The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "INDOCRYPT"( http://dblp.L3S.de/Venues/INDOCRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/indocrypt

Publication years (Num. hits)
2000 (26) 2001 (33) 2002 (34) 2003 (32) 2004 (33) 2005 (33) 2006 (32) 2007 (34) 2008 (34) 2009 (29) 2010 (25) 2011 (29) 2012 (32) 2013 (22) 2014 (26) 2015 (20) 2016 (24) 2017 (21) 2018 (21) 2019 (29) 2020 (40) 2021 (28) 2022 (32)
Publication types (Num. hits)
inproceedings(646) proceedings(23)
Venues (Conferences, Journals, ...)
INDOCRYPT(669)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 500 occurrences of 277 keywords

Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Eric Rescorla Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography? Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Santanu Sarkar 0001 Partial Key Exposure: Generalized Framework to Attack RSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin Ågren, Thomas Johansson 0001 Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christof Paar The Yin and Yang Sides of Embedded Security. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tanja Lange 0001 Elliptic Curves for Applications. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jens-Peter Kaps, Panasayya Yalla, Kishore Kumar Surapathi, Bilal Habib, Susheel Vadlamudi, Smriti Gurung, John Pham Lightweight Implementations of SHA-3 Candidates on FPGAs. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hemanta K. Maji, Manoj Prabhakaran 0001 The Limits of Common Coins: Further Results. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shashank Agrawal, Abhinav Mehta, Kannan Srinathan Secure Message Transmission in Asynchronous Directed Graphs. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammad Hassan Habibi, Mohammad Reza Aref, Di Ma Addressing Flaws in RFID Authentication Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sourav Sen Gupta 0001, Anupam Chattopadhyay, Ayesha Khalid HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Roger Dingledine Tor and the Censorship Arms Race: Lessons Learned. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Robert Drylo On Constructing Families of Pairing-Friendly Elliptic Curves with Variable Discriminant. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel 0001 Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang On Related-Key Attacks and KASUMI: The Case of A5/3. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Roy D'Souza, David Jao, Ilya Mironov, Omkant Pandey Publicly Verifiable Secret Sharing for Cloud-Based Key Management. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Maxime Nassar, Sylvain Guilley, Jean-Luc Danger Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001 On the Evolution of GGHN Cipher. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Craig Costello, Kristin E. Lauter, Michael Naehrig Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil Square Always Exponentiation. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1María Naya-Plasencia, Andrea Röck, Willi Meier Practical Analysis of Reduced-Round Keccak. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jin Hong 0001, Ga Won Lee 0003, Daegun Ma Analysis of the Parallel Distinguished Point Tradeoff. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Tomislav Nad Boomerang Distinguisher for the SIMD-512 Compression Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Avradip Mandal, Jacques Patarin, Valérie Nachef Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sourav Sen Gupta 0001, Koushik Sinha, Subhamoy Maitra, Bhabani P. Sinha One Byte per Clock: A Novel RC4 Hardware. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mridul Nandi, Souradyuti Paul Speeding Up the Wide-Pipe: Secure and Fast Hashing. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann 0001 CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sedat Akleylek, Murat Cenk, Ferruh Özbudak Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange 0001, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang ECC2K-130 on NVIDIA GPUs. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Meltem Sönmez Turan, Erdener Uyan Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bart Preneel Cryptographic Hash Functions: Theory and Practice. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Santanu Sarkar 0001, Sourav Sen Gupta 0001, Subhamoy Maitra Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fabien Herbaut, Pierre-Yvan Liardet, Nicolas Méloni, Yannick Teglia, Pascal Véron Random Euclidean Addition Chain Generation and Its Application to Point Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raymond Manley, David Gregg A Program Generator for Intel AES-NI Instructions. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mridul Nandi The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Cihangir Tezcan The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Emmanuel Prouff, Thomas Roche Attack on a Higher-Order Masking of the AES Based on Homographic Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen, Mahmoud Modarres-Hashemi Improved Impossible Differential Cryptanalysis of 7-Round AES-128. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Neal Koblitz Getting a Few Things Right and Many Things Wrong. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gregory V. Bard, Nicolas T. Courtois, Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi Cryptanalysis of Tav-128 Hash Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann 0001 Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks New Boomerang Attacks on ARIA. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yoni De Mulder, Brecht Wyseur, Bart Preneel Cryptanalysis of a Perturbated White-Box AES Implementation. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Paul Stankovski Greedy Distinguishers and Nonrandomness Detectors. Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Guang Gong, Kishan Chand Gupta (eds.) Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Feng Bao 0001 Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security
1Daniel J. Bernstein, Tanja Lange 0001, Ruben Niederhagen, Christiane Peters, Peter Schwabe FSBday. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Birthday, FSB - Wagner, not much Memory, SHA-3
1Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu 0007 Towards Secure and Practical MACs for Body Sensor Networks. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Colleen Swanson, David Jao A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key agreement, certificateless public key cryptography
1Johannes Buchmann 0001, Richard Lindner Secure Parameters for SWIFFT. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash functions, lattices, post-quantum cryptography
1Florian Mendel, Tomislav Nad A Distinguisher for the Compression Function of SIMD-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, SIMD, distinguisher, SHA-3 candidate
1Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji Private Interrogation of Devices via Identification Codes. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Polynomial Reconstruction Problem, Privacy, Identification
