The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CRYPTO"( http://dblp.L3S.de/Venues/CRYPTO )

URL (DBLP): http://dblp.uni-trier.de/db/conf/crypto

Publication years (Num. hits)
1981 (40) 1982 (36) 1983 (30) 1984 (41) 1985 (45) 1986 (37) 1987 (44) 1988 (44) 1989 (60) 1990 (49) 1991 (39) 1992 (44) 1993 (41) 1994 (40) 1995 (37) 1996 (31) 1997 (38) 1998 (36) 1999 (40) 2000 (34) 2001 (34) 2002 (40) 2003 (37) 2004 (35) 2005 (34) 2006 (37) 2007 (35) 2008 (33) 2009 (40) 2010 (40) 2011 (44) 2012 (51)
Publication types (Num. hits)
inproceedings(1234) proceedings(32)
Venues (Conferences, Journals, ...)
CRYPTO(1266)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 559 occurrences of 325 keywords

Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ran Canetti Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Ari Juels, Michael Luby, Rafail Ostrovsky Security of Blind Digital Signatures (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jerome A. Solinas An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF public-key cryptography, elliptic curves, exponentiation
1Eli Biham, Adi Shamir Differential Fault Analysis of Secret Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky Deniable Encryption. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jean-François Misarsky A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Multiplicative attack, redundancy, RSA, LLL algorithm
1Jan Camenisch, Markus Stadler Efficient Group Signature Schemes for Large Groups (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Matthew K. Franklin Efficient Generation of Shared RSA Keys (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF RSA, Threshold Cryptography, Multiparty computation, Primality testing
1Serge Vaudenay Hidden Collisions on DSS. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Tor Helleseth, Thomas Johansson 0001 Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF exponential sums, Galois rings, authentication codes, Universal hash functions
1James L. Massey, Shirlei Serconek Linear Complexity of Periodic Sequences: A General Theory. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Games-Chan algorithm, Hadamard product, Hasse derivative, hyperderivative, stream ciphers, Discrete Fourier transform, DFT, linear complexity
1Mihir Bellare, Ran Canetti, Hugo Krawczyk Keying Hash Functions for Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin Robust and Efficient Sharing of RSA Functions. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Ramarathnam Venkatesan Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Claus-Peter Schnorr Security of 2^t-Root Identification and Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model
1Ronald Cramer, Ivan Damgård New Generation of Secure and Practical RSA-Based Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1John Kelsey, Bruce Schneier, David A. Wagner 0001 Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Richard J. Lipton Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Antoon Bosselaers, René Govaerts, Joos Vandewalle Fast Hashing on the Pentium. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Pentium processor, Parallel implementation, Software performance, Cryptographic hash functions
1Joe Kilian, Phillip Rogaway How to Protect DES Against Exhaustive Key Search. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Stefan Droste New Results on Visual Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography
1Paul Camion, Anne Canteaut Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Correlation-immune functions, cryptanalysis, stream ciphers, hash functions, orthogonal arrays
1Mats Näslund All Bits ax+b mod p are Hard (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Daniel R. Simon Anonymous Communication and Anonymous Cash. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF anonymous communication, Electronic cash
1Mustafa Atici, Douglas R. Stinson Universal Hashing and Multiple Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF universal hashing, Authentication code
1Carlo Blundo, Luiz A. Frota Mattos, Douglas R. Stinson Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Shai Halevi, Silvio Micali Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Susan K. Langford Weakness in Some Threshold Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems
1Neal Koblitz (eds.) Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Dominic Mayers Quantum Key Distribution and String Oblivious Transfer in Noisy Channels. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Markus Jakobsson, Moti Yung Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Richard J. Hughes, Gabriel G. Luther, George L. Morgan, Charles G. Peterson, Charles M. Simmons Quantum Cryptography over Underground Optical Fibers. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Paul C. Kocher Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptanalysis, DSS, RSA, Timing attack, Diffie-Hellman
1Jacques Patarin Asymmetric Cryptography with a Hidden Monomial. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer, Stefan Wolf 0001 Diffie-Hellman Oracles. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, Public-key cryptography, Elliptic curves, Discrete logarithms
1Adam L. Young, Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone
1Victor Shoup On Fast and Provably Secure Message Authentication Based on Universal Hashing. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Paul C. van Oorschot, Michael J. Wiener Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF parallel collision search, low Hamming weight exponents, cryptanalysis, DES, Meet-in-the-middle attack
1Lars R. Knudsen, Willi Meier Improved Differential Attacks on RC5. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys
1Amos Beimel, Benny Chor Secret Sharing with Public Reconstruction (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra Some Remarks on Lucas-Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Andrew Klapper, Mark Goresky Cryptanalysis Based on 2-Adic Rational Approximation. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF cryptanalysis, Binary sequences, rational approximation, feedback with carry shift registers, 2-adic numbers
