The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CT-RSA"( http://dblp.L3S.de/Venues/CT-RSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ctrsa

Publication years (Num. hits)
2001 (34) 2002 (22) 2003 (29) 2004 (29) 2005 (26) 2006 (24) 2007 (25) 2008 (28) 2009 (32) 2010 (27) 2011 (26) 2012 (27) 2013 (26) 2014 (26) 2015 (27) 2016 (27) 2017 (26) 2018 (27) 2019 (29) 2020 (29) 2021 (28) 2022 (25) 2023 (27) 2024 (19)
Publication types (Num. hits)
inproceedings(621) proceedings(24)
Venues (Conferences, Journals, ...)
CT-RSA(645)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 329 occurrences of 199 keywords

Results
Found 645 publication records. Showing 645 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Christophe Petit 0001, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Orr Dunkelman, Nathan Keller Cryptanalysis of CTC2. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen Square, a New Multivariate Encryption Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel Attacks on the DECT Authentication Mechanisms. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David Galindo Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-interactive proofs, standard model, public key encryption, identity-based encryption
1Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator
1Ee-Chien Chang, Chee Liang Lim, Jia Xu 0006 Short Redactable Signatures Using Random Trees. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Redactable Signature Scheme, Random Tree, Privacy
1Andrew Y. Lindell Adaptively Secure Two-Party Computation with Erasures. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva Strengthening Security of RSA-OAEP. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Paolo Gasti Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF low-end device, double-size technique, RSA, modular multiplication, efficient implementation, crypto-coprocessors, arithmetic unit
1Marc Fischlin (eds.) Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Matthieu Rivain Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thomas Popp, Mario Kirschbaum, Stefan Mangard Practical Attacks on Masked Hardware. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DPA-Resistant Masked Logic Styles, MDPL, Prototype Chip, Hardware AES, PDF-Attack, PRNG
1Benoît Libert, Damien Vergnaud Adaptive-ID Secure Revocable Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provable security, revocation, Identity-based encryption
1Anna Lisa Ferrara, Matthew Green 0001, Susan Hohenberger, Michael Østergaard Pedersen Practical Short Signature Batch Verification. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kazuo Sakiyama, Tatsuya Yagi, Kazuo Ohta Fault Analysis Attack against an AES Prototype Chip Using RSL. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random Switching Logic, Clock-based Attack, AES, Fault Analysis
1Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang 0003 Divisible On-Line/Off-Line Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Divisible On-line/Off-line Signatures, On-line/Off-line Threshold Signatures, Signature Schemes
1Giuseppe Ateniese, Karyn Benson, Susan Hohenberger Key-Private Proxy Re-encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu 0001 Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF “Left-To-Right” exponentiation, RSA, fault attacks, number theory
1Manoj Prabhakaran 0001, Rui Xue 0001 Statistically Hiding Sets. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rafael Dowsley, Jörn Müller-Quade, Anderson C. A. Nascimento A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thomas Plos Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deta-ched Power Supply, Parasitic Backscatter, RFID, Differential Power Analysis, Side-Channel Analysis, UHF
1Tomas Toft Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Constant-rounds Multi-party Computation, Bit-decomposition, Secret Sharing
1Andrew Y. Lindell Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Shanshan Duan, Adriana Palacio Key Insulation and Intrusion Resilience over a Public Channel. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Andrew Y. Lindell Local Sequentiality Does Not Help for Concurrent Composition. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Andrew Y. Lindell Aggregate Message Authentication Codes. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek Public-Key Encryption with Non-interactive Opening. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Robert Könighofer A Fast and Cache-Timing Resistant Implementation of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Praveen Gauravaram, John Kelsey Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ping Yu 0006, Stephen R. Tate Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online/Offline Signing, Devices with Limited Computing Capabilities, Digital Signature, Standard Model, Strong RSA Assumption
1Mehmet S. Kiraz, Berry Schoenmakers An Efficient Protocol for Fair Secure Two-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Andrew Y. Lindell Legally-Enforceable Fairness in Secure Two-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Michael Østergaard Pedersen RFID Security: Tradeoffs between Security and Efficiency. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu Identity-Based Threshold Key-Insulated Encryption without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold key-insulation, standard model, identity-based encryption, key-exposure
1Marc Fischlin Security of NMACand HMACBased on Non-malleability. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Jihye Kim, Gene Tsudik Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, authenticated key exchange, secret handshakes
1Stefan Tillich, Christoph Herbst Boosting AES Performance on a Tiny Processor Core. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 8-bit microcontroller, AVR architecture, Advanced Encryption Standard, instruction set extensions, hardware-software codesign
1Andrew Y. Lindell Efficient Fully-Simulatable Oblivious Transfer. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF APOP, Challenge and Response, Password Recovery, Message Difference, Hash Function, Collision Attack, MD5
1Onur Aciiçmez, Werner Schindler A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication
1Shafi Goldwasser Program Obfuscation and One-Time Programs. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Emmanuel Bresson, Jean Monnerat, Damien Vergnaud Separation Results on the "One-More" Computational Problems. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF “One-more” problems, Random self-reducible problems, Algebraic algorithms, Black-box reductions
1Tal Malkin (eds.) Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Eike Kiltz, Yevgeniy Vahlis CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos Super-Efficient Verification of Dynamic Outsourced Databases. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Qiong Huang 0001, Guomin Yang, Duncan S. Wong, Willy Susilo Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Gaëtan Leurent Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, provable security, syndrome decoding, quasi-cyclic code
1Kristian Gjøsteen A Latency-Free Election Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Thomas Plos Susceptibility of UHF RFID Tags to Electromagnetic Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA)
1Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia
1Christophe Clavier, Benedikt Gierlichs, Ingrid Verbauwhede Fault Analysis Study of IDEA. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collision Fault Analysis, Ineffective Fault Analysis, Random Fault Model, IDEA, Differential Fault Analysis
1Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa Small Secret Key Attack on a Variant of RSA (Due to Takagi). Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trivariate polynomial, RSA, lattice, LLL
1Koji Chida, Go Yamamoto Batch Processing of Interactive Proofs. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sigma-Protocols, Batch Processing, Proofs of Knowledge
1Eli Biham, Orr Dunkelman, Nathan Keller A Simple Related-Key Attack on the Full SHACAL-1. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Pascal Paillier Impossibility Proofs for RSA Signatures in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Joseph Lano, Bart Preneel Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Matthew K. Franklin, Mark A. Gondree, Payman Mohassel Improved Efficiency for Private Stable Matching. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gale-Shapley, secure multiparty computation, stable matching, passive adversaries, stable marriage, privacy-preserving protocols
1Sangjoon Park, Junghyun Nam, Seungjoo Kim, Dongho Won Efficient Password-Authenticated Key Exchange Based on RSA. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation
1Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang A Practical Optimal Padding for Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Goce Jakimoski Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Second Preimages for SMASH. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, second preimages
1Máire McLoone, Matthew J. B. Robshaw Public Key Cryptography and RFID Tags. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Jihye Kim, Gene Tsudik Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hassan Jameel, Riaz Ahmed Shaikh 0001, Heejo Lee, Sungyoung Lee Human Identification Through Image Evaluation Using Secret Predicates. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Elisabeth Oswald, Stefan Mangard Template Attacks on Masking - Resistance Is Futile. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç Cache Based Remote Timing Attack on the AES. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Remote Attack, AES, Timing Analysis, Side Channel Analysis, Cache Attack
1Karl Scheibelhofer A Bit-Slice Implementation of the Whirlpool Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu 0001 Compact E-Cash from Bounded Accumulator. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF compact e-cash, bounded accumulator, bilinear pairings
1Joseph H. Silverman, William Whyte Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Gregory Neven Identity-Based Multi-signatures from RSA. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
1Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, random walks, expander graph
1Xun Yi Directed Transitive Signature Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Directed transitive signature, transitive closure and reduction, RSA inversion problem over a cyclic group
1Eric R. Verheul Selecting Secure Passwords. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Benoît Chevallier-Mames, Marc Joye A Practical and Tightly Secure Signature Scheme Without Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Omkant Pandey, Julien Cathalo, Jean-Jacques Quisquater Fair Identification. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xinxin Fan, Thomas J. Wollinger, Yumin Wang Efficient Doubling on Genus 3 Curves over Binary Fields. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Chanathip Namprempre, Gregory Neven On the (Im)possibility of Blind Message Authentication Codes. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF blind MACs, provable security, blind signatures
1Marc Fischlin Universally Composable Oblivious Transfer in the Multi-party Setting. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yitao Duan, John F. Canny How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Masayuki Abe (eds.) Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sylvain Pasini, Serge Vaudenay An Optimal Non-interactive Message Authentication Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kristian Gjøsteen A New Security Proof for Damgård's ElGamal. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura Toward the Fair Anonymous Signatures: Deniable Ring Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Xavier Boyen, Shai Halevi Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dag Arne Osvik, Adi Shamir, Eran Tromer Cache Attacks and Countermeasures: The Case of AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, memory access
1Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Feng Bao 0001 Stand-Alone and Setup-Free Verifiably Committed Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line fair-exchange, Setup-free, Stand-alone property, Verifiably committed signature
1Pim Tuyls, Lejla Batina RFID-Tags for Anti-counterfeiting. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Physical Unclonable Function (PUF), authentication, RFID, ECC, counterfeiting
1Xiaojian Tian, Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MT-authenticator, BCK-model, CK-model, Verifiable Encryption
1Eli Biham, Orr Dunkelman, Nathan Keller Related-Key Impossible Differential Attacks on 8-Round AES-192. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF related-key differentials, AES, impossible differentials
1Michael Szydlo, Yiqun Lisa Yin Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature, MD5, SHA-1, padding, hash collision
1Kai Schramm, Christof Paar Higher Order Masking of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Countermeasure, AES
1Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann Block Ciphers Sensitive to Gröbner Basis Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 645 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license