1Gildas Avoine, Christian Floerkemeier, Benjamin Martin 0002 RFID Distance Bounding Multistate Enhancement. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mafia fraud, Authentication, RFID, Distance bounding
1Arpita Patra, Ashish Choudhary, C. Pandu Rangan Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Information Theoretic Security, Multiparty Computation, Error Probability
1Julien Bringer, Hervé Chabanne, Thomas Icart On Physical Obfuscation of Cryptographic Algorithms. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF POK, stream ciphers, masking, RFID tags, PUF
1S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan Identity Based Aggregate Signcryption Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography
1Laila El Aimani On Generic Constructions of Designated Confirmer Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Designated Confirmer signatures, Reduction/meta-reduction, Zero Knowledge, Generic construction
1Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HAS-160, differential cryptanalysis, related-key rectangle attack
1Bimal K. Roy, Nicolas Sendrier (eds.) Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger, Marine Minier, Benjamin Pousse Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, software design, FCSRs
1Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin Fault Analysis of Rabbit: Toward a Secret Key Leakage. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF carry analysis, Stream cipher, fault attacks, Rabbit
1Markus Rückert Verifiably Encrypted Signatures from RSA without NIZKs. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Online contract signing, RSA, Merkle hash trees
1Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal Improved Meet-in-the-Middle Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, Rijndael, meet-in-the-middle attack
1Mahabir Prasad Jhanwar, Rana Barua Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA Group, Free Group, Quadratic Residues
1Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Indifferentiability, Merkle-Damgård, HAIFA, Tree mode of operations with counter
1Olivier Billet, Kaoutar Elkhiyaoui Two Attacks against the Ff RFID Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt Efficient Constructions of Signcryption Schemes and Signcryption Composability. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-user security, signcryption, generic construction
1Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu Reusing Static Keys in Key Agreement Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Conrado Porto Lopes Gouvêa, Julio César López-Hernández Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, pairing based cryptography, software implementation
1Dong Su, Kewei Lv A New Hard-Core Predicate of Paillier's Trapdoor Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Paillier’s trapdoor function, Hard-core Predicate, Most significant bit
1Kota Ideguchi, Dai Watanabe Second Preimage Attack on SHAMATA-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, second preimage attack, SHA-3 candidate
1Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga Cache Timing Attacks on Clefia. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gérald Gavin, Marine Minier Oblivious Multi-variate Polynomial Evaluation. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Homomorphic encryption schemes, Oblivious Polynomial Evaluation (OPE), semantic security
1Sumanta Sarkar On the Symmetric Negabent Boolean Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF negabent function, nega-Hadamard transform, Krawtchouk polynomial, Boolean function, bent function, symmetric Boolean function
1Kazuki Yoneyama Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF password-based key exchange, password-based server aided key exchange, leakage of internal states, undetectable on-line dictionary attack
1Gaetan Bisson, Takakazu Satoh More Discriminants with the Brezing-Weng Method. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pairing-friendly curve generation, Brezing-Weng method
1Michal Hojsík, Bohuslav Rudolf Floating Fault Analysis of Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher, Trivium, differential fault analysis
1Mridul Nandi Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online cipher, CBC, universal hash function, random permutation
1Daniel J. Bernstein, Peter Schwabe New AES Software Speed Records. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, software implementation
1Mete Akgün, Pinar Kavak, Hüseyin Demirci New Results on the Key Scheduling Algorithm of RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key Scheduling Algorithm, State Table, Cryptanalysis, Stream Cipher, RC4
1Arpita Patra, Ashish Choudhary, C. Pandu Rangan Round Efficient Unconditionally Secure Multiparty Computation Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Theoretic Security, Multiparty Computation
1Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jens-Peter Kaps Chai-Tea, Cryptographic Hardware Implementations of xTEA. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF symmetric key algorithms, TEA, XTEA, FPGA, ASIC, Efficient implementation
1Jean-Philippe Aumasson Faster Multicollisions. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash function, collision
1Jing Yang, Zhenfeng Zhang A New Anonymous Password-Based Authenticated Key Exchange Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Password-based AKE, Anonymous authentication
1Sorina Ionica, Antoine Joux Another Approach to Pairing Computation in Edwards Coordinates. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Miller’s algorithm, Edwards coordinates, Tate pairing
1Chester Rebeiro, Debdeep Mukhopadhyay High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff Concrete Security for Entity Recognition: The Jane Doe Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller A Differential-Linear Attack on 12-Round Serpent. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yanli Ren, Dawu Gu Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shahram Khazaei, Willi Meier New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Self-synchronizing Stream Ciphers, T-functions, Key Recovery
1Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold Multi Authority ABE, Without a central authority
1Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
1Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das 0004 (eds.) Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jirí Vábek, Daniel Joscák, Milan Bohácek, Jirí Tuma A New Type of 2-Block Collisions in MD5. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stevens algorithm, collisions, MD5, differential paths
1Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim New Impossible Differential Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, Impossible differential cryptanalysis
Displaying result #301 - #400 of 669 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license