The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CRYPTO"( http://dblp.L3S.de/Venues/CRYPTO )

URL (DBLP): http://dblp.uni-trier.de/db/conf/crypto

Publication years (Num. hits)
1981 (40) 1982 (36) 1983 (30) 1984 (41) 1985 (45) 1986 (37) 1987 (44) 1988 (44) 1989 (60) 1990 (49) 1991 (39) 1992 (44) 1993 (41) 1994 (40) 1995 (37) 1996 (31) 1997 (38) 1998 (36) 1999 (40) 2000 (34) 2001 (34) 2002 (40) 2003 (37) 2004 (35) 2005 (34) 2006 (37) 2007 (35) 2008 (33) 2009 (40) 2010 (40) 2011 (44) 2012 (51)
Publication types (Num. hits)
inproceedings(1234) proceedings(32)
Venues (Conferences, Journals, ...)
CRYPTO(1266)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 559 occurrences of 325 keywords

Results
Found 1266 publication records. Showing 1266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas Collusion-Preserving Computation. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dennis Hofheinz, Tibor Jager Tightly Secure Signatures and Public-Key Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan Differential Privacy with Imperfect Randomness. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Romain Bardou, Riccardo Focardi, Yusuke Kawamoto 0001, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay Efficient Padding Oracle Attacks on Cryptographic Hardware. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Huijia Lin, Rafael Pass Black-Box Constructions of Composable Protocols without Set-Up. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Simon Knellwolf, Dmitry Khovratovich New Preimage Attacks against Reduced SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Thomas Ristenpart, Stefano Tessaro Multi-instance Security and Its Application to Password-Based Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti Impossibility Results for Static Input Secure Computation. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Takahiro Matsuda 0002, Jacob C. N. Schuldt On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Asli Bay, Atefeh Mashatan, Serge Vaudenay Resistance against Iterated Attacks by Decorrelation Revisited, . Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter Public Keys. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Frédéric Dupuis, Jesper Buus Nielsen, Louis Salvail Actively Secure Two-Party Evaluation of Any Quantum Operation. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bart Mennink, Bart Preneel Hash Functions Based on Three Permutations: A Generic Security Analysis. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benoît Libert, Thomas Peters, Moti Yung Group Signatures with Almost-for-Free Revocation. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee Functional Encryption with Bounded Collusions via Multi-party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Will Landecker, Thomas Shrimpton, R. Seth Terashima Tweakable Blockciphers with Beyond Birthday-Bound Security. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1John P. Steinberger, Xiaoming Sun, Zhe Yang Stam's Conjecture and Threshold Phenomena in Collision Resistance. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Ran Canetti (eds.) Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk On the Security of TLS-DHE in the Standard Model. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Brent Waters Functional Encryption for Regular Languages. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ernie Brickell Recent Advances and Existing Research Questions in Platform Security. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Feng-Hao Liu, Anna Lysyanskaya Tamper and Leakage Resilience in the Split-State Model. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jonathan Zittrain The End of Crypto. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mark Zhandry Secure Identity-Based Encryption in the Quantum Random Oracle Model. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mike Rosulek Must You Know the Code of f to Securely Compute f? Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Oriol Farràs, Yuval Mintz Secret Sharing Schemes for Very Dense Graphs. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guy N. Rothblum How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander On the Distribution of Linear Biases: Three Instructive Examples. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nir Bitansky, Alessandro Chiesa Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eric Miles, Emanuele Viola Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Melissa Chase, Ivan Visconti Secure Database Commitments and Universal Arguments of Quasi Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Stefano Tessaro, Alexander Vardy Semantic Security for the Wiretap Channel. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mike Rosulek Universal Composability from Essentially Any Trusted Setup. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sanjam Garg, Amit Sahai Adaptively Secure Multi-Party Computation with Dishonest Majority. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mario Berta, Omar Fawzi, Stephanie Wehner Quantum to Classical Randomness Extractors. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alexandre Duc, Dimitar Jetchev Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra A New Approach to Practical Active-Secure Two-Party Computation. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass Crowd-Blending Privacy. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Shai Halevi, Nigel P. Smart Homomorphic Evaluation of the AES Circuit. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Amit Sahai, Hakan Seyalioglu, Brent Waters Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias Multiparty Computation from Somewhat Homomorphic Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohammad Mahmoody, Rafael Pass The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Allison B. Lewko, Brent Waters New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Viet Tung Hoang, Ben Morris, Phillip Rogaway An Enciphering Scheme Based on a Card Shuffle. