The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASIACRYPT"( http://dblp.L3S.de/Venues/ASIACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiacrypt

Publication years (Num. hits)
1990-1991 (47) 1993-1994 (37) 1995-1996 (36) 1998 (34) 1999 (33) 2000 (48) 2001 (35) 2002 (37) 2003 (34) 2004 (38) 2005 (38) 2006 (31) 2007 (36) 2008 (35) 2009 (42) 2010 (36) 2011 (41) 2012 (46) 2020 (1)
Publication types (Num. hits)
inproceedings(665) proceedings(20)
Venues (Conferences, Journals, ...)
ASIACRYPT(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 431 occurrences of 269 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sébastien Kunz-Jacques, Frédéric Muller New Improvements of Davies-Murphy Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Justin Brickell, Vitaly Shmatikov Privacy-Preserving Graph Algorithms in the Semi-honest Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Carlos Cid, Gaëtan Leurent An Analysis of the XSL Algorithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XSL algorithm, T? method, AES, Linearization
1Martin Hirt, Jesper Buus Nielsen Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhifang Zhang, Mulan Liu, Liangliang Xiao Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
1Pil Joong Lee (eds.) Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik Secret Handshakes from CA-Oblivious Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee 0001 Constant-Round Authenticated Group Key Exchange for Dynamic Groups. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF dynamic authenticated group key exchange, ad hoc networks
1Ho-Ick Suk Information Security in Korea IT839 Strategy. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Taizo Shirai, Bart Preneel On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF optimal diffusion mapping, active S-boxes, MDS, Feistel cipher
1Eonkyung Lee Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yi Lu 0002, Serge Vaudenay Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Moti Yung Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Zulfikar Ramzan Eliminating Random Permutation Oracles in the Even-Mansour Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001 Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Joydip Mitra, Palash Sarkar 0001 Time-Memory Trade-Off Attacks on Multiplications and T-Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF T–functions, cryptanalysis, stream cipher, multiplication, time-memory trade-off
1Berry Schoenmakers, Pim Tuyls Practical Two-Party Computation Based on the Conditional Gate. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Bartosz Przydatek, Reto Strobl Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Luca Breveglieri, Alessandra Cherubini, Marco Macchetti On the Generalized Linear Equivalence of Functions Over Finite Fields. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF linear equivalence, APN functions, Boolean functions, differential cryptanalysis, S-boxes, linear cryptanalysis
1Mihir Bellare, Adriana Palacio Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Frédéric Muller The MD2 Hash Function Is Not One-Way. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kazumaro Aoki, Hiroki Ueda Sieving Using Bucket Sort. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita Comparison Between XL and Gröbner Basis Algorithms. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multivariate polynomial equations, Solving Systems, Gröbner basis, Semi-regular Sequences, Algebraic attacks, XL algorithm
1Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey Privacy in Non-private Environments. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Muxiang Zhang New Approaches to Password Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Adi Shamir Stream Ciphers: Dead or Alive? Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek On the Security of MOR Public Key Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MOR cryptosystem, group extension, central commutator attack, discrete logarithm problem
1Phillip Rogaway Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001 Masking Based Domain Extenders for UOWHFs: Bounds and Constructions. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF UOWHF, domain extender, parallel algorithm
1Deukjo Hong, Bart Preneel, Sangjin Lee 0002 Higher Order Universal One-Way Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function
1Lan Nguyen, Reihaneh Safavi-Naini Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Claus Diem The XL-Algorithm and a Conjecture from Commutative Algebra. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Isamu Teranishi, Jun Furukawa 0001, Kazue Sako k-Times Anonymous Authentication (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tatsuyuki Matsushita, Hideki Imai A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public-key traitor tracing, Black-box tracing, Self-defensive pirates
1Jean Monnerat, Serge Vaudenay Generic Homomorphic Undeniable Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Märt Saarepera On Provably Secure Time-Stamping Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Thomas Baignères, Pascal Junod, Serge Vaudenay How Far Can We Go Beyond Linear Cryptanalysis? Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF statistical cryptanalysis, Block ciphers, linear cryptanalysis
1Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette The Davies-Murphy Power Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Duong Hieu Phan, David Pointcheval OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ian F. Blake, Vladimir Kolesnikov Strong Conditional Oblivious Transfer and Computing on Intervals. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard The Insecurity of Esign in Practical Implementations. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Wonil Lee, Donghoon Chang, Sangjin Lee 0002, Soo Hak Sung, Mridul Nandi New Parallel Domain Extenders for UOWHF. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF UOWHF, masking assignment, sequential construciton, parallel construction, tree based construction, hash function
1Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James P. Hughes 0001, Paul C. Leyland Factoring Estimates for a 1024-Bit RSA Modulus. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 1024-bit RSA, TWIRL, factorization, number field sieve
1Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Olivier Billet, Henri Gilbert A Traceable Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance
1Kaoru Kurosawa, Tsuyoshi Takagi Some RSA-Based Encryption Schemes with Tight Security Reduction. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA-Paillier, Rabin-Paillier, Factoring, semantic security, tight reduction
