Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Menezes, Alfred")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 57

  • Page / 3
Export

Selection :

  • and

Topics in cryptology - CT-RSA 2005 (San Francisco CA, 14-18 February 2005)Menezes, Alfred.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-24399-2, X, 383 p, isbn 3-540-24399-2Conference Proceedings

On tolerant cryptographic constructionsHERZBERG, Amir.Lecture notes in computer science. 2005, pp 172-190, issn 0302-9743, isbn 3-540-24399-2, 19 p.Conference Paper

Accumulators from bilinear pairings and applicationsNGUYEN, Lan.Lecture notes in computer science. 2005, pp 275-292, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Sub-linear queries statistical databases: Privacy with powerDWORK, Cynthia.Lecture notes in computer science. 2005, pp 1-6, issn 0302-9743, isbn 3-540-24399-2, 6 p.Conference Paper

Progress in cryptology : INDOCRYPT 2002 (Hyderabad, 16-18 December 2002)Menezes, Alfred; Palash Sarkar.Lecture notes in computer science. 2002, issn 0302-9743, isbn 3-540-00263-4, XI, 435 p, isbn 3-540-00263-4Conference Proceedings

Malicious cryptography: Kleptographic aspectsYOUNG, Adam; YUNG, Moti.Lecture notes in computer science. 2005, pp 7-18, issn 0302-9743, isbn 3-540-24399-2, 12 p.Conference Paper

Design and analysis of password-based key derivation functionsYAO, Frances F; YIQUN LISA YIN.Lecture notes in computer science. 2005, pp 245-261, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

Fast and proven secure blind identity-based signcryption from pairingsTSZ HON YUEN; WEI, Victor K.Lecture notes in computer science. 2005, pp 305-322, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Proofs for two-server password authenticationSZYDLO, Michael; KALISKI, Burton.Lecture notes in computer science. 2005, pp 227-244, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Never trust Victor: An alternative resettable zero-knowledge proof systemMÜLLER, Olaf; NÜSKEN, Michael.Lecture notes in computer science. 2002, pp 79-92, issn 0302-9743, isbn 3-540-00263-4, 14 p.Conference Paper

Self-certified signaturesLEE, Byoungcheon; KIM, Kwangjo.Lecture notes in computer science. 2002, pp 199-214, issn 0302-9743, isbn 3-540-00263-4, 16 p.Conference Paper

The security of a mix-center based on a semantically secure cryptosystemWIKSTRÖM, Douglas.Lecture notes in computer science. 2002, pp 368-381, issn 0302-9743, isbn 3-540-00263-4, 14 p.Conference Paper

A study of the security of Unbalanced Oil and Vinegar signature schemesBRAEKEN, An; WOLF, Christopher; PRENEEL, Bart et al.Lecture notes in computer science. 2005, pp 29-43, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper

Improved efficiency for CCA-secure cryptosystems built using identity-based encryptionBONEH, Dan; KATZ, Jonathan.Lecture notes in computer science. 2005, pp 87-103, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

New minimal weight representations for left-to-right window methodsMUIR, James A; STINSON, Douglas R.Lecture notes in computer science. 2005, pp 366-383, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

A certified E-mail system with receiver's selective usage of Delivery AuthorityIMAMOTO, Kenji; SAKURAI, Kouichi.Lecture notes in computer science. 2002, pp 326-338, issn 0302-9743, isbn 3-540-00263-4, 13 p.Conference Paper

Further results related to generalized nonlinearityGANGOPADHYAY, Sugata; MAITRA, Subhamoy.Lecture notes in computer science. 2002, pp 260-274, issn 0302-9743, isbn 3-540-00263-4, 15 p.Conference Paper

Resistance of SNOW 2.0 against algebraic attacksBILLET, Olivier; GILBERT, Henri.Lecture notes in computer science. 2005, pp 19-28, issn 0302-9743, isbn 3-540-24399-2, 10 p.Conference Paper

Update on SHA-1RJJMEN, Vincent; OSWALD, Elisabeth.Lecture notes in computer science. 2005, pp 58-71, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Construction of cryptographically important Boolean functionsMAITY, Soumen; JOHANSSON, Thomas.Lecture notes in computer science. 2002, pp 234-245, issn 0302-9743, isbn 3-540-00263-4, 12 p.Conference Paper

A note on the malleability of the El Gamal cryptosystemWIKSTRÖM, Douglas.Lecture notes in computer science. 2002, pp 176-184, issn 0302-9743, isbn 3-540-00263-4, 9 p.Conference Paper

Towards logically and physically secure public-key infrastructuresVISWANATHAN, Kapali; SAXENA, Ashutosh.Lecture notes in computer science. 2002, pp 122-134, issn 0302-9743, isbn 3-540-00263-4, 13 p.Conference Paper

Foundations of group signatures: The case of dynamic groupsBELLARE, Mihir; HAIXIA SHI; CHONG ZHANG et al.Lecture notes in computer science. 2005, pp 136-153, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

A generic conversion with Optimal RedundancyCUI, Yang; KOBARA, Kazukuni; IMAI, Hideki et al.Lecture notes in computer science. 2005, pp 104-117, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Hold your sessions: An attack on Java session-id generationGUTTERMAN, Zvi; MALKHI, Dahlia.Lecture notes in computer science. 2005, pp 44-57, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

  • Page / 3