Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ti.\*:("Topics in cryptology - CT-RSA 2005 (San Francisco CA, 14-18 February 2005)")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 26

  • Page / 2

Export

Selection :

  • and

Malicious cryptography: Kleptographic aspectsYOUNG, Adam; YUNG, Moti.Lecture notes in computer science. 2005, pp 7-18, issn 0302-9743, isbn 3-540-24399-2, 12 p.Conference Paper

Accumulators from bilinear pairings and applicationsNGUYEN, Lan.Lecture notes in computer science. 2005, pp 275-292, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Computing the tate pairingSCOTT, Michael.Lecture notes in computer science. 2005, pp 293-304, issn 0302-9743, isbn 3-540-24399-2, 12 p.Conference Paper

Topics in cryptology - CT-RSA 2005 (San Francisco CA, 14-18 February 2005)Menezes, Alfred.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-24399-2, X, 383 p, isbn 3-540-24399-2Conference Proceedings

On tolerant cryptographic constructionsHERZBERG, Amir.Lecture notes in computer science. 2005, pp 172-190, issn 0302-9743, isbn 3-540-24399-2, 19 p.Conference Paper

Update on SHA-1RJJMEN, Vincent; OSWALD, Elisabeth.Lecture notes in computer science. 2005, pp 58-71, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Design and analysis of password-based key derivation functionsYAO, Frances F; YIQUN LISA YIN.Lecture notes in computer science. 2005, pp 245-261, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

Fast and proven secure blind identity-based signcryption from pairingsTSZ HON YUEN; WEI, Victor K.Lecture notes in computer science. 2005, pp 305-322, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Proofs for two-server password authenticationSZYDLO, Michael; KALISKI, Burton.Lecture notes in computer science. 2005, pp 227-244, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Simple password-based encrypted key exchange protocolsABDALLA, Michel; POINTCHEVAL, David.Lecture notes in computer science. 2005, pp 191-208, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Foundations of group signatures: The case of dynamic groupsBELLARE, Mihir; HAIXIA SHI; CHONG ZHANG et al.Lecture notes in computer science. 2005, pp 136-153, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

A fast correlation attack on the shrinking generatorBIN ZHANG; HONGJUN WU; DENGGUO FENG et al.Lecture notes in computer science. 2005, pp 72-86, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper

A generic conversion with Optimal RedundancyCUI, Yang; KOBARA, Kazukuni; IMAI, Hideki et al.Lecture notes in computer science. 2005, pp 104-117, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Sub-linear queries statistical databases: Privacy with powerDWORK, Cynthia.Lecture notes in computer science. 2005, pp 1-6, issn 0302-9743, isbn 3-540-24399-2, 6 p.Conference Paper

A study of the security of Unbalanced Oil and Vinegar signature schemesBRAEKEN, An; WOLF, Christopher; PRENEEL, Bart et al.Lecture notes in computer science. 2005, pp 29-43, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper

Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3HOWGRAVE-GRAHAM, Nick; SILVERMAN, Joseph H; WHYTE, William et al.Lecture notes in computer science. 2005, pp 118-135, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

New minimal weight representations for left-to-right window methodsMUIR, James A; STINSON, Douglas R.Lecture notes in computer science. 2005, pp 366-383, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Hard bits of the discrete log with applications to password authenticationMACKENZIE, Philip; PATEL, Sarvar.Lecture notes in computer science. 2005, pp 209-226, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Side-channel leakage of masked CMOS gatesMANGARD, Stefan; POPP, Thomas; GAMMEL, Berndt M et al.Lecture notes in computer science. 2005, pp 351-365, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper

Time-selective convertible undeniable signaturesLAGUILLAUMIE, Fabien; VERGNAUD, Damien.Lecture notes in computer science. 2005, pp 154-171, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

CryptoGraphics: Secret key cryptography using graphics cardsCOOK, Debra L; IOANNIDIS, John; KEROMYTIS, Angelos D et al.Lecture notes in computer science. 2005, pp 334-350, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

Resistance of SNOW 2.0 against algebraic attacksBILLET, Olivier; GILBERT, Henri.Lecture notes in computer science. 2005, pp 19-28, issn 0302-9743, isbn 3-540-24399-2, 10 p.Conference Paper

Hold your sessions: An attack on Java session-id generationGUTTERMAN, Zvi; MALKHI, Dahlia.Lecture notes in computer science. 2005, pp 44-57, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

A new two-party identity-based authenticated key agreementMCCULLAGH, Noel; BARRETO, Paulo S. L. M.Lecture notes in computer science. 2005, pp 262-274, issn 0302-9743, isbn 3-540-24399-2, 13 p.Conference Paper

Improved efficiency for CCA-secure cryptosystems built using identity-based encryptionBONEH, Dan; KATZ, Jonathan.Lecture notes in computer science. 2005, pp 87-103, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

  • Page / 2