au.\*:("Menezes, Alfred")
Results 1 to 25 of 57
Selection :
Topics in cryptology - CT-RSA 2005 (San Francisco CA, 14-18 February 2005)Menezes, Alfred.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-24399-2, X, 383 p, isbn 3-540-24399-2Conference Proceedings
On tolerant cryptographic constructionsHERZBERG, Amir.Lecture notes in computer science. 2005, pp 172-190, issn 0302-9743, isbn 3-540-24399-2, 19 p.Conference Paper
Accumulators from bilinear pairings and applicationsNGUYEN, Lan.Lecture notes in computer science. 2005, pp 275-292, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper
Sub-linear queries statistical databases: Privacy with powerDWORK, Cynthia.Lecture notes in computer science. 2005, pp 1-6, issn 0302-9743, isbn 3-540-24399-2, 6 p.Conference Paper
Progress in cryptology : INDOCRYPT 2002 (Hyderabad, 16-18 December 2002)Menezes, Alfred; Palash Sarkar.Lecture notes in computer science. 2002, issn 0302-9743, isbn 3-540-00263-4, XI, 435 p, isbn 3-540-00263-4Conference Proceedings
Malicious cryptography: Kleptographic aspectsYOUNG, Adam; YUNG, Moti.Lecture notes in computer science. 2005, pp 7-18, issn 0302-9743, isbn 3-540-24399-2, 12 p.Conference Paper
Design and analysis of password-based key derivation functionsYAO, Frances F; YIQUN LISA YIN.Lecture notes in computer science. 2005, pp 245-261, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper
Fast and proven secure blind identity-based signcryption from pairingsTSZ HON YUEN; WEI, Victor K.Lecture notes in computer science. 2005, pp 305-322, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper
Proofs for two-server password authenticationSZYDLO, Michael; KALISKI, Burton.Lecture notes in computer science. 2005, pp 227-244, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper
Never trust Victor: An alternative resettable zero-knowledge proof systemMÜLLER, Olaf; NÜSKEN, Michael.Lecture notes in computer science. 2002, pp 79-92, issn 0302-9743, isbn 3-540-00263-4, 14 p.Conference Paper
Self-certified signaturesLEE, Byoungcheon; KIM, Kwangjo.Lecture notes in computer science. 2002, pp 199-214, issn 0302-9743, isbn 3-540-00263-4, 16 p.Conference Paper
The security of a mix-center based on a semantically secure cryptosystemWIKSTRÖM, Douglas.Lecture notes in computer science. 2002, pp 368-381, issn 0302-9743, isbn 3-540-00263-4, 14 p.Conference Paper
A study of the security of Unbalanced Oil and Vinegar signature schemesBRAEKEN, An; WOLF, Christopher; PRENEEL, Bart et al.Lecture notes in computer science. 2005, pp 29-43, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper
Improved efficiency for CCA-secure cryptosystems built using identity-based encryptionBONEH, Dan; KATZ, Jonathan.Lecture notes in computer science. 2005, pp 87-103, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper
New minimal weight representations for left-to-right window methodsMUIR, James A; STINSON, Douglas R.Lecture notes in computer science. 2005, pp 366-383, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper
A certified E-mail system with receiver's selective usage of Delivery AuthorityIMAMOTO, Kenji; SAKURAI, Kouichi.Lecture notes in computer science. 2002, pp 326-338, issn 0302-9743, isbn 3-540-00263-4, 13 p.Conference Paper
Further results related to generalized nonlinearityGANGOPADHYAY, Sugata; MAITRA, Subhamoy.Lecture notes in computer science. 2002, pp 260-274, issn 0302-9743, isbn 3-540-00263-4, 15 p.Conference Paper
Resistance of SNOW 2.0 against algebraic attacksBILLET, Olivier; GILBERT, Henri.Lecture notes in computer science. 2005, pp 19-28, issn 0302-9743, isbn 3-540-24399-2, 10 p.Conference Paper
Update on SHA-1RJJMEN, Vincent; OSWALD, Elisabeth.Lecture notes in computer science. 2005, pp 58-71, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper
Construction of cryptographically important Boolean functionsMAITY, Soumen; JOHANSSON, Thomas.Lecture notes in computer science. 2002, pp 234-245, issn 0302-9743, isbn 3-540-00263-4, 12 p.Conference Paper
A note on the malleability of the El Gamal cryptosystemWIKSTRÖM, Douglas.Lecture notes in computer science. 2002, pp 176-184, issn 0302-9743, isbn 3-540-00263-4, 9 p.Conference Paper
Towards logically and physically secure public-key infrastructuresVISWANATHAN, Kapali; SAXENA, Ashutosh.Lecture notes in computer science. 2002, pp 122-134, issn 0302-9743, isbn 3-540-00263-4, 13 p.Conference Paper
Foundations of group signatures: The case of dynamic groupsBELLARE, Mihir; HAIXIA SHI; CHONG ZHANG et al.Lecture notes in computer science. 2005, pp 136-153, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper
A generic conversion with Optimal RedundancyCUI, Yang; KOBARA, Kazukuni; IMAI, Hideki et al.Lecture notes in computer science. 2005, pp 104-117, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper
Hold your sessions: An attack on Java session-id generationGUTTERMAN, Zvi; MALKHI, Dahlia.Lecture notes in computer science. 2005, pp 44-57, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper