The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASIACRYPT"( http://dblp.L3S.de/Venues/ASIACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiacrypt

Publication years (Num. hits)
1990-1991 (47) 1993-1994 (37) 1995-1996 (36) 1998 (34) 1999 (33) 2000 (48) 2001 (35) 2002 (37) 2003 (34) 2004 (38) 2005 (38) 2006 (31) 2007 (36) 2008 (35) 2009 (42) 2010 (36) 2011 (41) 2012 (46) 2020 (1)
Publication types (Num. hits)
inproceedings(665) proceedings(20)
Venues (Conferences, Journals, ...)
ASIACRYPT(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 431 occurrences of 269 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro Modulus Search for Elliptic Curve Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Kaoru Kurosawa Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yejing Wang, Reihaneh Safavi-Naini A3-Codes under Collusion Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Helena Handschuh, David Naccache ECC: Do We Need to Count? Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen Equivalent Keys of HPC. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Iwan M. Duursma, Pierrick Gaudry, François Morain Speeding up the Discrete Log Computation on Curves with Automorphisms. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto A Quick Group Key Distribution Scheme with "Entity Revocation". Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yongge Wang Linear Complexity versus Pseudorandomness: On Beth and Dai's Result. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Yongge Wang Approximation Hardness and Secure Communication in Broadcast Channels. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Sarbani Palit, Bimal K. Roy Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay On the Lai-Massey Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih On the Design of RSA with Short Secret Exponent. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Haruki Seki, Toshinobu Kaneko Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yair Frankel, Philip D. MacKenzie, Moti Yung Adaptively-Secure Optimal-Resilience Proactive RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Huaxiong Wang Broadcast Authentication in Group Communication. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Simon R. Blackburn, Steven D. Galbraith Cryptanalysis of Two Cryptosystems Based on Group Actions. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Junji Shikata, Yuliang Zheng 0001, Joe Suzuki, Hideki Imai Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Yvo Desmedt Secure Communication in an Unknown Network Using Certificates. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Tatsuaki Okamoto A Signature Scheme with Message Recovery as Secure as Discrete Logarithm. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Takashi Satoh, Tetsu Iwata, Kaoru Kurosawa On Cryptographically Secure Vectorial Boolean Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yongfei Han, Peng-Chor Leong, Peng-Chong Tan, Jiang Zhang Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Erik Woodward Knudsen Elliptic Scalar Multiplication Using Point Halving. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng 0001, Hideki Imai An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan How to Prove That a Committed Number Is Prime. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Masayuki Numao Periodical Multi-secret Threshold Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Matthias Fitzi, Martin Hirt, Ueli M. Maurer General Adversaries in Unconditional Multi-party Computation. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Masayuki Abe Mix-Networks on Permutation Networks. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei A Class of Explicit Perfect Multi-sequences. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.) Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Paul C. Leyland, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman J. J. te Riele, Paul Zimmermann Factorization of RSA-140 Using the Number Field Sieve. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Detlef Hühnlein, Tsuyoshi Takagi Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Henri Cohen, Atsuko Miyaji, Takatoshi Ono Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama Efficient Implementation of Schoof's Algorithm. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Kazuo Ohta, Dingyi Pei (eds.) Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra Generating RSA Moduli with a Predetermined Portion. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Yasuyuki Sakai, Kouichi Sakurai Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Yvo Desmedt, Jennifer Seberry Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF auctions with closed bids, time stamps, key escrow
1Wenbo Mao, Chae Hoon Lim Cryptanalysis in Prime Order Subgroups of Z*n. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Joseph H. Silverman, Joe Suzuki Elliptic Curve Discrete Logarithms and the Index Calculus. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cryptanalysis, public key cryptosystem, finite automaton
1Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater Audio and Optical Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Nicolas Sendrier Cryptanalysis of the Original McEliece Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye Improved Truncated Differential Attacks on SAFER. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Ernest Foo Off-Line Fair Payment Protocols Using Convertible Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Thomas Pornin Optimal Resistance Against the Davies and Murphy Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Phong Q. Nguyen, Jacques Stern The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Hung-Min Sun Improving the Security of the McEliece Public-Key Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Yair Frankel, Yiannis Tsiounis, Moti Yung Fair Off-Line e-cash Made Easy. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Burton S. Kaliski Jr. ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Chae Hoon Lim, Pil Joong Lee A Study on the Proposed Korean Digital Signature Algorithm. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Donald Beaver Adaptively Secure Oblivious Transfer. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Thomas Johansson 0001 Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Guillaume Poupard, Jacques Stern Generation of Shared RSA Keys by Two Parties. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Julien P. Stern A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege Analysis Methods for (Alleged) RC4. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jacques Patarin, Louis Goubin, Nicolas T. Courtois C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester Some Bounds and a Construction for Secure Broadcast Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Stefan Wolf 0001 Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement
