The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CT-RSA"( http://dblp.L3S.de/Venues/CT-RSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ctrsa

Publication years (Num. hits)
2001 (34) 2002 (22) 2003 (29) 2004 (29) 2005 (26) 2006 (24) 2007 (25) 2008 (28) 2009 (32) 2010 (27) 2011 (26) 2012 (27) 2013 (26) 2014 (26) 2015 (27) 2016 (27) 2017 (26) 2018 (27) 2019 (29) 2020 (29) 2021 (28) 2022 (25) 2023 (27) 2024 (19)
Publication types (Num. hits)
inproceedings(621) proceedings(24)
Venues (Conferences, Journals, ...)
CT-RSA(645)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 329 occurrences of 199 keywords

Results
Found 645 publication records. Showing 645 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai A "Medium-Field" Multivariate Public-Key Encryption Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1David Pointcheval (eds.) Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shaoquan Jiang, Guang Gong A Round and Communication Efficient Secure Ranking Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1M. Jason Hinek Another Look at Small RSA Exponents. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Orr Dunkelman, Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lan Nguyen Accumulators from Bilinear Pairings and Applications. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators
1Philip D. MacKenzie, Sarvar Patel Hard Bits of the Discrete Log with Applications to Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Alfred Menezes (eds.) Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Jonathan Katz Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public-key encryption, Identity-based encryption, Chosen-ciphertext security
1Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 A Fast Correlation Attack on the Shrinking Generator. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Linear feedback shift register, Fast correlation attack, Shrinking generator
1Stefan Mangard, Thomas Popp, Berndt M. Gammel Side-Channel Leakage of Masked CMOS Gates. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Scott Computing the Tate Pairing. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Elliptic curves, pairing-based cryptosystems
1Fabien Laguillaumie, Damien Vergnaud Time-Selective Convertible Undeniable Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Convertible undeniable signatures, time-selective conversion, anonymity, bilinear maps, exact security
1Zvi Gutterman, Dahlia Malkhi Hold Your Sessions: An Attack on Java Session-Id Generation. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF space-time tradeoff, HTTP, web security, pseudo random number generators
1Mihir Bellare, Haixia Shi, Chong Zhang Foundations of Group Signatures: The Case of Dynamic Groups. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1James A. Muir, Douglas R. Stinson New Minimal Weight Representations for Left-to-Right Window Methods. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Cynthia Dwork Sub-linear Queries Statistical Databases: Privacy with Power. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, David Pointcheval Simple Password-Based Encrypted Key Exchange Protocols. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encrypted key exchange, Password, Diffie-Hellman assumptions
1Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck CryptoGraphics: Secret Key Cryptography Using Graphics Cards. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES
1Tsz Hon Yuen, Victor K. Wei Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Frances F. Yao, Yiqun Lisa Yin Design and Analysis of Password-Based Key Derivation Functions. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Noel McCullagh, Paulo S. L. M. Barreto A New Two-Party Identity-Based Authenticated Key Agreement. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear maps, Tate pairing, identity-based cryptography, authenticated key agreement
1Yang Cui 0001, Kazukuni Kobara, Hideki Imai A Generic Conversion with Optimal Redundancy. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
1An Braeken, Christopher Wolf, Bart Preneel A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nick Howgrave-Graham, Joseph H. Silverman, William Whyte Choosing Parameter Sets forwithand. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inversion in GF(2n), smart card implementation, AES, S-box, composite fields
1Michael Szydlo, Burton S. Kaliski Jr. Proofs for Two-Server Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concrete security reduction, secret sharing, password authentication
1Olivier Billet, Henri Gilbert Resistance of SNOW 2.0 Against Algebraic Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SNOW 2.0, stream ciphers, algebraic attacks
1Amir Herzberg On Tolerant Cryptographic Constructions. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vincent Rijmen, Elisabeth Oswald Update on SHA-1. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions
1Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai Bit String Commitment Reductions with a Non-zero Rate. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Arnold K. L. Yau Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF padding oracle attack, CBC-mode encryption, ISO standard
1Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn A Certificate-Based Signature Scheme. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Maneli Noorkami, Faramarz Fekri A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, LDPC codes
1Tatsuaki Okamoto (eds.) Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, David Naccache Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fiat-Shamir Identification Protocol, Zero-knowledge
1Stefan Mangard Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Benoît Chevallier-Mames Self-Randomized Exponentiation Algorithms. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Qinglin Jiang, Douglas S. Reeves, Peng Ning Improving Robustness of PGP Keyrings by Conflict Detection. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen Periodic Properties of Counter Assisted Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Stream cipher, diversity, period, counter, degeneracy, Rabbit
1Quang Viet Duong, Kaoru Kurosawa Almost Ideal Contrast Visual Cryptography with Reversing. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ideal contrast, perfect black, Visual cryptography
1Wieland Fischer, Jean-Pierre Seifert High-Speed Modular Multiplication. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Sedlaks algorithm, Computer arithmetic, Modular multiplication, Implementation issues, Booth recoding
1Raphael Chung-Wei Phan Related-Key Attacks on Triple-DES and DESX Variants. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Willi Geiselmann, Rainer Steinwandt Yet Another Sieving Device. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Roar Lien, Tim Grembowski, Kris Gaj A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Nut Taesombut Online Encryption Schemes: New Security Notions and Constructions. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Daniel Bleichenbacher Compressing Rabin Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Marc Fischlin Fast Verification of Hash Chains. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hash tree, Hash function, Certificate, hash chain
1Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih Design of AES Based on Dual Cipher and Composite Field. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Swee-Huay Heng, Kaoru Kurosawa k-Resilient Identity-Based Encryption in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption
