The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "EUROCRYPT"( http://dblp.L3S.de/Venues/EUROCRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eurocrypt

Publication years (Num. hits)
1982 (26) 1984 (36) 1985 (33) 1986 (36) 1987 (27) 1988 (42) 1989 (72) 1990 (49) 1991 (56) 1992 (45) 1993 (43) 1994 (48) 1995 (36) 1996 (35) 1997 (35) 1998 (45) 1999 (33) 2000 (42) 2001 (33) 2002 (36) 2003 (40) 2004 (37) 2005 (34) 2006 (36) 2007 (34) 2008 (32) 2009 (35) 2010 (35) 2011 (34) 2012 (44) 2013 (43) 2014 (39) 2016 (2)
Publication types (Num. hits)
inproceedings(1220) proceedings(33)
Venues (Conferences, Journals, ...)
EUROCRYPT(1253)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 421 occurrences of 264 keywords

Results
Found 1253 publication records. Showing 1253 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nigel P. Smart How Secure Are Elliptic Curves over Composite Extension Fields? Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Steven A. Myers Efficient Amplification of the Security of Weak Pseudo-random Function Generators. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, Adam D. Smith Efficient and Non-interactive Non-malleable Commitment. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård, Jesper Buus Nielsen Multiparty Computation from Threshold Homomorphic Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin On Adaptive vs. Non-adaptive Security of Multiparty Protocols. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali Identification Protocols Secure against Reset Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ulrich Kühn 0001 Cryptanalysis of Reduced-Round MISTY. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Frederik Vercauteren, Bart Preneel, Joos Vandewalle A Memory Efficient Version of Satoh's Algorithm. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF order counting, Satoh's algorithm, finite field, elliptic curve
1Claude Crépeau, Frédéric Légaré, Louis Salvail How to Convert the Flavor of a Quantum Bit Commitment. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Hugo Krawczyk Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Mireille Fouquet, Pierrick Gaudry, Robert Harley Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Craig Gentry Key Recovery and Message Attacks on NTRU-Composite. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Adi Shamir Structural Cryptanalysis of SASAS. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Structural cryptanalysis, substitution permutation networks, substitution affine networks, Cryptanalysis, block ciphers, Rijndael
1Jonathan Katz, Rafail Ostrovsky, Moti Yung Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Marc Girault, Jean-François Misarsky Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Victor Shoup A Composition Theorem for Universal One-Way Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Claude Carlet, Pascale Charpin, Caroline Fontaine Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Alexandra Boldyreva, Silvio Micali Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Markus Michels Confirmer Signature Schemes Secure against Adaptive Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Anna Lysyanskaya Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, David Naccache Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra, Adi Shamir Analysis and Optimization of the TWINKLE Factoring Device. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Guillaume Poupard, Jacques Stern Fair Encryption of RSA Keys. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Shin-ichi Kawamura, Masanobu Koike, Fumihiko Sano, Atsushi Shimbo Cox-Rower Architecture for Fast Parallel Montgomery Multiplication. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier New Attacks on PKCS#1 v1.5 Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Daniel Bleichenbacher, Phong Q. Nguyen Noisy Polynomial Interpolation and Noisy Chinese Remaindering. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Stefan Wolf 0001 Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Eli Biham Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Fabrice Boudot Efficient Proofs that a Committed Number Lies in an Interval. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Stefan Lucks The Sum of PRPs Is a Secure PRF. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, David A. Wagner 0001 Advanced Slide Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård, Ueli M. Maurer General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Pierrick Gaudry An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Eyal Kushilevitz, Rafail Ostrovsky One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1François Grieu A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Éliane Jaulmes, Antoine Joux A NICE Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Paul Dumais, Dominic Mayers, Louis Salvail Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Dario Catalano, Rosario Gennaro, Shai Halevi Computing Inverses over a Shared Secret Modulus. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Bart Preneel (eds.) Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Victor Shoup Practical Threshold Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Anthony E. Sale Colossus and the German Lorenz Cipher - Code Breaking in WW II. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  BibTeX  RDF
1Victor Shoup Using Hash Functions as a Hedge against Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Donald Beaver Minimal-Latency Secure Function Evaluation. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Michaël Trabbia Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ivan Damgård Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman J. J. te Riele, Karen I. Aardal, Jeff Gilchrist, Gérard Guillerm, Paul C. Leyland, Joël Marchand, François Morain, Alec Muffett, Chris Putnam, Craig Putnam, Paul Zimmermann Factorization of a 512-Bit RSA Modulus. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Victor Boyko, Philip D. MacKenzie, Sarvar Patel Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Kaoru Kurosawa How to Break a Practical MIX and Design a New One. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Michael Walker 0001 On the Security of 3GPP Networks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001, Subhamoy Maitra Construction of Nonlinear Boolean Functions with Important Cryptographic Properties. