The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52)
Publication types (Num. hits)
inproceedings(741) proceedings(21)
Venues (Conferences, Journals, ...)
ACISP(762)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 762 publication records. Showing 762 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe 0001 Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yunhua Wen, Shengli Liu Reusable Fuzzy Extractor from LWE. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Handan Kilinç, Serge Vaudenay Secure Contactless Payment. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi CRT-KPS: A Key Predistribution Schemes Using CRT. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu Linkable Group Signature for Auditing Anonymous Communication. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kexin Hu, Zhenfeng Zhang Fast Lottery-Based Micropayments for Decentralized Currencies. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chen-Dong Ye, Tian Tian A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Liqiang Peng, Yao Lu 0002, Noboru Kunihiro, Rui Zhang 0002, Lei Hu A Deterministic Algorithm for Computing Divisors in an Interval. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nicolas Marrière, Valérie Nachef, Emmanuel Volte Differential Attacks on Reduced Round LILLIPUT. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yeali S. Sun, Chien-Chun Chen, Shun-Wen Hsiao, Meng Chang Chen ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu Auditable Hierarchy-Private Public-Key Encryption. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue Live Path CFI Against Control Flow Hijacking Attacks. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu Decentralized Blacklistable Anonymous Credentials with Reputation. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shimin Li, Bei Liang, Rui Xue Private Functional Signatures: Definition and Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qiqi Lai, Bo Yang 0003, Yong Yu 0002, Yuan Chen, Liju Dong Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu Lattice-Based Universal Accumulator with Nonmembership Arguments. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sumanta Sarkar, Habeeb Syed Bounds on Differential and Linear Branch Number of Permutations. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chi Liu, Rongmao Chen, Yi Wang, Yongjun Wang Asymmetric Subversion Attacks on Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Guomin Yang (eds.) Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang 0002, Shuhui Chen, Ho-fung Leung Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yan Xu 0007, Ran Ding, Jie Cui 0004, Hong Zhong 0001 Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jian Shen 0001, Dengzhi Liu, Xiaofeng Chen 0001, Xinyi Huang, Jiageng Chen, Mingwu Zhang Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda 0002, Koki Hamada, Koji Chida Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jie Cui 0004, Jiantao He, Yan Xu 0007, Hong Zhong 0001 TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu Z-Channel: Scalable and Efficient Scheme in Zerocash. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Howard M. Heys Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode). Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Deqing Zou, Zhijun Deng, Zhen Li, Hai Jin 0001 Automatically Identifying Security Bug Reports via Multitype Features Analysis. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bernardo David, Rafael Dowsley, Mario Larangeira 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhe Xia, Liuying Sun, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuntao Wang, Tsuyoshi Takagi Improving the BKZ Reduction Algorithm by Quick Reordering Technique. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001 Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Souradyuti Paul, Ananya Shrivastava Robust Multiparty Computation with Faster Verification Time. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xingye Lu, Zhenfei Zhang, Man Ho Au Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand New Attacks and Secure Design for Anonymous Distance-Bounding. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Thomas Haines Forward-Secure Linkable Ring Signatures. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eunkyung Kim 0002, Hyang-Sook Lee, Jeongeun Park Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuecheng Ma, Xin Wang, Dongdai Lin Anonymous Identity-Based Encryption with Identity Recovery. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yinxia Sun, Futai Zhang, Anmin Fu Revocable Certificateless Encryption with Ciphertext Evolution. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li Lattice-Based Dual Receiver Encryption and More. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Scott R. Fluhrer, Saraswathy RV Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yali Zeng, Xu Li, Xu Yang, Qikui Xu, Dongcheng Wang A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Terry Shue Chien Lau, Chik How Tan A New Encryption Scheme Based on Rank Metric Codes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ryoma Ito, Atsuko Miyaji New Iterated RC4 Key Correlations. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu Revisiting the Incentive Mechanism of Bitcoin-NG. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hyung Tae Lee, Huaxiong Wang, Kai Zhang Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhelei Sun, Peng Wang, Liting Zhang Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Priyanka Bose, Dipanjan Das 0002, Chandrasekaran Pandu Rangan Constant Size Ring Signature Without Random Oracle. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jianchang Lai, Yi Mu 0001, Fuchun Guo, Willy Susilo Improved Identity-Based Online/Offline Encryption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuu Ishida, Yohei Watanabe 0001, Junji Shikata Constructions of CCA-Secure Revocable Identity-Based Encryption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryoma Ito, Atsuko Miyaji How TKIP Induces Biases of Internal States of Generic RC4. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yiteng Feng, Yi Mu 0001, Guomin Yang, Joseph K. Liu A New Public Remote Integrity Checking Scheme with User Privacy. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Biaoshuai Tao, Hongjun Wu Improving the Biclique Cryptanalysis of AES. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christophe Nègre, Guilherme Perin Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Leliel Trethowen, Craig Anslow, Stuart Marshall, Ian Welch VisRAID: Visualizing Remote Access for Intrusion Detection. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qiang Tang 0001 Towards Forward Security Properties for PEKS and IBE. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Andreas Hülsing, Tanja Lange 0001, Ruben Niederhagen Bad Directions in Cryptographic Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li Cryptanalysis of Reduced-Round Whirlwind. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu 0001, Guomin Yang, Fuchun Guo, Xiaofen Wang A New General Framework for Secure Public Key Encryption with Keyword Search. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nilanjan Datta, Kan Yasuda Generalizing PMAC Under Weaker Assumptions. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benjamin Dowling, Douglas Stebila Modelling Ciphersuite and Version Negotiation in the TLS Protocol. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim BP-XACML an Authorisation Policy Language for Business Processes. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Megha Agrawal, Donghoon Chang, Somitra Sanadhya sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tingting Zhang, Hongda Li, Guifang Huang Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuyu Wang, Keisuke Tanaka Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ernest Foo, Douglas Stebila (eds.) Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yusuke Sakai 0001, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Adrien Bourgeois, Xavier Carpent Analysis of Rainbow Tables with Fingerprints. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Le Trieu Phong IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Felix Günther 0001, Bertram Poettering Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik Some Insights into Differential Cryptanalysis of Grain v1. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yanfeng Wang, Wenling Wu Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuyu Wang, Keisuke Tanaka Strongly Simulation-Extractable Leakage-Resilient NIZK. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy A Semantics-Aware Classification Approach for Data Leakage Prevention. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin Hierarchical Identity-Based Broadcast Encryption. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Petr Susil, Pouyan Sepehrdad, Serge Vaudenay On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shi Bai, Steven D. Galbraith Lattice Decoding Attacks on Binary LWE. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liang Liu, Xiaofeng Chen 0001, Wenjing Lou A Secure Three-Party Computational Protocol for Triangle Area. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bungo Taga, Shiho Moriai, Kazumaro Aoki Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nilanjan Datta, Mridul Nandi ELmE: A Misuse Resistant Parallel Authenticated Encryption. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhijiao Zhang, Lei Zhang, Yu Chen 0004, Yuanchun Shi Running Multiple Androids on One ARM Platform. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu ExBLACR: Extending BLACR System. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Long Wen, Meiqin Wang Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 762 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license