The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52) 2019 (41) 2020 (37) 2021 (36) 2022 (26) 2023 (28)
Publication types (Num. hits)
inproceedings(904) proceedings(26)
Venues (Conferences, Journals, ...)
ACISP(930)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Li Sun, Steven Versteeg, Serdar Boztas, Trevor Yann Pattern Recognition Techniques for the Classification of Malware Packers. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marek Klonowski, Michal Koza, Miroslaw Kutylowski Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Michael Gorski, Stefan Lucks Some Observations on Indifferentiability. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Noboru Kunihiro Solving Generalized Small Inverse Problems. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer Distinguishers for the Compression Function and Output Transformation of Hamsi-256. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Manuel Barbosa, Pooya Farshim Strong Knowledge Extractors for Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rafik Chaabouni, Helger Lipmaa, Abhi Shelat Additive Combinatorics and Discrete Logarithm Based Range Protocols. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jun Shao 0001, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu 0005 The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ron Steinfeld, Philip Hawkes (eds.) Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ruilin Li, Bing Sun 0001, Chao Li 0002, Longjiang Qu Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Basie von Solms Is the Information Security King Naked?. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Information Security Governance, Insecure systems, Naked, Information Security, Ethics, Viruses, Social engineering
1Serdar Boztas, Simon J. Puglisi, Andrew Turpin Testing Stream Ciphers by Finding the Longest Substring of a Given Density. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kai-Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama Strengthening the Security of Distributed Oblivious Transfer. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF oblivious transfer, information theoretic security, secret sharing scheme
1Ewan Fleischmann, Michael Gorski, Stefan Lucks Attacking 9 and 10 Rounds of AES-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
1Mridul Nandi Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MD hash function, padding rule, suffix-free, collision resistant
1Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson Jacobi Quartic Curves Revisited. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Efficient elliptic curve arithmetic, Jacobi model of elliptic curves, point multiplication
1Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka Security on Hybrid Encryption with the Tag-KEM/DEM Framework. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nadia El Mrabet, Christophe Nègre Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AMNS, discrete Fourrier transform, finite fields, Pairing
1Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ROX, ESh, Hash Functions, MPP, Domain Extension
1Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto Multi-recipient Public-Key Encryption from Simulators in Security Proofs. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption
1Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin Inside the Hypercube. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dang Vinh Pham, Dogan Kesdogan A Combinatorial Approach for an Anonymity Metric. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Leonie Simpson, Matthew Henricksen, Wun-She Yap Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Common Scrambling Algorithm, Cryptanalysis, Stream Cipher, Digital Video Broadcasting
1Michael Tunstall Random Order m-ary Exponentiation. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random order countermeasure, side channel analysis, Exponentiation algorithms
1Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
1Hongbo Yu, Xiaoyun Wang 0001 Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, distinguishing attack, SHA-256
1Ahto Buldas, Aivo Jürgenson, Margus Niitsoo Efficiency Bounds for Adversary Constructions in Black-Box Reductions. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1L. Jean Camp Hardening the Network from the Friend Within. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Kazumaro Aoki Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RIPEMD, double branch, preimage, meet-in-the-middle
1Colin Boyd, Juan Manuel González Nieto (eds.) Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Atsuko Miyaji, Masahiro Sukegawa New Correlations of RC4 PRGA Using Nonzero-Bit Differences. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park Fair Threshold Decryption with Semi-Trusted Third Parties. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Akira Numayama, Keisuke Tanaka On the Weak Ideal Compression Functions. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weak ideal compression function, indifferentiability, hash construction, random oracle
1Peter Lory Reducing the Complexity in the Distributed Computation of Private RSA Keys. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Conditional Proxy Broadcast Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption
1Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch Measurement Study on Malicious Web Servers in the .nz Domain. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Douglas Wikström A Commitment-Consistent Proof of a Shuffle. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hight, Impossible Differential Attack, Present, Related-Key Attack, Rectangle Attack
1Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Generalized Unbalanced Feistel Network, Differential Probability, Linear Hull Probability, Block Ciphers
1Irfan Ahmed 0001, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong On Improving the Accuracy and Performance of Content-Based File Type Identification. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF file type identification, byte frequency distribution, cluster analysis, Mahalanobis distance, cosine similarity, linear discriminant
1Jiang Wu 0001, Douglas R. Stinson A Highly Scalable RFID Authentication Protocol. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Douglas Stebila, Berkant Ustaoglu Towards Denial-of-Service-Resilient Key Agreement Protocols. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Isamu Teranishi, Wakaha Ogata Relationship between Two Approaches for Defining the Standard Model PA-ness. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Standard Model, Plaintext Awareness
1Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa Secure Biometric Authentication with Improved Accuracy. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Biometric Authentication, Cryptography, Classifier
1Sunghyun Kim, Heejo Lee Reducing Payload Scans for Attack Signature Matching Using Rule Classification. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong Advanced Permission-Role Relationship in Role-Based Access Control. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Alfred Menezes, Berkant Ustaoglu Comparing the Pre- and Post-specified Peer Models for Key Agreement. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Reza Rezaeian Farashahi Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Deterministic extractor, Hyperelliptic curve, Jacobian
1Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg Multidimensional Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grain-v1, Grain-128, Related-key chosen IV attack, Cryptanalysis, Stream cipher
1Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao 0001 Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stealth malware, hardware-assisted VMM, Virtual machine monitor
1Christophe Doche, Laurent Habsieger A Tree-Based Approach for Computing Double-Base Chains. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, scalar multiplication, Double-base number system
1Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang Efficient Disjointness Tests for Private Datasets. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private Set Disjointness, Private Matching, Secure Multi-Party Computation
1Pankaj Kohli, Bezawada Bruhadeshwar FormatShield: A Binary Rewriting Defense against Format String Attacks. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Format String Attacks, Intrusion Detection, System Security, Binary Rewriting
1Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson Efficient One-Round Key Exchange in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key exchange, standard model
1Christophe Nègre, Thomas Plantard Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Prime Field, Modular Number System, Lagrange Representation, Modular Multiplication
1Huafei Zhu Fully-Simulatable Oblivious Set Transfer. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Oblivious set transfer, perfectly hiding commitment, perfectly binding commitment, real/ideal world simulation paradigm
1Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 On the Improvement of the BDF Attack on LSBS-RSA. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB)
1Yu Sasaki, Kazumaro Aoki Preimage Attacks on Step-Reduced MD5. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message Expansion, Hash Function, MD5, Preimage Attack, One-Way, Local Collision
1Somitra Kumar Sanadhya, Palash Sarkar 0001 Non-linear Reduced Round Attacks against SHA-2 Hash Family. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Debra L. Cook, Moti Yung, Angelos D. Keromytis Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security analysis, differential cryptanalysis, linear cryptanalysis
1Yi Mu 0001, Willy Susilo, Jennifer Seberry (eds.) Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Takato Hirano, Koichiro Wada, Keisuke Tanaka Public-Key Cryptosystems with Primitive Power Roots of Unity. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism
1Jiayuan Sui, Douglas R. Stinson A Critical Analysis and Improvement of AACS Drive-Host Authentication. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0012, Wentao Zhang, Wenling Wu Cryptanalysis of Reduced-Round SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SMS4, Differential characteristic, Block cipher, Differential cryptanalysis, Rectangle attack
1Subhamoy Maitra, Goutam Paul 0001 Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Permutation, Fault Analysis, RC4, Keystream
1Xavier Boyen New Paradigms for Password Security. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar Signature Generation and Detection of Malware Families. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Static Analysis, Malware Detection, Signature Generation
1Sebastian Gajek, Mark Manulis, Jörg Schwenk Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin Looking Back at a New Hash Function. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Theoretic Security, Mobile Adversary
1Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski Distributed Verification of Mixing - Local Forking Proofs Model. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed system, anonymity, mix
1B. John Oommen, Ebaa Fayyoumi Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Silvana Medos, Serdar Boztas Montgomery Residue Representation Fault-Tolerant Computation in GF(2k). Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fault tolerant computation, finite field, fault attacks
1Florian Mendel, Martin Schläffer Collisions for Round-Reduced LAKE. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision attack
1Peng Wang 0009, Dengguo Feng, Wenling Wu, Liting Zhang On the Unprovable Security of 2-Key XCBC. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Blockcipher mode of operation, Provable security, Message authentication code, Related-key attack, Blockcipher
1Risto M. Hakala, Kaisa Nyberg Linear Distinguishing Attack on Shannon. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream ciphers, linear cryptanalysis, Distinguishing attacks, Shannon
1Yongdong Wu, Feng Bao 0001, Robert H. Deng Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Toshinori Araki, Satoshi Obana Flaws in Some Secret Sharing Schemes Against Cheating. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury Strengthening NLS Against Crossword Puzzle Attack. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crossword Puzzle attack, Stream ciphers, eSTREAM, Linear Approximations, Modular Addition, NLS
1Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF manual channel, eTCR hash family, randomized hashing, hash function security, Message authentication
1Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin On Building Hash Functions from Multivariate Quadratic Equations. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan On Proactive Perfectly Secure Message Transmission. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Perfectly Secure Communication, Proactive security
1Christophe Tartary, Huaxiong Wang Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Adversarial Network, Prediction Hashing, Erasure Codes, Hash Chains, Stream Authentication, Polynomial Reconstruction
1Toshinori Araki Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Cheng-Kang Chu, Wen-Guey Tzeng Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymous signatures, group signatures, ring signatures
1Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (eds.) Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jun Yajima, Yu Sasaki, Yusuke Naito 0001, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta A New Strategy for Finding a Differential Path of SHA-1. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay TCHo: A Hardware-Oriented Trapdoor Cipher. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hardware, linear feedback shift register, public-key cryptosystem, polynomial multiples, post-quantum cryptography
1Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum An Analysis of the Hermes8 Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hermes8, Cryptanalysis, Stream Cipher
1Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang 0001, Sébastien Zimmer An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, Authentication, biometrics
1Ivan Damgård, Martin Geisler 0001, Mikkel Krøigaard Efficient and Secure Comparison for On-Line Auctions. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ryotaro Hayashi 0001, Keisuke Tanaka Anonymity on Paillier's Trap-Door Permutation. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paillier’s function, Paillier’s trap-door permutation, anonymity, encryption, key-privacy
1Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Duncan S. Wong, Wei Wu 0001 Certificateless Signature Revisited. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certificateless cryptology, Signature, Security model, Random oracle
1Qiong Huang 0001, Duncan S. Wong Generic Certificateless Key Encapsulation Mechanism. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jovan Dj. Golic, Madalina Baltatu Soft Generation of Secure Biometric Keys. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Biometric key, Reed-Solomon codes, biometric authentication, Shannon entropy, template protection, Euclidean metric
1Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filter function, stream ciphers, initialization, algebraic attacks, clock-control
1Man Ho Au, Willy Susilo, Yi Mu 0001 Practical Compact E-Cash. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF constant-size, bilinear pairings, compact, E-Cash
1Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Double-Size Bipartite Modular Multiplication. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bipartite modular multiplication, double-size technique, RSA, smartcard, crypto-coprocessor
Displaying result #401 - #500 of 930 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license