Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ti.\*:(%22Topics in cryptology - CT-RSA 2005 %28San Francisco CA%2C 14-18 February 2005%29%22)

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 238254

  • Page / 9531
Export

Selection :

  • and

Malicious cryptography: Kleptographic aspectsYOUNG, Adam; YUNG, Moti.Lecture notes in computer science. 2005, pp 7-18, issn 0302-9743, isbn 3-540-24399-2, 12 p.Conference Paper

Accumulators from bilinear pairings and applicationsNGUYEN, Lan.Lecture notes in computer science. 2005, pp 275-292, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Topics in cryptology - CT-RSA 2005 (San Francisco CA, 14-18 February 2005)Menezes, Alfred.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-24399-2, X, 383 p, isbn 3-540-24399-2Conference Proceedings

On tolerant cryptographic constructionsHERZBERG, Amir.Lecture notes in computer science. 2005, pp 172-190, issn 0302-9743, isbn 3-540-24399-2, 19 p.Conference Paper

Update on SHA-1RJJMEN, Vincent; OSWALD, Elisabeth.Lecture notes in computer science. 2005, pp 58-71, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Design and analysis of password-based key derivation functionsYAO, Frances F; YIQUN LISA YIN.Lecture notes in computer science. 2005, pp 245-261, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

Fast and proven secure blind identity-based signcryption from pairingsTSZ HON YUEN; WEI, Victor K.Lecture notes in computer science. 2005, pp 305-322, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Proofs for two-server password authenticationSZYDLO, Michael; KALISKI, Burton.Lecture notes in computer science. 2005, pp 227-244, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Foundations of group signatures: The case of dynamic groupsBELLARE, Mihir; HAIXIA SHI; CHONG ZHANG et al.Lecture notes in computer science. 2005, pp 136-153, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

A fast correlation attack on the shrinking generatorBIN ZHANG; HONGJUN WU; DENGGUO FENG et al.Lecture notes in computer science. 2005, pp 72-86, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper

A generic conversion with Optimal RedundancyCUI, Yang; KOBARA, Kazukuni; IMAI, Hideki et al.Lecture notes in computer science. 2005, pp 104-117, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Sub-linear queries statistical databases: Privacy with powerDWORK, Cynthia.Lecture notes in computer science. 2005, pp 1-6, issn 0302-9743, isbn 3-540-24399-2, 6 p.Conference Paper

A study of the security of Unbalanced Oil and Vinegar signature schemesBRAEKEN, An; WOLF, Christopher; PRENEEL, Bart et al.Lecture notes in computer science. 2005, pp 29-43, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper

Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3HOWGRAVE-GRAHAM, Nick; SILVERMAN, Joseph H; WHYTE, William et al.Lecture notes in computer science. 2005, pp 118-135, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

New minimal weight representations for left-to-right window methodsMUIR, James A; STINSON, Douglas R.Lecture notes in computer science. 2005, pp 366-383, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

CryptoGraphics: Secret key cryptography using graphics cardsCOOK, Debra L; IOANNIDIS, John; KEROMYTIS, Angelos D et al.Lecture notes in computer science. 2005, pp 334-350, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

Resistance of SNOW 2.0 against algebraic attacksBILLET, Olivier; GILBERT, Henri.Lecture notes in computer science. 2005, pp 19-28, issn 0302-9743, isbn 3-540-24399-2, 10 p.Conference Paper

Hold your sessions: An attack on Java session-id generationGUTTERMAN, Zvi; MALKHI, Dahlia.Lecture notes in computer science. 2005, pp 44-57, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

A new two-party identity-based authenticated key agreementMCCULLAGH, Noel; BARRETO, Paulo S. L. M.Lecture notes in computer science. 2005, pp 262-274, issn 0302-9743, isbn 3-540-24399-2, 13 p.Conference Paper

Improved efficiency for CCA-secure cryptosystems built using identity-based encryptionBONEH, Dan; KATZ, Jonathan.Lecture notes in computer science. 2005, pp 87-103, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

Ciphers with arbitrary finite domainsBLACK, John; ROGAWAY, Phillip.Lecture notes in computer science. 2002, pp 114-130, issn 0302-9743, isbn 3-540-43224-8Conference Paper

Proprietary certificatesJAKOBSSON, Markus; JUELS, Ari; NGUYEN, Phong Q et al.Lecture notes in computer science. 2002, pp 164-181, issn 0302-9743, isbn 3-540-43224-8Conference Paper

Micropayments revisitedMICALI, Silvio; RIVEST, Ronald L.Lecture notes in computer science. 2002, pp 149-163, issn 0302-9743, isbn 3-540-43224-8Conference Paper

Transitive signature schemesMICALI, Silvio; RIVEST, Ronald L.Lecture notes in computer science. 2002, pp 236-243, issn 0302-9743, isbn 3-540-43224-8Conference Paper

Server assisted signatures revisitedBICAKCI, Kemal; BAYKAL, Nazife.Lecture notes in computer science. 2004, pp 143-156, issn 0302-9743, isbn 3-540-20996-4, 14 p.Conference Paper

  • Page / 9531