1Wen Feng Qi, Jun-Hui Yang, Jing Jun Zhou ML-Sequences over Rings Z/(2e)*: I. Constructions of Nondegenerative ML-Sequences II. Injectiveness of Compression Mappings of New Classes. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF nondegenerate ML-sequence, quasi-period, injective compression mapping
1Reihaneh Safavi-Naini, Huaxiong Wang Bounds and Constructions for Multireceiver Authentication Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Glenn Durfee, Yair Frankel An Attack on RSA Given a Small Fraction of the Private Key Bits. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002 Efficient Fair Exchange with Verifiable Confirmation of Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Markus Michels A Group Signature Scheme with Improved Efficiency. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Group signature scheme for large groups, revocable anonymity, digital signature schemes
1Ross J. Anderson, Serge Vaudenay Minding your p's and q's. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Dieter Gollmann Observations on Non-repudiation. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF non-repudiation, communications security, ISO standards
1Kouichi Sakurai A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Kevin S. McCurley Cryptography and the Internet: Lessons and Challenges. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Seongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung On the Correlation Immune Functions and Their Nonlinearity. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis Mis-representation of Identities in E-cash Schemes and how to Prevent it. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Philip Hawkes, Luke O'Connor On Applying Linear Cryptanalysis to IDEA. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Shigeo Tsujii Electronic Money and Key Management from Global and Regional Points of View. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Yair Frankel, Yiannis Tsiounis, Moti Yung "Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Markus Michels, Patrick Horster On the Risk of Disruption in Several Multiparty Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Erik De Win, Antoon Bosselaers, Servaas Vandenberghe, Peter De Gersem, Joos Vandewalle A Fast Software Implementation for Arithmetic Operations in GF(2n). Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Chun-I Fan, Chin-Laung Lei A Multi-Recastable Ticket Scheme for Electronic Elections. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Mike Just, Serge Vaudenay Authenticated Multi-Party Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF confirmation, authentication, key agreement, forward secrecy
1David M'Raïhi Cost-Effective Payment Schemes with Privacy Regulation. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Jacques Stern The Validation of Cryptographic Algorithms. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Kwangjo Kim, Tsutomu Matsumoto (eds.) Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Kaisa Nyberg Generalized Feistel Networks. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Markus Michels, Patrick Horster Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Kazukuni Kobara, Hideki Imai Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Daniel Bleichenbacher, Ueli M. Maurer On the Efficiency of One-Time Digital Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptography, Digital signature, Directed acyclic graph, One-way function, Partially ordered set
1Masayuki Abe, Eiichiro Fujisaki How to Date Blind Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra Generating Standard DSA Signatures Without Long Inversion. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Florent Chabaud, Jacques Stern The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park Conditional Correlation Attack on Nonlinear Filter Generators. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Valeri Korjik, D. Kushnir Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Stefan Wolf 0001 Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptography, Information theory, Unconditional security, Secret key agreement
1Ingrid Biehl, Bernd Meyer 0002, Christoph Thiel Cryptographic Protocols Based on Real-Quadratic A-fields. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Seungjoo Kim, Sungjun Park, Dongho Won Convertible Group Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1James Cowie, Bruce Dodson, R. Marije Elkenbracht-Huizing, Arjen K. Lenstra, Peter L. Montgomery, Jörg Zayer A World Wide Number Field Sieve Factoring Record: On to 512 Bits. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1David Pointcheval, Jacques Stern Provably Secure Blind Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen, Bart Preneel Hash Functions Based on Block Ciphers and Quaternary Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Willi Geiselmann, Dieter Gollmann Correlation Attacks on Cascades of Clock Controlled Shift Registers. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Takashi Satoh Generalization of Higher Order SAC to Vector Output Boolean Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Atsuko Miyaji A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license