History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 113 total

A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. (English)
ASIACCS, 475-482(2015)
WorldCat.org
1
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. (English)
Public Key Cryptography, 3-26(2015)
WorldCat.org
2
Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014).
WorldCat.org
3
Related-key security for pseudorandom functions beyond the linear barrier. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 77-94 (2014).
WorldCat.org
4
Security of symmetric encryption against mass surveillance. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 1-19 (2014).
WorldCat.org
5
Related randomness attacks for public key encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014).
WorldCat.org
6
Plaintext Recovery Attacks Against WPA/TKIP. (English)
FSE, 325-349(2014)
WorldCat.org
7
Development of an active powered biped lower limb exoskeleton. (English)
CASE, 990-995(2014)
WorldCat.org
8
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
9
Signal-flow-based analysis of wireless security protocols. (English)
Inf. Comput. 226, 37-56 (2013).
WorldCat.org
10
Programmable hash functions in the multilinear setting. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 513-530 (2013).
WorldCat.org
11
On the security of the TLS protocol: a systematic analysis. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 429-448 (2013).
WorldCat.org
12
Robust encryption, revisited. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 352-368 (2013).
WorldCat.org
13
Non-interactive key exchange. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 254-271 (2013).
WorldCat.org
14
Simple, efficient and strongly KI-secure hierarchical key assignment schemes. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 101-114 (2013).
WorldCat.org
15
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. (English)
IEEE Symposium on Security and Privacy, 526-540(2013)
WorldCat.org
16
On Symmetric Encryption with Distinguishable Decryption Failures. (English)
FSE, 367-390(2013)
WorldCat.org
17
A coding-theoretic approach to recovering noisy RSA keys. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 386-403 (2012).
WorldCat.org
19
RKA security beyond the linear barrier: IBE, encryption and signatures. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 331-348 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 113 total

Valid XHTML 1.0 Transitional Valid CSS!