Hash to the Rescue: Space Minimization for PKI Directories
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Bandwidth-Optimal Kleptographic Attacks
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Auto-recoverable Auto-certifiable Cryptosystems (A Survey)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Breaking up is hard to do: modeling security threats for smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
An elliptic curve backdoor algorithm for RSASSA
IH'06 Proceedings of the 8th international conference on Information hiding
Auditable privacy: on tamper-evident mix networks
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |