|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 97 occurrences of 80 keywords
|
|
|
Results
Found 336 publication records. Showing 336 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ueli M. Maurer |
Unifying Zero-Knowledge Proofs of Knowledge. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval |
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
1 | Owen Harrison, John Waldron |
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
RSA, Public-Key Cryptography, Residue Number System, Graphics Processor |
1 | Pooya Farshim, Bogdan Warinschi |
Certified Encryption Revisited. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption |
1 | Florian Mendel |
Two Passes of Tiger Are Not One-Way. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Barbosa, Pooya Farshim |
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Key Agreement, Timestamp, Entity Authentication |
1 | Carmine Ventre, Ivan Visconti |
Co-sound Zero-Knowledge with Public Keys. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
co-soundness, rZK, NIZK, public-key models |
1 | David Lubicz, Thomas Sirvent |
Attribute-Based Broadcast Encryption Scheme Made Efficient. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Public-key broadcast encryption, Generic model of groups with pairing, Attribute-based encryption |
1 | Noboru Kunihiro |
New Definition of Density on Knapsack Cryptosystems. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Low-Weight Knapsack Cryptosystems, Lattice Attack, (pseudo-)density, Shannon Entropy |
1 | Alexander W. Dent |
A Brief History of Provably-Secure Public-Key Encryption. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Bruce Schneier |
The Psychology of Security. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin |
A Proof of Security in O(2n) for the Benes Scheme. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
information-theoretic primitive, design of keyed hash functions, security above the birthday bound, unconditional security, Pseudorandom function |
1 | Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange 0001, Christiane Peters |
Twisted Edwards Curves. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Edwards curves, twisted Edwards curves, Montgomery curves, Elliptic curves, isogenies |
1 | Per Austrin, Gunnar Kreitz |
Lower Bounds for Subset Cover Based Broadcast Encryption. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Subset Cover, lower bounds, Broadcast Encryption, key revocation |
1 | Fabien Coelho |
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Jacobson Jr., Renate Scheidler, Daniel Weimer |
An Adaptation of the NICE Cryptosystem to Real Quadratic Orders. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision |
1 | Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy |
Implementation of the AES-128 on Virtex-5 FPGAs. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Abderrahmane Nitaj |
Another Generalization of Wiener's Attack on RSA. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Coppersmith’s method, Smooth numbers, Cryptanalysis, RSA, ECM |
1 | Serge Vaudenay (eds.) |
Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Galice, Marine Minier |
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
integral attacks, Rijndael-256, cryptanalysis, block cipher |
1 | Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar |
Correlated Keystreams in Moustique. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Moustique, related keys, eSTREAM |
1 | Jean-Philippe Aumasson, Raphael C.-W. Phan |
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Murat Cenk, Ferruh Özbudak |
Efficient Multiplication in F3kn, m>=1 and 5<=l<=18. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Chinese Remainder Theorem, pairing based cryptography, finite field multiplication |
1 | Simon Fischer 0002, Shahram Khazaei, Willi Meier |
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Chosen IV analysis, Stream ciphers, eSTREAM, Trivium, Grain |
1 | Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe |
On Compressible Pairings and Their Computation. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
compressible pairings, algebraictori, Eta pairing, Tate pairing, pairing-based cryptography, twists, Ate pairing |
1 | Christophe De Cannière, Özgül Küçük, Bart Preneel |
Analysis of Grain's Initialization Algorithm. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Julien Bringer, Hervé Chabanne |
An Authentication Protocol with Encrypted Biometric Data. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Private Information Retrieval protocol, Privacy, Authentication, Biometrics, Secure Sketches |
1 | Kamer Kaya, Ali Aydin Selçuk |
Robust Threshold Schemes Based on the Chinese Remainder Theorem. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal |
1 | Paolo D'Arco, Alfredo De Santis |
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Meiqin Wang |
Differential Cryptanalysis of Reduced-Round PRESENT. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Pascal Delaunay, Antoine Joux |
Yet Another Attack on Vest. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform |
1 | Andrea Röck |
Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Random Functions, Entropy, Stream Cipher, Collisions |
1 | Tetsu Iwata |
Authenticated Encryption Mode for Beyond the Birthday Bound Security. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher |
1 | Luk Bettale, Jean-Charles Faugère, Ludovic Perret |
Cryptanalysis of the TRMS Signature Scheme of PKC'05. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #336 of 336 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4] |
|