The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASIACRYPT"( http://dblp.L3S.de/Venues/ASIACRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asiacrypt

Publication years (Num. hits)
1990-1991 (47) 1993-1994 (37) 1995-1996 (36) 1998 (34) 1999 (33) 2000 (48) 2001 (35) 2002 (37) 2003 (34) 2004 (38) 2005 (38) 2006 (31) 2007 (36) 2008 (35) 2009 (42) 2010 (36) 2011 (41) 2012 (46) 2020 (1)
Publication types (Num. hits)
inproceedings(665) proceedings(20)
Venues (Conferences, Journals, ...)
ASIACRYPT(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 431 occurrences of 269 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Claude Carlet, Aline Gouget An Upper Bound on the Number of m-Resilient Boolean Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptography, Boolean function, Stream cipher, Resilient function
1K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan Asynchronous Secure Communication Tolerating Mixed Adversaries. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Philippe Golle, Sheng Zhong 0002, Dan Boneh, Markus Jakobsson, Ari Juels Optimistic Mixing for Exit-Polls. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations
1Wieb Bosma, James Hutton, Eric R. Verheul Looking beyond XTR. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Stefan Lucks A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim 0001 On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Dowon Hong, Ku-Young Chang, Heuisu Ryu Efficient Oblivious Transfer in the Bounded-Storage Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Eli Biham, Orr Dunkelman, Nathan Keller Enhancing Differential-Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Wakaha Ogata, Kaoru Kurosawa Bounds for Robust Metering Schemes and Their Relationship with A-code. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Tomoyuki Asano A Revocation Scheme with Minimal Storage at Receivers. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001 (eds.) Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Alexander Klimov, Anton Mityagin, Adi Shamir Analysis of Neural Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Tsutomu Matsumoto Gummy and Conductive Silicone Rubber Fingers. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Pierrick Gaudry A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi Provable Security of KASUMI and 3GPP Encryption Mode f8. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Emmanuel Thomé Computation of Discrete Logarithms in F2607. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Moses D. Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam D. Smith Mutually Independent Commitments. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Alice Silverberg, Jessica Staddon, Judy L. Walker Efficient Traitor Tracing Algorithms Using List Decoding. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Tzafrir Cohen, Joe Kilian, Erez Petrank Responsive Round Complexity and Concurrent Zero-Knowledge. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptographic protocols, Zero-knowledge, concurrent zero-knowledge
1Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval Key-Privacy in Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery
1Eric R. Verheul Self-Blindable Credential Certificates from the Weil Pairing. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Emmanuel Bresson, Olivier Chevassut, David Pointcheval Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Nicholas J. Hopper, Manuel Blum 0001 Secure Human Identification Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication
1Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
1Dan Boneh, Shai Halevi, Nick Howgrave-Graham The Modular Inversion Hidden Number Problem. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Coppersmith's attack, Approximations, MAC, Lattices, PRNG, Modular inversion, Hidden number problems
1Ronald L. Rivest, Adi Shamir, Yael Tauman How to Leak a Secret. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ring signature scheme, signer-ambiguous signature scheme, designated verifier signature scheme, signature scheme, group signature scheme
1Steven D. Galbraith Supersingular Curves in Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon An Efficient Implementation of Braid Groups. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Makoto Sugita, Kazukuni Kobara, Hideki Imai Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Block Cipher Camellia, Truncated Differential Cryptanalysis, Impossible Differential Cryptanalysis
1Colin Boyd (eds.) Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Johan Håstad, Mats Näslund Practical Construction and Analysis of Pseudo-Randomness Primitives. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Pierrick Gaudry, Nicolas Gürel An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Jacques Stern Fully Distributed Threshold RSA under Standard Assumptions. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Threshold RSA key generation and signature
1Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
1Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001, Okyeon Yi Known-IV Attacks on Triple Modes of Operation of Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF mode of operation for DES, Block cipher, Triple DES
1Anna Lysyanskaya, Chris Peikert Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Ben Lynn, Hovav Shacham Short Signatures from the Weil Pairing. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Duncan S. Wong, Agnes Hui Chan Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Yan-Cheng Chang, Chi-Jen Lu Oblivious Polynomial Evaluation and Oblivious Neural Learning. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Siguna Müller A Probable Prime Test with Very High Confidence for n equiv 1 mod 4. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier How to Achieve a McEliece-Based Digital Signature Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Niederreiter cryptosystem, digital signature, short signatures, syndrome decoding, McEliece cryptosystem, Goppa codes
1Yuriy V. Tarannikov, Peter Korolev, Anton Botev Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF autocorrelation coefficients, global avalanche characteristics, Boolean functions, stream ciphers, resiliency, nonlinearity, bounds, balancedness, correlation immunity, Walsh Transform
