History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 113 total

Related randomness attacks for public key encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014).
WorldCat.org
1
Related-key security for pseudorandom functions beyond the linear barrier. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 77-94 (2014).
WorldCat.org
2
Security of symmetric encryption against mass surveillance. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 1-19 (2014).
WorldCat.org
3
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). (English)
ASIACRYPT (1), 398-419(2014)
WorldCat.org
4
Security of Symmetric Encryption against Mass Surveillance. (English)
CRYPTO (1), 1-19(2014)
WorldCat.org
5
Development of an active powered biped lower limb exoskeleton. (English)
CASE, 990-995(2014)
WorldCat.org
6
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. (English)
CRYPTO (1), 77-94(2014)
WorldCat.org
7
Signal-flow-based analysis of wireless security protocols. (English)
Inf. Comput. 226, 37-56 (2013).
WorldCat.org
8
Programmable hash functions in the multilinear setting. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 513-530 (2013).
WorldCat.org
9
On the security of the TLS protocol: a systematic analysis. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 429-448 (2013).
WorldCat.org
10
Robust encryption, revisited. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 352-368 (2013).
WorldCat.org
11
Non-interactive key exchange. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 254-271 (2013).
WorldCat.org
12
Simple, efficient and strongly KI-secure hierarchical key assignment schemes. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 101-114 (2013).
WorldCat.org
13
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
14
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. (English)
ESORICS, 381-399(2013)
WorldCat.org
15
On Symmetric Encryption with Distinguishable Decryption Failures. (English)
FSE, 367-390(2013)
WorldCat.org
17
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. (English)
IEEE Symposium on Security and Privacy, 526-540(2013)
WorldCat.org
18
A coding-theoretic approach to recovering noisy RSA keys. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 386-403 (2012).
WorldCat.org
19
RKA security beyond the linear barrier: IBE, encryption and signatures. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 331-348 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 113 total

Valid XHTML 1.0 Transitional Valid CSS!