The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CRYPTO"( http://dblp.L3S.de/Venues/CRYPTO )

URL (DBLP): http://dblp.uni-trier.de/db/conf/crypto

Publication years (Num. hits)
1981 (40) 1982 (36) 1983 (30) 1984 (41) 1985 (45) 1986 (37) 1987 (44) 1988 (44) 1989 (60) 1990 (49) 1991 (39) 1992 (44) 1993 (41) 1994 (40) 1995 (37) 1996 (31) 1997 (38) 1998 (36) 1999 (40) 2000 (34) 2001 (34) 2002 (40) 2003 (37) 2004 (35) 2005 (34) 2006 (37) 2007 (35) 2008 (33) 2009 (40) 2010 (40) 2011 (44) 2012 (51)
Publication types (Num. hits)
inproceedings(1234) proceedings(32)
Venues (Conferences, Journals, ...)
CRYPTO(1266)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 559 occurrences of 325 keywords

Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Dan Boneh, Glenn Durfee, Nick Howgrave-Graham Factoring N = prq for Large r. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yonatan Aumann, Michael O. Rabin Information Theoretically Secure Communication in the Limited Storage Space Model. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Oded Goldreich 0001, Hugo Krawczyk Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Oded Goldreich 0001, Amit Sahai, Salil P. Vadhan Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi Towards Sound Approaches to Counteract Power-Analysis Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Adaptive Security for Threshold Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Eli Gafni, Jessica Staddon, Yiqun Lisa Yin Efficient Methods for Integrating Traceability and Broadcast Encryption. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Palash Sarkar 0001 Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Boolean Function, Stream Cipher, Nonlinearity, Balancedness, Correlation Immunity, Algebraic Degree
1Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner 0001 Truncated Differentials and Skipjack. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Amos Fiat, Tamir Tassa Dynamic Traitor Training. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Matthew K. Franklin An Efficient Public Key Traitor Tracing Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Niv Gilboa Two Party RSA Key Generation. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Moni Naor, Benny Pinkas Oblivious Transfer with Adaptive Queries. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Paul C. Kocher, Joshua Jaffe, Benjamin Jun Differential Power Analysis. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cryptanalysis, differential power analysis, DPA, DES, SPA
1Jee Hea An, Mihir Bellare Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Thomas Johansson 0001, Fredrik Jönsson Fast Correlation Attacks Based on Turbo Code Techniques. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Stream ciphers, turbo codes, convolutional codes, iterative decoding, correlation attacks
1Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie Abuse-Free Optimistic Contract Signing. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Amit Sahai Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai Cryptanalysis of "2 R" Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer Information-Theoretic Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF information-theoretic primitive, generalized random oracle, Information theory, unconditional security, conditional independence
1Phong Q. Nguyen, Jacques Stern The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Victor Boyko On the Security Properties of OAEP as an All-or-Nothing Transform. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF all-or-nothing transforms, encryption modes, polynomial indistinguishability, random oracles, semantic security, exact security, OAEP
1Ravi Kumar 0001, Sridhar Rajagopalan, Amit Sahai Coding Constructions for Blacklisting Problems without Computational Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF error-correcting codes, copyrights protection, broadcast encryption, blacklisting
1Eiichiro Fujisaki, Tatsuaki Okamoto Secure Integration of Asymmetric and Symmetric Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Adaptive chosen-ciphertext attack, Random oracle model, Indistinguishability, Hybrid encryption
1Masayuki Abe Robust Distributed Multiplicaton with out Interaction. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Distributed Multiplication, Cramer-Shoup Cryptosystem, Multi-Party Computation, Round Complexity
1Mark Etzel, Sarvar Patel, Zulfikar Ramzan SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Message authentication codes, Universal Hashing
1Niv Gilboa, Yuval Ishai Compressing Cryptographic Resources. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Rafail Ostrovsky On Concurrent Zero-Knowledge with Pre-processing. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Tomas Sander, Amnon Ta-Shma Auditable, Anonymous Electronic Cash Extended Abstract. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF anonymity, electronic cash
1Jean-Sébastien Coron, David Naccache, Julien P. Stern On the Security of RSA Padding. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Phong Q. Nguyen Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Tal Malkin, Silvio Micali The All-or-Nothing Nature of Two-Party Secure Computation. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Michael J. Wiener (eds.) Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Radha Poovendran, John S. Baras An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Florent Chabaud, Antoine Joux Differential Collisions in SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Willemson Time-Stamping with Binary Linking Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Kazuo Ohta, Tatsuaki Okamoto On Concrete Security Treatment of Signatures Derived from Identification. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Hugo Krawczyk (eds.) Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Yonatan Aumann, Michael O. Rabin Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Satoshi Hada, Toshiaki Tanaka On the Existence of 3-Round Zero-Knowledge Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Zero-knowledge, interactive proof, Diffie-Hellman problem
1Cynthia Dwork, Amit Sahai Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Chris Hall, David A. Wagner 0001, John Kelsey, Bruce Schneier Building PRFs from PRPs. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cipher feedback mode, block ciphers, pseudo-random functions, pseudo-random permutations, concrete security
1William Aiello, Sachin Lodha, Rafail Ostrovsky Fast Digital Identity Revocation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority
1Charanjit S. Jutla Generalized Birthday Arracks on Unbalanced Feistel Networks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF second moment method, Block ciphers, birthday attacks, pseudo-random permutations, Feistel networks
