Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yevgeniy Dodis, Roberto Oliveira 0001, Krzysztof Pietrzak |
On the Generic Insecurity of the Full Domain Hash. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Boldyreva, Marc Fischlin |
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin |
Secure Computation Without Authentication. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya |
Merkle-Damgård Revisited: How to Construct a Hash Function. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Craig Gentry, Brent Waters |
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
1 | Hugo Krawczyk |
HMQV: A High-Performance Secure Diffie-Hellman Protocol. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Thomas Brochmann Pedersen, Louis Salvail |
A Quantum Cipher with Near Optimal Key-Recycling. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
key-recycling, private-key encryption, unconditional security, Quantum cryptography |
1 | Omer Barkol, Yuval Ishai |
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Chevallier-Mames |
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu |
Finding Collisions in the Full SHA-1. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
collision search attacks, Hash functions, SHA-1, SHA-0 |
1 | Krzysztof Pietrzak |
Composition Does Not Imply Adaptive Security. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Colin Boyd, Ed Dawson |
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
privacy, correctness, permutation, zero knowledge, Shuffling |
1 | Jan Camenisch, Anna Lysyanskaya |
Signature Schemes and Anonymous Credentials from Bilinear Maps. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Matthew K. Franklin (eds.) |
Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tal Moran, Ronen Shaltiel, Amnon Ta-Shma |
Non-interactive Timestamping in the Bounded Storage Model. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Qi Cheng 0001 |
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Philip Hawkes, Gregory G. Rose |
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yi Lu 0002, Serge Vaudenay |
Faster Correlation Attack on Bluetooth Keystream Generator E0. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Håvard Molland, Tor Helleseth |
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
Irregular clocked shift registers, Boolean functions, Stream cipher, Correlation attack |
1 | Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi |
Signed Binary Representations Revisited. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Adriana Palacio |
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Susan Landau 0001 |
Security, Liberty, and Electronic Communications. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Alexander May 0001 |
Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
Coppersmiths method, RSA |
1 | Masayuki Abe, Serge Fehr |
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Rafail Ostrovsky |
Round-Optimal Secure Two-Party Computation. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Michael Scott, Paulo S. L. M. Barreto |
Compressed Pairings. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
efficient implementation, pairing-based cryptosystem |
1 | Nicolas T. Courtois |
Feistel Schemes and Bi-linear Cryptanalysis. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Serge Fehr, Louis Salvail |
Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia |
Efficient Tree-Based Revocation in Groups of Low-State Devices. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Xavier Boyen |
Secure Identity Based Encryption Without Random Oracles. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dario Catalano, David Pointcheval, Thomas Pornin |
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Joux |
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry |
How to Compress Rabin Ciphertexts and Signatures (and More). |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Fitzi, Stefan Wolf 0001, Jürg Wullschleger |
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
pseudo-signatures, broadcast, information theory, Unconditional security, multi-party computation |
1 | Dan Boneh, Xavier Boyen, Hovav Shacham |
Short Group Signatures. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin |
Security of Random Feistel Schemes with 5 or More Rounds. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Holenstein, Ueli M. Maurer, Johan Sjödin |
Complete Classification of Bilinear Hard-Core Functions. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Yvo Desmedt |
A New Paradigm of Hybrid Encryption Scheme. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
KEM, standard model, hybrid encryption |
1 | K. Srinathan, Arvind Narayanan, C. Pandu Rangan |
Optimal Perfectly Secure Message Transmission. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Chun-Yuan Hsiao, Leonid Reyzin |
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Alex Biryukov, Christophe De Cannière, Michaël Quisquater |
On Multiple Linear Approximations. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
multiple linear approximations, stochastic systems of linear equations, maximum likelihood decoding, key-ranking, AES, DES, Linear cryptanalysis |
1 | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin |
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Marten van Dijk, David P. Woodruff |
Asymptotically Optimal Communication for Torus-Based Cryptography. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro |
Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti |
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork, Kobbi Nissim |
Privacy-Preserving Datamining on Vertically Partitioned Databases. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Rafi Chen |
Near-Collisions of SHA-0. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Micciancio, Salil P. Vadhan |
Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Niv Buchbinder, Erez Petrank |
Lower and Upper Bounds on Obtaining History Independence. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte |
The Impact of Decryption Failures on the Security of NTRU Encryption. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi, Phillip Rogaway |
A Tweakable Enciphering Mode. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass |
On Deniability in the Common Reference String and Random Oracle Model. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Blömer, Alexander May 0001 |
New Partial Key Exposure Attacks on RSA. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Qi Cheng 0001 |
Primality Proving via One Round in ECPP and One Iteration in AKS. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Moti Yung |
Scalable Protocols for Authenticated Group Key Exchange. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen |
Relaxing Chosen-Ciphertext Security. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank |
Extending Oblivious Transfers Efficiently. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Charles Faugère, Antoine Joux |
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Byungheup Jun |
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
Non-abelian group, Braid group, Conjugacy Problem |
1 | Karl Rubin, Alice Silverberg |
Torus-Based Cryptography. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Cary, Ramarathnam Venkatesan |
A Message Authentication Code Based on Unimodular Matrix Groups. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
efficient mac, hash functions, Message authentication |
1 | Adi Shamir, Eran Tromer |
Factoring Large Number with the TWIRL Device. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Tal Rabin |
Universal Composition with Joint State. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yuichi Komano, Kazuo Ohta |
Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Alex Biryukov, Christophe De Cannière, Gustaf Dellkrantz |
Cryptanalysis of SAFER++. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh (eds.) |
Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Renato Renner, Stefan Wolf 0001 |
Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
quantum key agreement, authentication, Information-theoretic security, extractors, privacy amplification |
1 | Jan Camenisch, Victor Shoup |
Practical Verifiable Encryption and Decryption of Discrete Logarithms. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Frederik Armknecht, Matthias Krause 0001 |
Algebraic Attacks on Combiners with Memory. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Elad Barkan, Eli Biham, Nathan Keller |
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux |
Password Interception in a SSL/TLS Channel. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Krawczyk |
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Herzog, Moses D. Liskov, Silvio Micali |
Plaintext Awareness via Key Registration. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Jesper Buus Nielsen |
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork, Andrew V. Goldberg, Moni Naor |
On Memory-Bound Functions for Fighting Spam. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Amit Sahai, David A. Wagner 0001 |
Private Circuits: Securing Hardware against Probing Attacks. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
Cryptanalysis, provable security, side channel attacks, secure multi-party computation, circuit complexity |
1 | Nicolas T. Courtois |
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations |
1 | Philippe Oechslin |
Making a Faster Cryptanalytic Time-Memory Trade-Off. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off |
1 | Boaz Barak, Shien Jin Ong, Salil P. Vadhan |
Derandomization in Cryptography. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin |
Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Salil P. Vadhan |
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Omer Horvitz, Virgil D. Gligor |
Weak Key Authenticity and the Computational Completeness of Formal Encryption. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
Weak Key Authenticity, Authentication, Cryptography, Encryption, Completeness, Formal Reasoning |
1 | Moni Naor |
On Cryptographic Assumptions and Challenges. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Jesper Buus Nielsen |
Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Hugo Krawczyk |
Security Analysis of IKE's Signature-Based Key-Exchange Protocol. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson |
Threshold Password-Authenticated Key Exchange. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Joux, Gwenaëlle Martinet, Frédéric Valette |
Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Siebert |
Private Computation - k-Connected versus 1-Connected Networks. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Jen Lu |
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Adriana Palacio |
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Alexander May 0001 |
Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Coppersmith's method, small secret exponent, RSA, lattice reduction |
1 | Jesper Buus Nielsen |
Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart |
Flaws in Applying Proof Methodologies to Signature Schemes. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ronald Cramer, Serge Fehr |
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Serge Fehr, Ueli M. Maurer |
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Frederik Vercauteren |
Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Kedlaya's algorithm, Monsky-Washnitzer cohomology, Hyperelliptic curves |
1 | Ivan Damgård, Jesper Buus Nielsen |
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|