1Susan K. Langford Threshold DSS Signatures without a Trusted Party. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Yair Frankel, Moti Yung Escrow Encryption Systems Visited: Attacks, Analysis and Designs. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Sangjoon Park, Sangjin Lee, Seung-Cheol Goh On the Security of the Gollmann Cascades. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Don Coppersmith (eds.) Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1G. R. Blakley, Gregory Kabatianskii General Perfect Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Roch Guérin, Phillip Rogaway XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Yair Frankel, Moti Yung Cryptanalysis of the Immunized LL Public Key Systems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Chae Hoon Lim, Pil Joong Lee Security and Performance of Server-Aided RSA Computation Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Oded Goldreich 0001, Tatsuaki Okamoto, Avi Wigderson Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson, Roger M. Needham Robustness Principles for Public Key Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Richard J. Lipton Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Claude Crépeau, Jeroen van de Graaf, Alain Tapp Committed Oblivious Transfer and Private Multi-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Dominic Mayers On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Joe Kilian Improved Efficient Arguments (Preliminary Version). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Bruce Dodson, Arjen K. Lenstra NFS with Four Large Primes: An Explosive Experiment. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Philippe Béguin, Jean-Jacques Quisquater Fast Server-Aided RSA Signatures Secure Against Active Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto An Efficient Divisible Electronic Cash Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen A Key-schedule Weakness in SAFER K-64. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Joe Kilian, Frank Thomson Leighton Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Bart Preneel, Paul C. van Oorschot MDx-MAC and Building Fast MACs from Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Donald Beaver Precomputing Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Ronald Cramer, Ivan Damgård Secure Signature Schemes based on Interactive Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Silvio Micali, Ray Sidney A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Richard Schroeppel, Hilarie K. Orman, Sean W. O'Malley, Oliver Spatscheck Fast Key Exchange with Elliptic Curve Systems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Jacques Patarin Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'88. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Dan Boneh, James Shaw Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Thorsten Theobald How to Break Shamir's Asymmetric Basis. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Burton S. Kaliski Jr., Yiqun Lisa Yin On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Shai Halevi Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Phillip Rogaway Bucket Hashing and its Application to Fast Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra, Peter Winkler 0001, Yacov Yacobi A Key Escrow System with Warrant Bounds. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Kazuo Ohta, Shiho Moriai, Kazumaro Aoki Improving the Search Algorithm for the Best Linear Expression. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
1Susan K. Langford, Martin E. Hellman Differential-Linear Cryptanalysis. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Daniel Bleichenbacher, Ueli M. Maurer Directed Acyclic Graphs, One-way Functions and Digital Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Preda Mihailescu Fast Generation of Provable Primes Using Search in Arithmetic Progressions. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Eyal Kushilevitz, Adi Rosén A Randomnesss-Rounds Tradeoff in Private Computation. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Douglas R. Stinson (eds.) Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Kazuo Ohta, Kazumaro Aoki Linear Cryptanalysis of the Fast Data Encipherment Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Carlo Blundo, Alfredo De Santis, Giovanni Di Crescenzo, Antonio Giorgio Gaggia, Ugo Vaccaro Multi-Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ingrid Biehl, Johannes A. Buchmann, Christoph Thiel Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ueli M. Maurer Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jinhui Chao, Kazuo Tanada, Shigeo Tsujii Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Don Davis, Ross Ihaka, Philip Fenstermacher Cryptographic Randomness from Air Turbulence in Disk Drives. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Chae Hoon Lim, Pil Joong Lee More Flexible Exponentiation with Precomputation. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Tamás Horváth 0002, Spyros S. Magliveras, Tran van Trung A Parallel Permutation Multiplier for a PGM Crypto-chip. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Mike Burmester On the Risk of Opening Distributed Keys. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jean-Pierre Tillich, Gilles Zémor Hashing with SL_2. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Hugo Krawczyk LFSR-based Hashing and Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Kazue Sako, Joe Kilian Secure Voting Using Partially Compatible Homomorphisms. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto Designated Confirmer Signatures and Public-Key Encryption are Equivalent. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Thomas Beth, Dejan E. Lazic, A. Mathias Cryptanalysis of Cryptosystems Based on Remote Chaos Replication. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Christian Gehrmann Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng 0001 Pitfalls in Designing Substitution Boxes (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Benny Chor, Amos Fiat, Moni Naor Tracing Traitors. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Joe Kilian, Phillip Rogaway The Security of Cipher Block Chaining. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Marc Girault, Jacques Stern On the Length of Cryptographic Hash-Values Used in Identification Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 1266 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license