|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 500 occurrences of 277 keywords
|
|
|
Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Deike Priemuth-Schmid, Alex Biryukov |
Slid Pairs in Salsa20 and Trivium. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium |
1 | Subhamoy Maitra, Goutam Paul 0001 |
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
KSA, PRGA, Cryptography, Stream Cipher, Bias, RC4, Secret Key, Keystream |
1 | Michael Gorski, Stefan Lucks |
New Related-Key Boomerang Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
1 | Laila El Aimani |
Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, Undeniable signatures, Generic construction |
1 | Jun Furukawa 0001, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka |
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
low error rate, biometrics, Fuzzy, identity-based |
1 | Kamer Kaya, Ali Aydin Selçuk |
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability |
1 | Subhamoy Maitra, Santanu Sarkar 0001 |
A New Class of Weak Encryption Exponents in RSA. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Lattice, Factorization, LLL Algorithm |
1 | Sébastien Canard, Amandine Jambert |
Group Key Management: From a Non-hierarchical to a Hierarchical Structure. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Access Control, Key Management, Hierarchy |
1 | Orhun Kara |
Reflection Cryptanalysis of Some Ciphers. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack |
1 | Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin |
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis |
1 | Dmitry Khovratovich |
Two Attacks on RadioGatún. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
sponge, cryptanalysis, hash functions |
1 | Qiang Tang 0001 |
Type-Based Proxy Re-encryption and Its Construction. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Markku-Juhani Olavi Saarinen |
A Meet-in-the-Middle Collision Attack Against the New FORK-256. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack |
1 | François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier |
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, software design, FCSRs |
1 | Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez |
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang |
Proxy Re-signature Schemes Without Random Oracles. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
proxy re-signature, existential unforgeability, standard model, bilinear maps, ID-based |
1 | Ramakanth Kavuluru, Andrew Klapper |
On the k -Operation Linear Complexity of Periodic Sequences. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
k symbol insertion, k symbol deletion, linear complexity, Periodic sequence, k-error linear complexity |
1 | Orr Dunkelman, Gautham Sekar, Bart Preneel |
Improved Meet-in-the-Middle Attacks on Reduced-Round DES. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang |
Transitive Signatures from Braid Groups. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Transitive signature, one-more matching conjugate problem, provable security, random oracle model, braid group |
1 | Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan |
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Linear Feed Back Shift Registers, Dynamic Power Dissipation, Side Channel Attacks, Power Analysis, Hamming Distance |
1 | Håkan Englund, Thomas Johansson 0001, Meltem Sönmez Turan |
A Framework for Chosen IV Statistical Analysis of Stream Ciphers. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | K. Srinathan, C. Pandu Rangan, Moti Yung (eds.) |
Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | V. N. Muralidhara, Sandeep Sen |
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
proxy cryptosystem, certificate-based encryption (CBE), pairing |
1 | Duo Lei, Chao Li |
Extended Multi-Property-Preserving and ECM-Construction. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, almost uniform distribution, Hash functions, random oracle, pseudo random function, collision resistance |
1 | Kazuhiko Minematsu, Toshiyasu Matsushima |
Tweakable Enciphering Schemes from Hash-Sum-Expansion. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
HCTR, HCH, Weak Pseudorandom Function, Mode of operation |
1 | Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois |
First-Order Differential Power Analysis on the Duplication Method. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
zero attack, differential power analysis, spectral analysis, Side-channel analysis |
1 | Pradeep Kumar Mishra, Vassil S. Dimitrov |
A Graph Theoretic Analysis of Double Base Number Systems. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
DBNS-graphs, MB-graphs, Double base number system |
1 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
1 | Daniel J. Bernstein, Peter Birkner, Tanja Lange 0001, Christiane Peters |
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Edwards curves, double-base chains, quintupling, scalar multiplication, addition chains, double-base number systems, tripling |
1 | Markku-Juhani Olavi Saarinen |
Linearization Attacks Against Syndrome Based Hashes. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack |
1 | Frédéric Didier |
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
low weight multiples, Boolean functions, Stream cipher, autocorrelation, filter generator |
1 | Giovanni Di Crescenzo, Vishal Saraswat |
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption |
1 | David Jao, Dimitar Jetchev, Ramarathnam Venkatesan |
On the Bits of Elliptic Curve Diffie-Hellman Keys. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Muxiang Zhang |
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Probabilistic Reliability, Fault Tolerance, Information Theoretic Security |
1 | Wen Ji, Lei Hu |
New Description of SMS4 by an Embedding overGF(28). |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
SMS4, ESMS4, XSL algorithm, block cipher, algebraic equation |
1 | K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao |
Solving Discrete Logarithms from Partial Knowledge of the Key. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Generic Groups, Side Channel Attacks, Discrete Logarithm Problem |
1 | Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury |
Design of a Differential Power Analysis Resistant Masked AES S-Box. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Shlomi Dolev, Limor Lahiani, Moti Yung |
Secret Swarm UnitReactive k-Secret Sharing. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
mobile computing, secret sharing |
1 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng |
Related-Key Differential-Linear Attacks on Reduced AES-192. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
related-key, differential-linear attack, cryptanalysis, AES |
1 | Hüseyin Hisil, Gary Carter, Ed Dawson |
New Formulae for Efficient Elliptic Curve Arithmetic. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
efficient point multiplication, DBNS, Elliptic curve, tripling, doubling |
1 | Rana Barua, Sumit Kumar Pandey, Ravi Pankaj |
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai |
Trade-Off Traitor Tracing. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kan Yasuda |
Multilane HMAC - Security beyond the Birthday Limit. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack |
