The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AFRICACRYPT"( http://dblp.L3S.de/Venues/AFRICACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/africacrypt

Publication years (Num. hits)
2008 (28) 2009 (27) 2010 (26) 2011 (27) 2012 (27) 2013 (27) 2014 (28) 2016 (19) 2017-2018 (34) 2019 (23) 2020 (22) 2022 (26) 2023 (22)
Publication types (Num. hits)
inproceedings(322) proceedings(14)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 97 occurrences of 80 keywords

Results
Found 336 publication records. Showing 336 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ueli M. Maurer Unifying Zero-Knowledge Proofs of Knowledge. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gaoli Wang, Shaohui Wang Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key-recovery, HMAC, second preimage attack, NMAC, HAVAL
1Owen Harrison, John Waldron Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA, Public-Key Cryptography, Residue Number System, Graphics Processor
1Pooya Farshim, Bogdan Warinschi Certified Encryption Revisited. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption
1Florian Mendel Two Passes of Tiger Are Not One-Way. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Manuel Barbosa, Pooya Farshim Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key Agreement, Timestamp, Entity Authentication
1Carmine Ventre, Ivan Visconti Co-sound Zero-Knowledge with Public Keys. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF co-soundness, rZK, NIZK, public-key models
1David Lubicz, Thomas Sirvent Attribute-Based Broadcast Encryption Scheme Made Efficient. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Public-key broadcast encryption, Generic model of groups with pairing, Attribute-based encryption
1Noboru Kunihiro New Definition of Density on Knapsack Cryptosystems. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Low-Weight Knapsack Cryptosystems, Lattice Attack, (pseudo-)density, Shannon Entropy
1Alexander W. Dent A Brief History of Provably-Secure Public-Key Encryption. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Bruce Schneier The Psychology of Security. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jacques Patarin A Proof of Security in O(2n) for the Benes Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information-theoretic primitive, design of keyed hash functions, security above the birthday bound, unconditional security, Pseudorandom function
1Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange 0001, Christiane Peters Twisted Edwards Curves. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Edwards curves, twisted Edwards curves, Montgomery curves, Elliptic curves, isogenies
1Per Austrin, Gunnar Kreitz Lower Bounds for Subset Cover Based Broadcast Encryption. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Subset Cover, lower bounds, Broadcast Encryption, key revocation
1Fabien Coelho An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michael J. Jacobson Jr., Renate Scheidler, Daniel Weimer An Adaptation of the NICE Cryptosystem to Real Quadratic Orders. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision
1Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy Implementation of the AES-128 on Virtex-5 FPGAs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Abderrahmane Nitaj Another Generalization of Wiener's Attack on RSA. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Coppersmith’s method, Smooth numbers, Cryptanalysis, RSA, ECM
1Serge Vaudenay (eds.) Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Samuel Galice, Marine Minier Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral attacks, Rijndael-256, cryptanalysis, block cipher
1Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar Correlated Keystreams in Moustique. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Moustique, related keys, eSTREAM
1Jean-Philippe Aumasson, Raphael C.-W. Phan How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Murat Cenk, Ferruh Özbudak Efficient Multiplication in F3kn, m>=1 and 5<=l<=18. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chinese Remainder Theorem, pairing based cryptography, finite field multiplication
1Simon Fischer 0002, Shahram Khazaei, Willi Meier Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chosen IV analysis, Stream ciphers, eSTREAM, Trivium, Grain
1Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe On Compressible Pairings and Their Computation. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF compressible pairings, algebraictori, Eta pairing, Tate pairing, pairing-based cryptography, twists, Ate pairing
1Christophe De Cannière, Özgül Küçük, Bart Preneel Analysis of Grain's Initialization Algorithm. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne An Authentication Protocol with Encrypted Biometric Data. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private Information Retrieval protocol, Privacy, Authentication, Biometrics, Secure Sketches
1Kamer Kaya, Ali Aydin Selçuk Robust Threshold Schemes Based on the Chinese Remainder Theorem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal
1Paolo D'Arco, Alfredo De Santis Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Meiqin Wang Differential Cryptanalysis of Reduced-Round PRESENT. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Pascal Delaunay, Antoine Joux Yet Another Attack on Vest. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform
1Andrea Röck Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random Functions, Entropy, Stream Cipher, Collisions
1Tetsu Iwata Authenticated Encryption Mode for Beyond the Birthday Bound Security. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher
1Luk Bettale, Jean-Charles Faugère, Ludovic Perret Cryptanalysis of the TRMS Signature Scheme of PKC'05. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #336 of 336 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license