1Alfred Menezes, Edlyn Teske, Annegret Weng Weak Fields for ECC. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Adam L. Young, Moti Yung A Key Recovery System as Secure as Factoring. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Rabin, Blum integer, pseudosquare, PKCS #1, standard compatibility, RSA, public key cryptography, zero-knowledge, chosen ciphertext security, key recovery, semantic Security, quadratic residue
1Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RSA, ECC, Side-channel attacks, Systolic array, Hardware implementation, Montgomery multiplication, FPGA design
1Kemal Bicakci, Nazife Baykal Server Assisted Signatures Revisited. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF server-assisted signature, pervasive computing, digital signature, one-time signature
1Benoît Libert, Jean-Jacques Quisquater Identity Based Undeniable Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF provable security, pairings, undeniable signatures, ID-based cryptography
1Colin D. Walter Issues of Security with the Oswald-Aigner Exponentiation Algorithm. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Addition-subtraction chains, randomized exponentiation, elliptic curve cryptography, ECC, DPA, blinding, power analysis, smartcard, SPA, DEMA, point multiplication, SEMA
1Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson Universal Re-encryption for Mixnets. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Shai Halevi, Phillip Rogaway A Parallelizable Enciphering Mode. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung A Generic Construction for Intrusion-Resilient Public-Key Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lu Xiao 0003, Howard M. Heys Hardware Performance Characterization of Block Cipher Structures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung Intrusion-Resilient Public-Key Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Kerckhoffs' assumption, provable security, chosen-ciphertext security
1Mihir Bellare, Bennet S. Yee Forward-Security in Private-Key Cryptography. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF pseudorandom bit generators, message authentication, forward security, Symmetric cryptography, audit logs, proofs of security
1Jeffrey Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joseph H. Silverman, William Whyte NTRUSIGN: Digital Signatures Using the NTRU Lattice. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Douglas L. Whiting, Michael J. Sabin Montgomery Prime Hashing for Message Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MAC, message authentication, Universal hash
1John Malone-Lee, Wenbo Mao Two Birds One Stone: Signcryption Using RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Guido Bertoni, Jorge Guajardo, Sandeep S. Kumar, Gerardo Orlando, Christof Paar, Thomas J. Wollinger Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF elliptic curve arithmetic, Elliptic curve cryptosystem, scalar multiplication, pairing-based cryptosystem, ECM
1Colin D. Walter Seeing through MIST Given a Small Fraction of an RSA Private Key. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA
1Katsuyuki Okeya, Tsuyoshi Takagi The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF width-w NAF, pre-computation table, smart card, side channel attacks, Elliptic curve cryptosystem, memory constraint
1Huaxiong Wang, Josef Pieprzyk Shared Generation of Pseudo-Random Functions with Cumulative Maps. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart Access Control Using Pairing Based Cryptography. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo Fractal Merkle Tree Representation and Traversal. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authentication, fractal, Merkle tree, Amortization
1Nicolas T. Courtois, Jacques Patarin About the XL Algorithm over GF(2). Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MQ problem, overdefined and exactly defined systems of multivariate equations, Gröbner bases, XSL attacks on AES, XL algorithm, Multivariate quadratic equations
1Steven D. Galbraith, Wenbo Mao Invisibility and Anonymity of Undeniable and Confirmer Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF confirmer signatures, anonymity, RSA, Undeniable signatures, invisibility
1Marc Joye (eds.) Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Adi Shamir RSA Shortcuts. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Thomas A. Berson Cryptography after the Bubble: How to Make an Impact on the World. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco, Douglas R. Stinson Fault Tolerant and DistributedBroadcast Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim An Analysis of Proxy Signatures: Is a Secure Channel Necessary? Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Ilya Mironov, Victor Shoup A Secure Signature Scheme from Bilinear Maps. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Tetsu Iwata TMAC: Two-Key CBC MAC. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher, provable security, CBC MAC
1Claude Crépeau, Alain Slakmon Simple Backdoors for RSA Key Generation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Applications of Pedersen's Distributed Key Generation Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed key generation, discrete logarithm, random oracle model, Threshold cryptography, exact security
1Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos, Robert F. Cohen Authenticated Data Structures for Graph and Geometric Searching. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shouhuai Xu, Ravi S. Sandhu Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Xuhua Ding, Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mediated RSA, revocation, Identity-based encryption
1Bodo Möller Provably Secure Public-Key Encryptionfor Length-Preserving Chaumian Mixes. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Burton S. Kaliski Jr. On Hash Function Firewalls in Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems
1Cheng-Fen Lu, Shiuh-Pyng Winston Shieh Secure Key-Evolving Protocols for Discrete Logarithm Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key-Evolving, Backward-Secrecy, Key Management, Forward-Secrecy
1Greg Maitland, Colin Boyd Co-operatively Formed Group Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Silvio Micali, Ronald L. Rivest Transitive Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF graphs, digital signatures, public-key cryptography, transitive closure
1John Black, Phillip Rogaway Ciphers with Arbitrary Finite Domains. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Provable security, Modes of Operation, Symmetric Encryption, Ciphers
1Atsuko Miyaji, Masao Nonaka, Yoshinori Takii Known Plaintext Correlation Attack against RC5. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Geeke Muurling Montgomery in Practice: How to Do It More Efficiently in Hardware. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF scalability, performance model, systolic array, Montgomery multiplication, modular exponentiation
1Colin D. Walter MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains
1Markus Jakobsson, Ari Juels, Phong Q. Nguyen Proprietary Certificates. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF collateral key, digital rights, fair encryption, proprietary key, certificates
1Robert Johnson, David Molnar, Dawn Xiaodong Song, David A. Wagner 0001 Homomorphic Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 645 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license