1Miodrag J. Mihaljevic Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stateless receivers, time varying schemes, heterogeneous structures, tree graphs, reconfigurability, key management, broadcast encryption
1Duong Hieu Phan, David Pointcheval Chosen-Ciphertext Security without Redundancy. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Huaxiong Wang, Josef Pieprzyk Efficient One-Time Proxy Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jason E. Gower Rotations and Translations of Number Field Sieve Polynomials. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Emmanuel Bresson, Dario Catalano, David Pointcheval A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa Verifiable Homomorphic Oblivious Transfer and Private Equality Test. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptographic auctions, verifiable oblivious transfer, verifiable private equality test, homomorphic encryption
1Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Mark L. Bauer, Safuat Hamdy On Class Group Computations Using the Number Field Sieve. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk Universal Designated-Verifier Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Frédéric Muller A New Attack against Khazad. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Pradeep Kumar Mishra, Palash Sarkar 0001 Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hyperelliptic curve cryptography, encapsulated add-and-double, parallel algorithm, Jacobian, explicit formula
1Chi-Sung Laih (eds.) Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Breno de Medeiros Efficient Group Signatures without Trapdoors. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy and anonymity, cryptographic protocols, Group signatures
1David R. Kohel The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF modular curves, point counting, Elliptic curve cryptography
1SeongHan Shin, Kazukuni Kobara, Hideki Imai Leakage-Resilient Authenticated Key Establishment Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto, Jacques Stern Almost Uniform Density of Power Residues and the Provable Security of ESIGN. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sattam S. Al-Riyami, Kenneth G. Paterson Certificateless Public Key Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Chih-Hung Wang Untraceable Fair Network Payment Protocols with Off-Line TTP. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Designated Confirmer Signatures, Cryptography, Electronic Commerce, Undeniable Signature, Electronic cash, Payment System
1Helger Lipmaa On Diophantine Complexity and Statistical Zero-Knowledge Arguments. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Arguments of knowledge, Diophantine complexity, integer commitment scheme, statistical zero knowledge
1Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Iwan M. Duursma, Hyang-Sook Lee Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi Generalized Powering Functions and Their Application to Digital Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF modular powering function, digital signature, RSA, factoring
1Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle Cryptanalysis of 3-Pass HAVAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hong-Sen Yan, Hsing-Hui Huang The Secret and Beauty of Ancient Chinese Padlocks. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, David Naccache Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Nicolas Thériault Index Calculus Attack for Hyperelliptic Curves of Small Genus. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Gene Tsudik, Shouhuai Xu Accumulating Composites and Improved Group Signing. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Fangguo Zhang, Kwangjo Kim ID-Based Blind Signature and Ring Signature from Pairings. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Provably security, Bilinear pairings, Blind signature, Ring signature, ID-based cryptography
1Dario Catalano, Phong Q. Nguyen, Jacques Stern The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Paillier, Hensel, One-wayness, RSA, Lattice, Discrete logarithm, Public-key
1Hiroki Koga A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Eiichiro Fujisaki A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Alice Silverberg Hierarchical ID-Based Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF hierarchical identity-based cryptography, elliptic curves, identity-based cryptography, pairing-based cryptography
1Moti Yung Crypto-integrity. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee 0002, Seok Won Jung Amplified Boomerang Attack against Reduced-Round SHACAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF SHACAL, Amplified boomerang attack, Boomerang-distinguisher
1Alejandro Hevia, Daniele Micciancio The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Chanathip Namprempre Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Gregory Neven Transitive Signatures Based on Factoring and RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF transitive signatures, RSA, Signatures
1Elad Barkan, Eli Biham In How Many Ways Can You Write Rijndael? Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Emmanuel Bresson, Olivier Chevassut, David Pointcheval Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kishan Chand Gupta, Palash Sarkar 0001 Improved Construction of Nonlinear Resilient S-Boxes. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF stream cipher, Resiliency, nonlinearity, S-box, algebraic degree, Griesmer bound
1Alexander W. Dent Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Yan-Cheng Chang, Chun-Yun Hsiao, Chi-Jen Lu On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Moti Yung Threshold Cryptosystems Based on Factoring. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki 1-out-of-n Signatures from a Variety of Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco, Douglas R. Stinson On Unconditionally Secure Robust Distributed Key Distribution Centers. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer Analysis of Bernstein's Factorization Circuit. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Ronald Cramer, Serge Fehr Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai Unconditionally Secure Anonymous Encryption and Group Authentication. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Louis Granboulan Short Signatures in the Random Oracle Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF random oracle and ideal cipher models, proven security, digital signature, padding
Displaying result #301 - #400 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license