The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Inscrypt"( http://dblp.L3S.de/Venues/Inscrypt )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cisc

Publication years (Num. hits)
2006 (24) 2007 (41) 2008 (32) 2009 (33) 2010 (35) 2011 (28) 2012 (24) 2013 (26) 2014 (30) 2015 (28) 2016 (33) 2017 (31) 2018 (38) 2019 (34) 2020 (33) 2021 (30) 2022 (26) 2023 (1)
Publication types (Num. hits)
inproceedings(510) proceedings(17)
Venues (Conferences, Journals, ...)
Inscrypt(527)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 197 occurrences of 155 keywords

Results
Found 527 publication records. Showing 527 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Zhe Liu 0001, Johann Großschädl, Duncan S. Wong Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mingjie Liu, Jiazhe Chen, Hexin Li Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Miroslaw Kutylowski, Moti Yung (eds.) Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Przemyslaw Kubiak 0001, Miroslaw Kutylowski Supervised Usage of Signature Creation Devices. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shan Chen, Kunpeng Wang, Dongdai Lin, Tao Wang Omega Pairing on Hyperelliptic Curves. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xinxin Gong, Bin Zhang 0003, Dengguo Feng, Tongjiang Yan Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over Z_pq. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jian Zou, Wenling Wu, Shuang Wu 0004 Cryptanalysis of the Round-Reduced GOST Hash Function. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0009, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Sherman S. M. Chow, Wenchang Shi Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhi Hu, Maozhi Xu The Gallant-Lambert-Vanstone Decomposition Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaoqian Li, Peng Wang 0009, Bao Li 0001, Zhelei Sun Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks. Search on Bibsonomy Inscrypt The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chuankun Wu, Moti Yung, Dongdai Lin (eds.) Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Phuong Ha Nguyen, Chester Rebeiro, Debdeep Mukhopadhyay, Huaxiong Wang Improved Differential Cache Attacks on SMS4. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Subidh Ali, Debdeep Mukhopadhyay Differential Fault Analysis of Twofish. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Walter 0001, Stanislav Bulygin, Johannes Buchmann 0001 Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tianze Wang, Meicheng Liu, Dongdai Lin Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yang Li 0001, Kazuo Ohta, Kazuo Sakiyama An Extension of Fault Sensitivity Analysis Based on Clockwise Collision. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuan Chen 0008, Qingkuan Dong RCCA Security for KEM+DEM Style Hybrid Encryptions. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou A Robust Fuzzy Extractor without ECCs. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lidong Han, Wei Wei, Mingjie Liu On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mehdi Khalfaoui, Refik Molva, Laurent Gomez Secure Product Tracking in Supply Chain. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yang Yu, Zhanfei Zhou An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lin Wang 0024, Zhi Hu New Sequences of Period p n and p n + 1 via Projective Linear Groups. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aslí Bay, Ioana Boureanu, Aikaterini Mitrokotsa, Iosif Spulber, Serge Vaudenay The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Teng Guo, Feng Liu 0001, Chuan Kun Wu Visual Cryptography for Natural Images and Visual Voting. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Risto M. Hakala, Atle Kivelä, Kaisa Nyberg Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Moesfa Soeheila Mohamad, Geong Sen Poh Verifiable Structured Encryption. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shlomi Dolev, Nova Fandina, Ximing Li 0001 Nested Merkle's Puzzles against Sampling Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tao Shi, Vladimir Anashin, Dongdai Lin Fast Evaluation of T-Functions via Time-Memory Trade-Offs. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Harry Bartlett, Mufeed Juma AlMashrafi, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong A General Model for MAC Generation Using Direct Injection. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Ai Ren, Chengdong Tao Embedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuxin Meng 0001, Duncan S. Wong, Roman Schlegel, Lam-for Kwok Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li 0001 An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kazumaro Aoki, Kan Yasuda The Security and Performance of "GCM" when Short Multiplications Are Used Instead. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhelei Sun, Peng Wang 0009, Liting Zhang Collision Attacks on Variant of OCB Mode and Its Series. Search on Bibsonomy Inscrypt The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wei Huang, Xianfeng Zhao, Dengguo Feng, Rennong Sheng Benchmarking for Steganography by Kernel Fisher Discriminant Criterion. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xabier Ugarte-Pedrero, Igor Santos, Pablo García Bringas Boosting Scalability in Anomaly-Based Packed Executable Filtering. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guifang Huang, Lei Hu Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nan Li 0007, Yi Mu 0001, Willy Susilo Efficient Self-certified Signatures with Batch Verification. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhengjun Cao, Qian Sha, Xiao Fan Adleman-Manders-Miller Root Extraction Method Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yi-Ning Liu 0002, Peiyong Sun, Jihong Yan, Yajun Li, Jianyu Cao An Improved Electronic Voting Scheme without a Trusted Random Number Generator. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chenggen Song, Maozhi Xu, Chunming Tang 0001 Pseudorandom Generators Based on Subcovers for Finite Groups. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiang Weng, Yunqi Dou, Chuangui Ma, Nadia El Mrabet Fault Attacks against the Miller Algorithm in Hessian Coordinates. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gautham Sekar The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jian Zhou, Ji Xiang, Neng Gao Towards Attack Resilient Social Network Based Threshold Signing. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xianhui Lu, Bao Li 0001, Qixiang Mei, Yamin Liu Improved Tradeoff between Encapsulation and Decapsulation of HK09. