The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CRYPTO"( http://dblp.L3S.de/Venues/CRYPTO )

URL (DBLP): http://dblp.uni-trier.de/db/conf/crypto

Publication years (Num. hits)
1981 (40) 1982 (36) 1983 (30) 1984 (41) 1985 (45) 1986 (37) 1987 (44) 1988 (44) 1989 (60) 1990 (49) 1991 (39) 1992 (44) 1993 (41) 1994 (40) 1995 (37) 1996 (31) 1997 (38) 1998 (36) 1999 (40) 2000 (34) 2001 (34) 2002 (40) 2003 (37) 2004 (35) 2005 (34) 2006 (37) 2007 (35) 2008 (33) 2009 (40) 2010 (40) 2011 (44) 2012 (51)
Publication types (Num. hits)
inproceedings(1234) proceedings(32)
Venues (Conferences, Journals, ...)
CRYPTO(1266)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 559 occurrences of 325 keywords

Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yevgeniy Dodis, Roberto Oliveira 0001, Krzysztof Pietrzak On the Generic Insecurity of the Full Domain Hash. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Marc Fischlin Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin Secure Computation Without Authentication. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya Merkle-Damgård Revisited: How to Construct a Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Craig Gentry, Brent Waters Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Rafail Ostrovsky, William E. Skeith III Private Searching on Streaming Data. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation
1Hugo Krawczyk HMQV: A High-Performance Secure Diffie-Hellman Protocol. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail A Quantum Cipher with Near Optimal Key-Recycling. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key-recycling, private-key encryption, unconditional security, Quantum cryptography
1Omer Barkol, Yuval Ishai Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Benoît Chevallier-Mames An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu Finding Collisions in the Full SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision search attacks, Hash functions, SHA-1, SHA-0
1Krzysztof Pietrzak Composition Does Not Imply Adaptive Security. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kun Peng, Colin Boyd, Ed Dawson Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, correctness, permutation, zero knowledge, Shuffling
1Jan Camenisch, Anna Lysyanskaya Signature Schemes and Anonymous Credentials from Bilinear Maps. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Matthew K. Franklin (eds.) Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tal Moran, Ronen Shaltiel, Amnon Ta-Shma Non-interactive Timestamping in the Bounded Storage Model. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Qi Cheng 0001 On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Philip Hawkes, Gregory G. Rose Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yi Lu 0002, Serge Vaudenay Faster Correlation Attack on Bluetooth Keystream Generator E0. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Håvard Molland, Tor Helleseth An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Irregular clocked shift registers, Boolean functions, Stream cipher, Correlation attack
1Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi Signed Binary Representations Revisited. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Adriana Palacio The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Susan Landau 0001 Security, Liberty, and Electronic Communications. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Alexander May 0001 Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Coppersmiths method, RSA
1Masayuki Abe, Serge Fehr Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Rafail Ostrovsky Round-Optimal Secure Two-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Michael Scott, Paulo S. L. M. Barreto Compressed Pairings. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF efficient implementation, pairing-based cryptosystem
1Nicolas T. Courtois Feistel Schemes and Bi-linear Cryptanalysis. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Serge Fehr, Louis Salvail Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia Efficient Tree-Based Revocation in Groups of Low-State Devices. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Xavier Boyen Secure Identity Based Encryption Without Random Oracles. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dario Catalano, David Pointcheval, Thomas Pornin IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Antoine Joux Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Craig Gentry How to Compress Rabin Ciphertexts and Signatures (and More). Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Matthias Fitzi, Stefan Wolf 0001, Jürg Wullschleger Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pseudo-signatures, broadcast, information theory, Unconditional security, multi-party computation
1Dan Boneh, Xavier Boyen, Hovav Shacham Short Group Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jacques Patarin Security of Random Feistel Schemes with 5 or More Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Thomas Holenstein, Ueli M. Maurer, Johan Sjödin Complete Classification of Bilinear Hard-Core Functions. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Yvo Desmedt A New Paradigm of Hybrid Encryption Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF KEM, standard model, hybrid encryption
1K. Srinathan, Arvind Narayanan, C. Pandu Rangan Optimal Perfectly Secure Message Transmission. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Chun-Yuan Hsiao, Leonid Reyzin Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Christophe De Cannière, Michaël Quisquater On Multiple Linear Approximations. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiple linear approximations, stochastic systems of linear equations, maximum likelihood decoding, key-ranking, AES, DES, Linear cryptanalysis
1Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Marten van Dijk, David P. Woodruff Asymptotically Optimal Communication for Torus-Based Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Cynthia Dwork, Kobbi Nissim Privacy-Preserving Datamining on Vertically Partitioned Databases. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Eli Biham, Rafi Chen Near-Collisions of SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Daniele Micciancio, Salil P. Vadhan Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Niv Buchbinder, Erez Petrank Lower and Upper Bounds on Obtaining History Independence. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Xavier Boyen Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte The Impact of Decryption Failures on the Security of NTRU Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shai Halevi, Phillip Rogaway A Tweakable Enciphering Mode. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Rafael Pass On Deniability in the Common Reference String and Random Oracle Model. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Johannes Blömer, Alexander May 0001 New Partial Key Exposure Attacks on RSA. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Qi Cheng 0001 Primality Proving via One Round in ECPP and One Iteration in AKS. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Moti Yung Scalable Protocols for Authenticated Group Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen Relaxing Chosen-Ciphertext Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank Extending Oblivious Transfers Efficiently. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jean-Charles Faugère, Antoine Joux Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Byungheup Jun A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Non-abelian group, Braid group, Conjugacy Problem
1Karl Rubin, Alice Silverberg Torus-Based Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Matthew Cary, Ramarathnam Venkatesan A Message Authentication Code Based on Unimodular Matrix Groups. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF efficient mac, hash functions, Message authentication
1Adi Shamir, Eran Tromer Factoring Large Number with the TWIRL Device. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Tal Rabin Universal Composition with Joint State. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Kazuo Ohta Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz Cryptanalysis of SAFER++. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dan Boneh (eds.) Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Renato Renner, Stefan Wolf 0001 Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF quantum key agreement, authentication, Information-theoretic security, extractors, privacy amplification
1Jan Camenisch, Victor Shoup Practical Verifiable Encryption and Decryption of Discrete Logarithms. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Matthias Krause 0001 Algebraic Attacks on Combiners with Memory. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux Password Interception in a SSL/TLS Channel. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hugo Krawczyk SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jonathan Herzog, Moses D. Liskov, Silvio Micali Plaintext Awareness via Key Registration. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Jesper Buus Nielsen Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Cynthia Dwork, Andrew V. Goldberg, Moni Naor On Memory-Bound Functions for Fighting Spam. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Amit Sahai, David A. Wagner 0001 Private Circuits: Securing Hardware against Probing Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, provable security, side channel attacks, secure multi-party computation, circuit complexity
1Nicolas T. Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations
1Philippe Oechslin Making a Faster Cryptanalytic Time-Memory Trade-Off. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off
1Boaz Barak, Shien Jin Ong, Salil P. Vadhan Derandomization in Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jacques Patarin Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Salil P. Vadhan On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Omer Horvitz, Virgil D. Gligor Weak Key Authenticity and the Computational Completeness of Formal Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Weak Key Authenticity, Authentication, Cryptography, Encryption, Completeness, Formal Reasoning
1Moni Naor On Cryptographic Assumptions and Challenges. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Jesper Buus Nielsen Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Hugo Krawczyk Security Analysis of IKE's Signature-Based Key-Exchange Protocol. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson Threshold Password-Authenticated Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Siebert Private Computation - k-Connected versus 1-Connected Networks. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Chi-Jen Lu Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Adriana Palacio GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Alexander May 0001 Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Coppersmith's method, small secret exponent, RSA, lattice reduction
1Jesper Buus Nielsen Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart Flaws in Applying Proof Methodologies to Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Serge Fehr Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Serge Fehr, Ueli M. Maurer Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Frederik Vercauteren Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Kedlaya's algorithm, Monsky-Washnitzer cohomology, Hyperelliptic curves
1Ivan Damgård, Jesper Buus Nielsen Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 1266 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license