History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 110 total

Big bias hunting in amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014).
WorldCat.org
1
Related-key security for pseudorandom functions beyond the linear barrier. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 77-94 (2014).
WorldCat.org
2
Security of symmetric encryption against mass surveillance. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 1-19 (2014).
WorldCat.org
3
Related randomness attacks for public key encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014).
WorldCat.org
4
Development of an active powered biped lower limb exoskeleton. (English)
CASE, 990-995(2014)
WorldCat.org
5
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
6
Signal-flow-based analysis of wireless security protocols. (English)
Inf. Comput. 226, 37-56 (2013).
WorldCat.org
7
Programmable hash functions in the multilinear setting. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 513-530 (2013).
WorldCat.org
8
On the security of the TLS protocol: a systematic analysis. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 429-448 (2013).
WorldCat.org
9
Robust encryption, revisited. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 352-368 (2013).
WorldCat.org
10
Non-interactive key exchange. (English)
Kurosawa, Kaoru (ed.) et al., Public-key cryptography ‒ PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 254-271 (2013).
WorldCat.org
11
Simple, efficient and strongly KI-secure hierarchical key assignment schemes. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 101-114 (2013).
WorldCat.org
12
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols. (English)
IEEE Symposium on Security and Privacy, 526-540(2013)
WorldCat.org
13
On Symmetric Encryption with Distinguishable Decryption Failures. (English)
FSE, 367-390(2013)
WorldCat.org
14
A coding-theoretic approach to recovering noisy RSA keys. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 386-403 (2012).
WorldCat.org
16
RKA security beyond the linear barrier: IBE, encryption and signatures. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 331-348 (2012).
WorldCat.org
17
Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model. (English)
Fischlin, Marc (ed.) et al., Public key cryptography ‒ PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21‒23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 206-224 (2012).
WorldCat.org
18
Security of symmetric encryption in the presence of ciphertext fragmentation. (English)
Pointcheval, David (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15‒19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 682-699 (2012).
WorldCat.org
19
On the joint security of encryption and signature in EMV. (English)
Dunkelman, Orr (ed.), Topics in cryptology ‒ CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27‒March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 116-135 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 110 total

Valid XHTML 1.0 Transitional Valid CSS!