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Gilles Brassard, Norbert Lütkenhaus, Tal Mor, Barry C. Sanders Security Aspects of Practical Quantum Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky Single Database Private Information Retrieval Implies Oblivious Transfer. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Martin Hirt, Kazue Sako Efficient Receipt-Free Voting Based on Homomorphic Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai Exposure-Resilient Functions and All-or-Nothing Transforms. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, David Pointcheval, Phillip Rogaway Authenticated Key Exchange Secure against Dictionary Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Aviad Kipnis, Jacques Patarin, Louis Goubin Unbalanced Oil and Vinegar Signature Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jan Camenisch, Markus Michels Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Moni Naor, Benny Pinkas, Omer Reingold Distributed Pseudo-random Functions and KDCs. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Luke O'Connor An Analysis of Exponentiation Based on Formal Languages. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Nigel P. Smart On the Performance of Hyperelliptic Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Wim Nevelsteen, Bart Preneel Software Performance of Universal Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jacques Stern (eds.) Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin Efficient Multiparty Computations Secure Against an Adaptive Adversary. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Christian Cachin, Silvio Micali, Markus Stadler Computationally Private Information Retrieval with Polylogarithmic Communication. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Euler's function, hiding assumption, Private information retrieval, Integer factorization
1Ran Canetti, Tal Malkin, Kobbi Nissim Efficient Communication-Storage Tradeoffs for Multicast Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Seongtaek Chee, Choonsik Park S-boxes with Controllable Nonlinearity. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Shafi Goldwasser An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen, Willi Meier Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Perceptron Problem, Simulated Annealing, Cryptanalysis, Identification Scheme
1Funda Ergün, Joe Kilian, Ravi Kumar 0001 A Note on the Limits of Collusion-Resistant Watermarks. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Watermarking, Intellectual Property Protection, Collusion Resistance
1Serge Vaudenay Resistance Against General Iterated Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Pascal Paillier Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF OEF, Table reference method, Finite field, Elliptic curve cryptosystem, Scalar multiplication, Frobenius map
1Yevgeniy Dodis, Silvio Micali Lower Bounds for Oblivious Transfer Reductions. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Glenn Durfee Cryptanalysis of RSA with Private Key d Less than N0.292. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Philip Hawkes, Luke O'Connor XOR and Non-XOR Differential Probabilities. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Marc Fischlin Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Shai Halevi, Tal Rabin Secure Hash-and-Sign Signatures Without the Random Oracle. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Hash and Sign, Smooth Numbers, Digital Signatures, RSA, Random Oracle, Chameleon Hashing
1Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Distributed Key Generation, Discrete Logarithm, Threshold Cryptography, VSS
1Thomas Johansson 0001, Fredrik Jönsson Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Stream ciphers, Convolutional codes, Correlation attacks
1Ivan Damgård, Joe Kilian, Louis Salvail On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Ransom Richardson, Joe Kilian On the Concurrent Composition of Zero-Knowledge Proofs. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Asynchronous Attacks, Black-box Simulation, Zero Knowledge
1David Pointcheval New Public Key Cryptosystems Based on the Dependent-RSA Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks
1Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Eli Biham, Alex Biryukov, Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Skipjack, Cryptanalysis, Differential cryptanalysis, Impossible differentials
1Birgit Pfitzmann, Ahmad-Reza Sadeghi Coin-Based Anonymous Fingerprinting. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramakrishnan Rajagopalan Conditional Oblivious Transfer and Timed-Release Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yongge Wang, Yvo Desmedt Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Perfect secrecy, Privacy, Reliability, Network security
1Kaoru Kurosawa, Yvo Desmedt Optimum Traitor Tracing and Asymmetric Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Michael Luby, Jessica Staddon Combinatorial Bounds for Broadcast Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow
1Tatsuaki Okamoto, Shigenori Uchiyama Security of an Identity-Based Cryptosystem and the Related Reductions. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1N. Asokan, Victor Shoup, Michael Waidner Optimistic Fair Exchange of Digital Signatures (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Christian Cachin On the Foundations of Oblivious Transfer. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Rényi Entropy, Statistical Security, Cryptographic Protocols, Oblivious Transfer, Multiparty Computation, Shannon Entropy
1Victor Boyko, Marcus Peinado, Ramarathnam Venkatesan Speeding up Discrete Log and Factoring Based Schemes via Precomputations. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Masayuki Abe Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Universal Verifiability, Electronic Voting, Mix-net
1Ueli M. Maurer, Stefan Wolf 0001 Lower Bounds on Generic Algorithms in Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, roots in finite groups, complexity, lower bounds, discrete logarithms, generic algorithms
1Alain P. Hiltgen Towards a Better Understanding of One-Wayness: Facing Linear Permutations. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Philip Hawkes Differential-Linear Weak Key Classes of IDEA. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF differential-linear cryptanalysis, related-key cryptanalysis, IDEA, weak keys
Displaying result #501 - #600 of 1253 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license