1Masayuki Abe, Miyako Ohkubo Provably Secure Fair Blind Signatures with Tight Revocation. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Martijn Stam, Arjen K. Lenstra Speeding Up XTR. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF binary Euclidean algorithm, LUC, ECC, addition chains, XTR, Fibonacci sequences
1Jacques Patarin Generic Attacks on Feistel Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations
1Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh A Compact Rijndael Hardware Architecture with S-Box Optimization. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra Unbelievable Security. Matching AES Security Using Public Key Systems. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Brian King Improved Methods to Perform Threshold RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF threshold RSA, threshold cryptography, threshold secret sharing, cyclotomic polynomials
1Shiho Moriai, Serge Vaudenay On the Pseudorandomness of Top-Level Schemes of Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Chris Pavlovski Attacking and Repairing Batch Verification Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Pierre Loidreau Strengthening McEliece Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1David A. Wagner 0001 Cryptanalysis of the Yi-Lam Hash. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Adam L. Young, Moti Yung Towards Signature-Only Signature Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST
1Markus Jakobsson, Ari Juels Mix and Match: Secure Function Evaluation via Ciphertexts. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Mihir Bellare Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Matthew K. Franklin, Tomas Sander Commital Deniable Proofs and Electronic Campaign Finance. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Philip Hawkes, Gregory G. Rose Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF SOBER, t-class, SSC-II, cryptanalysis, stream ciphers
1Alex Biryukov, Adi Shamir Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF time/memory tradeoff attacks, Cryptanalysis, stream ciphers
1Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan Password-Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Birgit Pfitzmann, Ahmad-Reza Sadeghi Anonymous Fingerprinting with Direct Non-repudiation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF digital coin, anonymity, fingerprinting, restrictiveness
1David A. Wagner 0001, Ian Goldberg Proofs of Security for the Unix Password Hashing Algorithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Glenn Durfee, Phong Q. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Moni Naor, Benny Pinkas Distributed Oblivious Transfer. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Marc Fischlin A Note on Security Proofs in the Generic Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001, Xian-Mo Zhang On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Wen-Guey Tzeng, Zhi-Jia Tzeng Round-Efficient Conference Key Agreement Protocols with Provable Security. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Satoshi Hada Zero-Knowledge and Code Obfuscation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Pascal Paillier Trapdooring Discrete Logarithms on Elliptic Curves over Rings. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Louis Goubin, Nicolas T. Courtois Cryptanalysis of the TTM Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Seigo Arita Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Markus Jakobsson, Ari Juels Addition of ElGamal Plaintexts. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF directed decryption, fast-track, repetition robustness, addition, elgamal
1Wakaha Ogata, Kaoru Kurosawa Provably Secure Metering Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jan Camenisch Efficient Anonymous Fingerprinting with Group Signatures. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto (eds.) Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra, Eric R. Verheul Key Improvements to XTR. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Leonid Reyzin A New Forward-Secure Digital Signature Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF proven security, digital signatures, forward security, concrete security
1Anand Desai, Sara K. Miner Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  BibTeX  RDF
1Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hideki Imai, Atsuhiro Yamagishi CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptographic technology, asymmmetric ciphers, evaluation, symmetric ciphers
1Danny Gutfreund, Michael Ben-Or Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Thomas A. Berson Cryptography Everywhere. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Antoine Joux, Phong Q. Nguyen Why Textbook ElGamal and RSA Encryption Are Insecure. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Masashi Mitomo, Kaoru Kurosawa Attack for Flash MIX. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, François Koeune, David Naccache From Fixed-Length to Arbitrary-Length RSA Padding Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Martin Hirt, Ueli M. Maurer, Bartosz Przydatek Efficient Secure Multi-party Computation. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Phillip Rogaway Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart Power Analysis, What Is Now Possible.... Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF dpa, spa, smart-cards, power analysis
1Claus-Peter Schnorr, Markus Jakobsson Security of Signed ElGamal Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Alexandra Boldyreva The Security of Chaffing and Winnowing. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Seokhie Hong, Sangjoon Park Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai Unconditionally Secure Digital Signature Schemes Admitting Transferability. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Safuat Hamdy, Bodo Möller Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Miyako Ohkubo, Masayuki Abe A Length-Invariant Hybrid Mix. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Ivan Damgård Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Pascal Paillier, David Pointcheval Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheul Doing More with Fewer Bits. Search on Bibsonomy ASIACRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license