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shweta Agrawal, Vipul Goyal, Abhishek Jain 0002, Manoj Prabhakaran, Amit Sahai New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dana Dachman-Soled, Yael Tauman Kalai Securing Circuits against Constant-Rate Tampering. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu Breaking and Repairing GCM Security Proofs. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis Verifiable Delegation of Computation over Large Datasets. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Adam O'Neill, Chris Peikert, Brent Waters Bi-Deniable Public-Key Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guillaume Hanrot, Xavier Pujol, Damien Stehlé Analyzing Blockwise Lattice Algorithms Using Dynamical Systems. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jian Guo 0001, Thomas Peyrin, Axel Poschmann The PHOTON Family of Lightweight Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sanjam Garg, Abhishek Jain 0002, Amit Sahai Leakage-Resilient Zero Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1María Naya-Plasencia How to Improve Rebound Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nicolas Veyrat-Charvillon, François-Xavier Standaert Generic Side-Channel Distinguishers: Improvements and Limitations. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Yehuda Lindell, Eran Omri, Ilan Orlov 1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser 0001 Physically Uncloneable Functions in the Universal Composition Framework. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Roger Dingledine Tor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk). Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Carolyn Whitnall, Elisabeth Oswald A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paul Baecher, Marc Fischlin Random Oracle Reducibility. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder, Dominique Unruh Round Optimal Blind Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Phillip Rogaway (eds.) Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Jens Groth, Kristiyan Haralambiev, Miyako Ohkubo Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yehuda Lindell, Eli Oxman, Benny Pinkas The IPS Compiler: Optimizations, Variants and Concrete Efficiency. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Vinod Vaikuntanathan Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Charles Bouillaguet, Patrick Derbez, Pierre-Alain Fouque Automatic Search of Attacks on Round-Reduced AES and Applications. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu 0001 Leftover Hash Lemma, Revisited. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefan Dziembowski, Tomasz Kazana, Daniel Wichs Key-Evolution Schemes Resilient to Space-Bounded Leakage. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner Position-Based Quantum Cryptography: Impossibility and Constructions. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, Jürg Wullschleger Constant-Rate Oblivious Transfer from Noisy Channels. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammad Mahmoody, Tal Moran, Salil P. Vadhan Time-Lock Puzzles in the Random Oracle Model. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Sriram Keelveedhi Authenticated and Misuse-Resistant Encryption of Key-Dependent Data. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ignacio Cascudo Pueyo, Ronald Cramer, Chaoping Xing The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz Memory Delegation. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Tal Rabin Perfectly-Secure Multiplication for Any t < n/3. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sean Hallgren, Adam D. Smith, Fang Song 0001 Classical Cryptographic Protocols in a Quantum World. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters Smaller Decoding Exponents: Ball-Collision Decoding. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gilles Brassard, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante, Louis Salvail Merkle Puzzles in a Quantum World. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Nathan Chenette, Adam O'Neill Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daniele Micciancio, Petros Mol Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shai Halevi, Yehuda Lindell, Benny Pinkas Secure Computation on the Web: Computing without Simultaneous Interaction. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zvika Brakerski, Gil Segev Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos Optimal Verification of Operations on Dynamic Sets. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, Santiago Zanella Béguelin Computer-Aided Security Proofs for the Working Cryptographer. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Timothy J. Hodges Inverting HFE Systems Is Quasi-Polynomial for All Fields. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi Fully Homomorphic Encryption over the Integers with Shorter Public Keys. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kan Yasuda A New Variant of PMAC: Beyond the Birthday Bound. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yael Tauman Kalai, Bhavana Kanukurthi, Amit Sahai Cryptography with Tamperable and Leaky Memory. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jooyoung Lee 0001, Martijn Stam, John P. Steinberger The Collision Security of Tandem-DM in the Ideal Cipher Model. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hang Dinh, Cristopher Moore, Alexander Russell McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shafi Goldwasser, Guy N. Rothblum Securing Computation against Continuous Leakage. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wilko Henecka, Alexander May 0001, Alexander Meurer Correcting Errors in RSA Private Keys. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Eran Omri, Ilan Orlov Protocols for Multiparty Coin Toss with Dishonest Majority. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, David Cash Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1266 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license