Multiplication. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hongjun Wu 0001, Bart Preneel Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Py, Py6, Pypy, Stream Cipher, Differential Cryptanalysis
1Andreas Enge, Pierrick Gaudry An L (1/3 + epsilon ) Algorithm for the Discrete Logarithm Problem for Low Degree Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Benny Pinkas An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Moni Naor (eds.) Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lorenz Minder, Amin Shokrollahi Cryptanalysis of the Sidelnikov Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sidelnikov cryptosystem, structural attack, error-correcting codes, McEliece cryptosystem
1Aurélie Bauer, Antoine Joux Toward a Rigorous Variation of Coppersmith's Algorithm on Three Variables. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Coppersmith’s algorithms, Gröbner basis, Lattice reduction
1Xavier Boyen Mesh Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1David P. Woodruff Revisiting the Efficiency of Malicious Two-Party Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malicious model, efficiency, expander graphs, secure function evaluation
1Marc Stevens 0001, Arjen K. Lenstra, Benne de Weger Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Aline Gouget Divisible E-Cash Systems Can Be Truly Anonymous. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Thomas Ristenpart, Scott Yilek The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Proofs of possession, PKI, bilinear maps, ring signatures, multisignatures
1Krzysztof Pietrzak Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Vitaly Shmatikov Efficient Two-Party Secure Computation on Committed Inputs. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Gregory Neven, Abhi Shelat Simulatable Adaptive Oblivious Transfer. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Robert Granger, Florian Hess, Roger Oyono, Nicolas Thériault, Frederik Vercauteren Ate Pairing on Hyperelliptic Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF finite fields, Tate pairing, hyperelliptic curves, Ate pairing
1Chun-Yuan Hsiao, Chi-Jen Lu, Leonid Reyzin Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hao Chen 0095, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan Secure Computation from Random Error Correcting Codes. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Krzysztof Pietrzak, Johan Sjödin Range Extension for Weak PRFs; The Good, the Bad, and the Ugly. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Willi Geiselmann, Rainer Steinwandt Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalytic hardware, factoring integers, RSA, NFS
1Shien Jin Ong, Salil P. Vadhan Zero Knowledge and Soundness Are Symmetric. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Chiu-Yuen Koo Round-Efficient Secure Computation in Point-to-Point Networks. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jonathan Katz Universally Composable Multi-party Computation Using Tamper-Proof Hardware. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Moti Yung, Yunlei Zhao Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xavier Boyen General Ad Hoc Encryption from Exponent Inversion IBE. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Oriol Farràs, Jaume Martí-Farré, Carles Padró Ideal Multipartite Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes
1Yi Deng 0002, Dongdai Lin Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF instance-dependent verifiable random functions, simultaneous resettability, zero knowledge
1Jürg Wullschleger Oblivious-Transfer Amplification. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF oblivious-transfer amplification, universal oblivious transfer, weak oblivious transfer, computational weak oblivious transfer, distributed leftover hash lemma, hard-core lemma
1John P. Steinberger The Collision Intractability of MDC-2 in the Ideal-Cipher Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Collision-resistant hashing, MDC-2, cryptographic hash functions, ideal-cipher model
1Yevgeniy Dodis, Prashant Puniya Feistel Networks Made Public, and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network
1Ueli M. Maurer, Johan Sjödin A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger Information-Theoretic Conditions for Two-Party Secure Function Evaluation. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stefan Wolf 0001, Jürg Wullschleger Oblivious Transfer Is Symmetric. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 1253 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license