1Moni Naor, Omer Reingold From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Daniel Bleichenbacher Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF PKCS, RSA, SSL, chosen ciphertext attack
1Phong Q. Nguyen, Jacques Stern Cryptanalysis of the Ajtai-Dwork Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
1Damian Weber, Thomas F. Denny The Solution of McCurley's Discrete Log Challenge. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Index Calculus, Lanczos, Discrete Logarithms, Number Field Sieve
1Joe Kilian, Erez Petrank Identity Escrow. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Steven M. Bellovin Cryptography and the Internet. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Tal Rabin A Simplified Approach to Threshold and Proactive RSA. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF proactive signatures, threshold and proactive RSA, RSA, threshold signatures
1Matthias Fitzi, Martin Hirt, Ueli M. Maurer Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing
1Ronald Cramer, Ivan Damgård Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Oded Goldreich 0001, Birgit Pfitzmann, Ronald L. Rivest Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Tsuyoshi Takagi Fast RSA-Type Cryptosystem Modulo pkq. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Quisquater-Couvreur method, fast decryption, RSA cryptosystem, factoring algorithm
1Serge Vaudenay Cryptanalysis of the Chor-Rivest Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Aviad Kipnis, Adi Shamir Cryptanalysis of the Oil & Vinegar Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Takeshi Shimoyama, Toshinobu Kaneko Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Moni Naor, Benny Pinkas Threshold Traitor Tracing. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Neal Koblitz An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Supersingular, Nonadjacent Form, Digital Signature, Elliptic Curve
1Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes
1Ronald Cramer, Victor Shoup A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Sarvar Patel, Ganapathy S. Sundaram An Efficient Discrete Log Pseudo Random Generator. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Dario Catalano, Rosario Gennaro New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway Relations Among Notions of Security for Public-Key Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness
1William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks
1Daniel V. Bailey, Christof Paar Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF fast arithmetic, pseudo-Mersenne primes, OEF, binomials, cryptographic implementation, finite fields, elliptic curves, hyperelliptic curves, modular reduction, Optimal Extension Fields
1Louis Salvail Quantum Bit Commitment from a Physical Assumption. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Thomas A. Berson Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem
1Mikael Goldmann, Mats Näslund The Complexity of Computing Hard Core Predicates. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF small-depth circuit, one-way function, Pseudo-randomness
1Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung Proactive RSA. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Eiichiro Fujisaki, Tatsuaki Okamoto Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Christian Cachin, Ueli M. Maurer Unconditional Security Against Memory-Bounded Adversaries. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Oded Goldreich 0001 On the Foundations of Modern Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Hugo Krawczyk, Tal Rabin RSA-Based Undeniable Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Phong Q. Nguyen, Jacques Stern Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001 Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption
1Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi Public-Key Cryptosystems from Lattice Reduction Problems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Lattice Reduction Problems, Public-Key Cryptosystems
1Shlomi Dolev, Rafail Ostrovsky Efficient Anonymous Multicast and Reception (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Shafi Goldwasser, Daniele Micciancio "Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Chae Hoon Lim, Pil Joong Lee A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Pankaj Rohatgi How to Sign Digital Streams. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Adam L. Young, Moti Yung The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log
1Gilles Brassard Quantum Information Processing: The Good, the Bad and the Ugly. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Moni Naor, Benny Pinkas Visual Authentication and Identification. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Authentication, identification, visual cryptography
1Ueli M. Maurer, Stefan Wolf 0001 Privacy Amplification Secure Against Active Adversaries. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement
1Tsuyoshi Takagi Fast RSA-Type Cryptosystems Using N-Adic Expansion. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Sachar Paulus A One Way Function Based on Ideal Arithmetic in Number Fields. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number fields, shortest vectors in lattices, One way function
1Mihir Bellare, Phillip Rogaway Collision-Resistant Hashing: Towards Making UOWHFs Practical. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jorge Guajardo, Christof Paar Efficient Algorithms for Elliptic Curve Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung Keeping the SZK-Verifier Honest Unconditionally. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Burton S. Kaliski Jr. (eds.) Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Donald Beaver Plug and Play Encryption. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1David A. Wagner 0001, Bruce Schneier, John Kelsey Cryptanalysis of the Cellular Encryption Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF cellular telephone, Cryptanalysis, block ciphers
1Jovan Dj. Golic, Renato Menicocci Edit Distance Correlation Attack on the Alternating Step Generator. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF clock-controlled shift registers, alternating step generator, cryptanalysis, Stream ciphers, edit distance, correlation attacks
1Daniel Bleichenbacher On the Security of the KMOV Public Key Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Public-key Encryption Schemes, Computational Problems in Lattices
1Lars R. Knudsen, Bart Preneel Fast and Secure Hashing Based on Codes. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1266 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license