1 | Johannes Buchmann 0001, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich |
CMSS - An Improved Merkle Signature Scheme. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Java Cryptography Architecture, Post-Quantum Signatures, Tree Authentication, One-Time-Signatures, Merkle Signatures |
1 | Isamu Teranishi, Takuro Oyama, Wakaha Ogata |
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher |
1 | Manuel Barbosa, Pooya Farshim |
Secure Cryptographic Workflow in the Standard Model. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption |
1 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Anonymity, Revocable, Ring Signature, Linkable |
1 | Valery Pryamikov |
Enciphering with Arbitrary Small Finite Domains. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Block Ciphers, Modes of Operations, Symmetric Encryption, Pseudorandom Permutations |
1 | Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw |
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Salsa20, TSC-4, Chosen IV Attack, Stream Cipher, eSTREAM |
1 | Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe |
Update on Tiger. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Weijia Wang, Lei Hu |
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
password, key distribution, authenticated key exchange, multi-party protocol |
1 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm |
1 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure |
1 | James L. Massey |
Whither Cryptography? |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan |
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Reliable and Secure Communication, Information Theoretic Security, Communication Efficiency |
1 | Donghoon Chang, Kishan Chand Gupta, Mridul Nandi |
RC4-Hash: A New Hash Function Based on RC4. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Hash Function, Collision Attack, RC4, Preimage Attack |
1 | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
SHACAL-1, Amplified boomerang attack, Block cipher, Differential cryptanalysis, Rectangle attack |
1 | Ian F. Blake, Aldar C.-F. Chan |
Conditionally Verifiable Signature. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel |
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Boolean Functions, Nonlinearity, Reed-Muller Code, Covering Radius, Walsh Transform, Idempotents, Rotational Symmetry |
1 | Debrup Chakraborty, Palash Sarkar 0001 |
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks |
1 | Matthew Darnall, Doug Kuhlman |
AES Software Implementations on ARM7TDMI. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Doche, Laurent Imbert |
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Elliptic curve cryptography, Double-base number system |
1 | Ryo Nojima, Kazukuni Kobara, Hideki Imai |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
RSA assumptions, public key encryption, chosen-ciphertext security |
1 | Antoine Joux, Pascal Delaunay |
Galois LFSR, Embedded Devices and Side Channel Weaknesses. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Alfred Menezes, Berkant Ustaoglu |
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Rana Barua, Tanja Lange 0001 (eds.) |
Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Palash Sarkar 0001 |
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Multi-receiver encryption, bilinear pairing, identity based encryption |
1 | Markku-Juhani Olavi Saarinen |
Security of VSH in the Real World. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mridul Nandi |
A Simple and Unified Method of Proving Indistinguishability. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai |
Algebraic Attacks on Clock-Controlled Cascade Ciphers. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Neal Koblitz, Alfred Menezes |
Another Look at "Provable Security". II. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Didier |
Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
fast algebraic attacks, Wiedemann’s algorithm, algebraic attacks, algebraic immunity |
1 | Subhamoy Maitra, C. E. Veni Madhavan, Ramarathnam Venkatesan (eds.) |
Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Coglianese, Bok-Min Goi |
MaTRU: A New NTRU-Based Cryptosystem. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
lattice attacks, partial polynomial evaluation, Public key cryptosystems, NTRU, lattice based cryptography |
1 | Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
How to Construct Universal One-Way Hash Functions of Order r. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function |
1 | Frederik Armknecht, Matthias Krause 0001, Dirk Stegemann |
Design Principles for Combiners with Memory. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
combiners with memory, Bluetooth E0, Stream cipher, algebraic attacks, correlation attacks |
1 | Man Ho Au, Sherman S. M. Chow, Willy Susilo |
Short E-Cash. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Coin-traceability, Bilinear Pairing, E-cash |
1 | Harald Niederreiter, Li-Ping Wang 0001 |
Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Word-based stream ciphers, multisequences, joint linear complexity, joint linear complexity profile |
1 | Domingo Gómez, Jaime Gutierrez 0001, Álvar Ibeas |
Cryptanalysis of the Quadratic Generator. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Akhilesh Tyagi |
Energy-Privacy Trade-Offs in VLSI Computations. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Chang Han Kim, Yongtae Kim, Nam Su Chang, IlHwan Park |
Modified Serial Multipliers for Type-IV Gaussian Normal Bases. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
serial multiplier, Finite fields, ECC, Massey-Omura multiplier, Gaussian Normal Basis |
1 | Michael Scott |
Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Tate pairing implementation, pairing-based cryptosystems |
1 | Heiko Stamer |
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems |
1 | Fabien Laguillaumie, Damien Vergnaud |
Short Undeniable Signatures Without Random Oracles: The Missing Link. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jin Hong 0001 |
Period of Streamcipher Edon80. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Edon80, streamcipher, period |
1 | Souradyuti Paul, Bart Preneel |
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet |
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | An Braeken, Bart Preneel |
On the Algebraic Immunity of Symmetric Boolean Functions. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jin Hong 0001, Woo-Hwan Kim |
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
MICKEY, time memory data tradeoff, internal state entropy, stream cipher, weak key |
1 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation |
1 | Håkan Englund, Alexander Maximov |
Attack the Dragon. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tanja Lange 0001, Pradeep Kumar Mishra |
SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Gildas Avoine, Pascal Junod, Philippe Oechslin |
Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
cryptanalysis, precomputation, Time-memory trade-off |
1 | Christophe Nègre |
Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
small characteristic, cryptography, Elliptic curve, scalar multiplication |
Displaying result #401 - #500 of 669 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|