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiaoli Yu, Wenling Wu, Yanjun Li, Lei Zhang 0012 Cryptanalysis of Reduced-Round KLEIN Block Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Teng Guo, Feng Liu 0001, Chuan Kun Wu Multi-pixel Encryption Visual Cryptography. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Moti Yung, Dongdai Lin, Jiwu Jing (eds.) Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xusheng Zhang, Shan Chen, Dongdai Lin Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiang Zhang 0001, Zhenfeng Zhang A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wuqiong Pan, Jiwu Jing, Luning Xia, Zongbin Liu, Meng Yu 0001 An Efficient RSA Implementation without Precomputation. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiang Zhang 0001, Xiang Xie, Rui Zhang 0002, Zhenfeng Zhang A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yibin Dai, Shao-zhen Chen Weak-Key Class of MISTY1 for Related-Key Differential Attack. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nicky Mouha, Qingju Wang 0001, Dawu Gu, Bart Preneel Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Benoît Libert, Moti Yung Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haibo Tian, Xiaofeng Chen 0001, Zhengtao Jiang Non-interactive Deniable Authentication Protocols. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Phong Q. Nguyen Cryptanalysis vs. Provable Security. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lin Wang 0024, Bing Shen, TongXu Qiao Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haixin Song, Xiubin Fan, Chuankun Wu, Dengguo Feng On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xuejia Lai, Moti Yung, Dongdai Lin (eds.) Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sourav Das, Dipanwita Roy Chowdhury An Efficient, Parameterized and Scalable S-box for Stream Ciphers. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama, Mebae Ushida, Kazuo Ohta Rigorous Security Requirements for Designated Verifier Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shaoquan Jiang Dwork-Naor ZAP and Its Application in Deniable Authentication, Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pedro Peris-Lopez, Julio César Hernández Castro, Raphael C.-W. Phan, Juan M. Estévez-Tapiador, Tieyan Li Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Olivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Frédéric Valette Characterization of the Electromagnetic Side Channel in Frequency Domain. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Yi Mu 0001, Willy Susilo Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Weijia Wang, Lei Hu, Yong Li 0002 How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gaoli Wang Distinguishing Attacks on LPMAC Based on the Full RIPEMD and Reduced-Step RIPEMD-{256, 320}. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Qichun Wang, Thomas Johansson 0001 A Note on Fast Algebraic Attacks and Higher Order Nonlinearities. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lihua Wang 0001, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao 0001 New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhanfei Zhou On the Combinatorial Approaches of Computing Upper Bounds on the Information Rate of Secret Sharing Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shuang Wu 0004, Dengguo Feng, Wenling Wu, Bozhan Su Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Paulo S. L. M. Barreto, Pierre-Louis Cayrel, Rafael Misoczki, Robert Niebuhr Quasi-Dyadic CFS Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Atsuko Miyaji A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa On the CCA1-Security of Elgamal and Damgård's Elgamal. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rui Zhang 0002 Acquiring Key Privacy from Data Privacy. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Feng Bao 0001 Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhi Hu, Maozhi Xu, Zhenghua Zhou A Generalization of Verheul's Theorem for Some Ordinary Curves. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhixiong Chen 0002, Xiangguo Cheng, Chenhuang Wu A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yilian Zhang, Zhide Chen, Fuchun Guo Online/Offline Verification of Short Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Qi Chen, Dingyi Pei, Jun-Wu Dong Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yi Yang 0040, Lingyun Ying, Rui Wang 0032, Purui Su, Dengguo Feng DepSim: A Dependency-Based Malware Similarity Comparison System. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Joonsang Baek, Jianying Zhou 0001 Online/Offline Identity-Based Signcryption Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zheng Gong, Qiang Tang 0001, Yee Wei Law, Hongyang Chen KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang 0001 Pseudo-Cryptanalysis of Luffa. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tuomas Kortelainen, Juha Kortelainen, Kimmo Halunen Variants of Multicollision Attacks on Iterated Hash Functions. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lukasz Krzywiecki, Miroslaw Kutylowski, Hubert Misztela, Tomasz Struminski Private Information Retrieval with a Trusted Hardware Unit - Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiaofeng Chen 0001, Haibo Tian, Fangguo Zhang, Yong Ding 0005 Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Junqing Gong 0001, Haifeng Qian, Yuan Zhou 0008 Fully-Secure and Practical Sanitizable Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Paolo Palmieri 0001, Olivier Pereira Building Oblivious Transfer on Channel Delays. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, Ludovic Perret Algebraic Precomputations in Differential and Integral Cryptanalysis. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ying Liu, Fushan Wei, Chuangui Ma Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Atsuko Miyaji Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ning Ding 0001, Dawu Gu On Obfuscating Programs with Tamper-proof Hardware. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Le Kang, Ji Xiang CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan E. Tapiador, Tieyan Li, Jan C. A. van der Lubbe Weaknesses in Two Recent Lightweight RFID Authentication Protocols. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhiqiang Liu 0001, Dawu Gu, Jing Zhang, Wei Li 0013 Differential-Multiple Linear Cryptanalysis. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 527 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license