The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "INDOCRYPT"( http://dblp.L3S.de/Venues/INDOCRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/indocrypt

Publication years (Num. hits)
2000 (26) 2001 (33) 2002 (34) 2003 (32) 2004 (33) 2005 (33) 2006 (32) 2007 (34) 2008 (34) 2009 (29) 2010 (25) 2011 (29) 2012 (32) 2013 (22) 2014 (26) 2015 (20) 2016 (24) 2017 (21) 2018 (21) 2019 (29) 2020 (40) 2021 (28) 2022 (32)
Publication types (Num. hits)
inproceedings(646) proceedings(23)
Venues (Conferences, Journals, ...)
INDOCRYPT(669)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 500 occurrences of 277 keywords

Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ege Gulcan, Aydin Aysu, Patrick Schaumont BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huiling Zhang, Wenling Wu Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maciej Skorski Efficiently Simulating High Min-entropy Sources in the Presence of Side Information. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yanqing Yao, Zhoujun Li 0001 Non-malleable Extractors with Shorter Seeds and Their Applications. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nasour Bagheri, Navid Ghaedi, Somitra Kumar Sanadhya Differential Fault Analysis of SHA-3. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik Some Results on Sprout. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Vipul Goyal (eds.) Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi 0001 (De-)Constructing TLS 1.3. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Haiyang Xue, Yamin Liu, Xianhui Lu, Bao Li 0001 Lossy Projective Hashing and Its Applications. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nasour Bagheri Linear Cryptanalysis of Reduced-Round SIMECK Variants. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Andrey Bogdanov Cryptanalysis of Two Fault Countermeasure Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger, Marine Minier Some Results Using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-Like Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benoit Feix, Hugues Thiebeauld, Lucille Tordella Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Inna Polak, Adi Shamir Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qingju Wang 0001, Zhiqiang Liu 0001, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo Cryptanalysis of Reduced-Round SIMON32 and SIMON48. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sumanta Sarkar, Subhamoy Maitra, Kaushik Chakraborty 0001 Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Anupam Chattopadhyay, Anusha Chowdhury Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001 Wire-Tap Codes as Side-Channel Countermeasure - - An FPGA-Based Experiment -. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go? Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ayesha Khalid, Prasanna Ravi, Anupam Chattopadhyay, Goutam Paul 0001 One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Long Wen, Meiqin Wang, Andrey Bogdanov, Huaifeng Chen General Application of FFT in Cryptanalysis and Improved Attack on CAST-256. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nishanth Chandran, Sanjam Garg Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Santanu Sarkar 0001, Ayineedi Venkateswarlu Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Steven D. Galbraith, Shishay W. Gebregiyorgis Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benoit Feix, Mylène Roussellet, Alexandre Venelli Side-Channel Analysis on Blinded Regular Scalar Multiplications. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jialin Huang, Serge Vaudenay, Xuejia Lai On the Key Schedule of Lightweight Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kwang Ho Kim, Chol Ok Lee, Christophe Nègre Binary Edwards Curves Revisited. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Willi Meier, Debdeep Mukhopadhyay (eds.) Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jean-François Biasse, David Jao, Anirudh Sankar A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall Online Template Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury EscApe: Diagonal Fault Analysis of APE. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Prakash Dey, Avishek Adhikari Improved Multi-Bit Differential Fault Analysis of Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1N. Nalla Anandakumar, Thomas Peyrin, Axel Poschmann A Very Compact FPGA Implementation of LED and PHOTON. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Colburn, Liam Keliher Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chao Xu, Bin Zhang 0003, Dengguo Feng Linear Cryptanalysis of FASER128/256 and TriviA-ck. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa On the Leakage of Information in Biometric Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Divya Gupta 0001, Amit Sahai On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christophe Clavier, Quentin Isorez, Antoine Wurcker Complete SCARE of AES-Like Block Ciphers by Chosen Plaintext Collision Power Analysis. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ayantika Chatterjee, Manish Kaushal, Indranil Sengupta 0001 Accelerating Sorting of Fully Homomorphic Encrypted Data. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama Compact Authenticated Key Exchange from Bounded CCA-Secure KEM. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Santanu Sarkar 0001, Raghu Kacker Security Analysis of the RC4+ Stream Cipher. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marine Minier, Gaël Thomas 0002 An Integral Distinguisher on Grøstl-512 v3. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marine Minier On the Security of Piccolo Lightweight Block Cipher against Related-Key Impossible Differentials. