The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52) 2019 (41) 2020 (37) 2021 (36) 2022 (26) 2023 (28)
Publication types (Num. hits)
inproceedings(904) proceedings(26)
Venues (Conferences, Journals, ...)
ACISP(930)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Junko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yang Yu, Zhanfei Zhou A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous Setting. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas Plantard, Willy Susilo, Zhenfei Zhang Adaptive Precision Floating Point LLL. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi Attribute-Based Identification: Definitions and Efficient Constructions. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001 Public Key Cryptography for Mobile Cloud. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hui Zhang, Tsuyoshi Takagi Attacks on Multi-Prime RSA with Small Prime Difference. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang 0001 Improved Boomerang Attacks on SM3. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chris J. Mitchell Analysing the IOBC Authenticated Encryption Mode. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yao Lu 0002, Rui Zhang 0002, Dongdai Lin Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Katsumi Takahashi Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001, Meltem Sönmez Turan A Chosen IV Related Key Attack on Grain-128a. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Atsushi Takayasu, Noboru Kunihiro Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jie Chen 0021, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen 0002 Revocable Identity-Based Encryption from Lattices. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona Private Fingerprint Matching. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga A Game-Theoretic Perspective on Oblivious Transfer. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy Effort-Release Public-Key Encryption from Cryptographic Puzzles. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe 0001 On the Optimality of Lattices for the Coppersmith Technique. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jun Shao 0001 Anonymous ID-Based Proxy Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wenpan Jing, Haixia Xu 0002, Bao Li 0001 Non-malleable Instance-Dependent Commitment in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xuhua Zhou, Xuhua Ding, Kefei Chen A Generic Construction of Accountable Decryption and Its Applications. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aijun Ge 0001, Rui Zhang 0002, Cheng Chen, Chuangui Ma, Zhenfeng Zhang Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel 0001 Weimar-DM: A Highly Secure Double-Length Compression Function. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiazhe Chen, Leibo Li Low Data Complexity Attack on Reduced Camellia-256. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Yanbin Pan, Yingpu Deng An Algebraic Broadcast Attack against NTRU. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peter Lory, Manuel Liedel Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paul Stankovski, Martin Hell, Thomas Johansson 0001 Analysis of Xorrotation with Application to an HC-128 Variant. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1A. S. M. Kayes, Jun Han 0004, Alan W. Colman ICAF: A Context-Aware Framework for Access Control. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Haibo Tian, Xiaofeng Chen 0001, Jin Li 0002 A Short Non-delegatable Strong Designated Verifier Signature. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaori Tosu, Noboru Kunihiro Optimal Bounds for Multi-Prime Φ-Hiding Assumption. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kun Peng, Matt Henricksen How to Fix Two RSA-Based PVSS Schemes - Exploration and Solution. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takanori Isobe 0001, Kyoji Shibutani Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kirill Morozov, Tsuyoshi Takagi Zero-Knowledge Protocols for the McEliece Encryption. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xianmeng Meng, Xuexin Zheng Cryptanalysis of RSA with a Small Parameter. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaleb Lee, Colin Boyd, Juan Manuel González Nieto Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Axel Poschmann, Matthew J. B. Robshaw On Area, Time, and the Right Trade-Off. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Yi Mu 0001, Jennifer Seberry (eds.) Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiao Tan 0003, Duncan S. Wong Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui Fully Leakage-Resilient Signatures with Auxiliary Inputs. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuji Nagashima, Noboru Kunihiro Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Juan Manuel González Nieto, Mark Manulis, Dongdong Sun Fully Private Revocable Predicate Encryption. Search on Bibsonomy ACISP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Phuong Ha Nguyen, Hongjun Wu 0001, Huaxiong Wang Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu A Generic Variant of NIST's KAS2 Key Agreement Protocol. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Reza Sepahi, Ron Steinfeld, Josef Pieprzyk Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei 0001 Improved Security Analysis of Fugue-256 (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Udaya Parampalli, Philip Hawkes (eds.) Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yusong Du, Fangguo Zhang Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Meicheng Liu, Dongdai Lin, Dingyi Pei Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hongying Liu, Yukiyasu Tsunoo, Satoshi Goto Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson State Convergence in the Initialisation of Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lei Wei 0001, Christian Rechberger, Jian Guo 0001, Hongjun Wu 0001, Huaxiong Wang, San Ling Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman Toward Dynamic Attribute-Based Signcryption (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Claude Carlet On Known and New Differentially Uniform Functions. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christian L. F. Corniaux, Hossein Ghodosi A Verifiable Distributed Oblivious Transfer Protocol. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito Generic Construction of Strongly Secure Timed-Release Public-Key Encryption. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Juraj Sarinay Faster and Smoother - VSH Revisited. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jia Fan, Yuliang Zheng 0001, Xiaohu Tang A Single Key Pair is Adequate for the Zheng Signcryption. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama Preimage Attacks on Full-ARIRANG (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kun Peng Impracticality of Efficient PVSS in Real Life Security Standard (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yamin Liu, Bao Li 0001, Xianhui Lu, Dingding Jia Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bart Preneel, Hirotaka Yoshida, Dai Watanabe Finding Collisions for Reduced Luffa-256 v2 (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Benjamin W. Long Security in Depth through Smart Space Cascades. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Craig S. Wright Compliance or Security, What Cost? (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou 0001 Identity-Based Server-Aided Decryption. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shashank Lagishetty, Pruthvi Reddy Sabbu, Kannan Srinathan DMIPS - Defensive Mechanism against IP Spoofing. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel Algebraic Techniques in Differential Cryptanalysis Revisited. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hongbo Yu, Xiaoyun Wang 0001 Cryptanalysis of the Compression Function of SIMD. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mingwu Zhang, Tsuyoshi Takagi GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Application-Binding Protocol in the User Centric Smart Card Ownership Model. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Eduarda S. V. Freire 0001, Kenneth G. Paterson Provably Secure Key Assignment Schemes from Factoring. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang 0001 New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qiang Tang 0001 Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Kyoji Shibutani Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri On Maximum Differential Probability of Generalized Feistel. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tetsuya Hatano, Atsuko Miyaji, Takashi Sato T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yun Zhang, Christophe Tartary, Huaxiong Wang An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Willy Susilo, Yi Mu 0001 Electronic Cash with Anonymous User Suspension. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Manuel Barbosa, Pooya Farshim Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai Adaptive and Composable Non-committing Encryptions. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jean-François Biasse, Michael J. Jacobson Jr., Alan K. Silvester Security Estimates for Quadratic Field Based Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kenneth Koon-Ho Wong, Gregory V. Bard Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka Side-Channel Analysis of the K2 Stream Cipher. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Douglas Stebila One-Time-Password-Authenticated Key Exchange. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka A Multi-trapdoor Commitment Scheme from the RSA Assumption. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Willy Susilo, Yi Mu 0001 Proof-of-Knowledge of Representation of Committed Value and Its Applications. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Phuong Ha Nguyen, Lei Wei 0001, Huaxiong Wang, San Ling On Multidimensional Linear Cryptanalysis. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li 0002, Kwangjo Kim Identity-Based Chameleon Hash Scheme without Key Exposure. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Attribute-Based Authenticated Key Exchange. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonathan Etrog, Matthew J. B. Robshaw On Unbiased Linear Approximations. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Margus Niitsoo Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Rechberger Second-Preimage Analysis of Reduced SHA-1. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1James Birkett, Douglas Stebila Predicate-Based Key Exchange. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 930 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license