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vlad Dragoi, Pierre-Louis Cayrel, Brice Colombier, Tania Richmond Polynomial Structures in Code-Based Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ashish Choudhury Breaking the ${\mathcal{O}}(n|C|)$ Barrier for Unconditionally Secure Asynchronous Multiparty Computation - (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Céline Blondeau Improbable Differential from Impossible Differential: On the Validity of the Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001, Jongseok Choi, Howon Kim 0001 Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Anusha Chowdhury Improved Scan-Chain Based Attacks and Related Countermeasures. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Goutam Paul 0001, Serge Vaudenay (eds.) Progress in Cryptology - INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang 0001 Key-Private Proxy Re-encryption under LWE. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1John O. Pliam Alternating Product Ciphers: A Case for Provable Security Comparisons - (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Hanser, Daniel Slamanig Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Abhishek Kumar 0002, Somitra Kumar Sanadhya Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fabrizio De Santis, Michael Kasper, Stefan Mangard, Georg Sigl, Oliver Stein, Marc Stöttinger On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer Perspective. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Erich Wenger, Thomas Unterluggauer, Mario Werner 8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Benoit Feix, Vincent Verneuil There's Something about m-ary - Fixed-Point Scalar Multiplication Protected against Physical Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aurélie Bauer, Éliane Jaulmes Correlation Analysis against Protected SFM Implementations of RSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger Construction of Recursive MDS Diffusion Layers from Gabidulin Codes. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chaya Ganesh, Vipul Goyal, Satyanarayana V. Lokam On-Line/Off-Line Leakage Resilient Secure Computation Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Sasaki Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shengbao Wu, Mingsheng Wang Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thomas Plos, Christoph Dobraunig, Markus Hofinger, Alexander Oprisnik, Christoph Wiesmeier, Johannes Wiesmeier Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hongfeng Wu, Chunming Tang 0005, Rongquan Feng A New Model of Binary Elliptic Curves. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Kohel Efficient Arithmetic on Elliptic Curves in Characteristic 2. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vinod Vaikuntanathan How to Compute on Encrypted Data. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arpita Maitra, Goutam Paul 0001 Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Jeroen Doumen, Tanja Lange 0001, Jan-Jaap Oosterwijk Faster Batch Forgery Identification. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ingo von Maurich, Tim Güneysu Embedded Syndrome-Based Hashing. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean Faster Chosen-Key Distinguishers on Reduced-Round AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger, Marine Minier Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi 0001 On the Non-malleability of the Fiat-Shamir Transform. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi Leakage Squeezing of Order Two. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Orr Dunkelman From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Grégory Landais, Nicolas Sendrier Implementing CFS. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001 A Differential Fault Attack on the Grain Family under Reasonable Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart Using the Cloud to Determine Key Strengths. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tanja Lange 0001 Computing Small Discrete Logarithms Faster. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hemanta K. Maji, Manoj Prabhakaran 0001, Mike Rosulek A Unified Characterization of Completeness and Triviality for Secure Function Evaluation. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Daniel J. Bernstein SipHash: A Fast Short-Input PRF. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xusheng Zhang, Dongdai Lin Analysis of Optimum Pairing Products at High Security Levels. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mario Lamberger, Florian Mendel, Vincent Rijmen Collision Attack on the Hamsi-256 Compression Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aslí Bay, Atefeh Mashatan, Serge Vaudenay Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Donghoon Chang Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jung Woo Kim, Jungjoo Seo, Jin Hong 0001, Kunsoo Park, Sung-Ryul Kim High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Steven D. Galbraith, Mridul Nandi (eds.) Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Robert Drylo Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud 0001, Mylène Roussellet, Vincent Verneuil ROSETTA for Single Trace Analysis. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Sanjit Chatterjee (eds.) Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, María Naya-Plasencia, Markku-Juhani O. Saarinen Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson Cryptology: Where Is the New Frontier? Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shay Gueron Software Optimizations for Cryptographic Primitives on General Purpose x86_64 Platforms. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chester Rebeiro, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 669 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license