Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ima/ima2005.bht:"
@inproceedings{DBLP:conf/ima/BarbosaF05, author = {Manuel Barbosa and Pooya Farshim}, editor = {Nigel P. Smart}, title = {Efficient Identity-Based Key Encapsulation to Multiple Parties}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {428--441}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_28}, doi = {10.1007/11586821\_28}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/BarbosaF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BarbosaP05, author = {Manuel Barbosa and Dan Page}, editor = {Nigel P. Smart}, title = {On the Automatic Construction of Indistinguishable Operations}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {233--247}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_16}, doi = {10.1007/11586821\_16}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BarbosaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Bentahar05, author = {Kamel Bentahar}, editor = {Nigel P. Smart}, title = {The Equivalence Between the {DHP} and {DLP} for Elliptic Curves Used in Practical Applications, Revisited}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {376--391}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_25}, doi = {10.1007/11586821\_25}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Bentahar05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BraekenP05, author = {An Braeken and Bart Preneel}, editor = {Nigel P. Smart}, title = {Probabilistic Algebraic Attacks}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {290--303}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_20}, doi = {10.1007/11586821\_20}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BraekenP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BraekenWP05, author = {An Braeken and Christopher Wolf and Bart Preneel}, editor = {Nigel P. Smart}, title = {Normality of Vectorial Functions}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {186--200}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_13}, doi = {10.1007/11586821\_13}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BraekenWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BrownMS05, author = {Andrew Brown and Lorenz Minder and Amin Shokrollahi}, editor = {Nigel P. Smart}, title = {Improved Decoding of Interleaved {AG} Codes}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {37--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_3}, doi = {10.1007/11586821\_3}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BrownMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CaiC05, author = {Canhui Cai and Jing Chen}, editor = {Nigel P. Smart}, title = {Tessellation Based Multiple Description Coding}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {68--77}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_6}, doi = {10.1007/11586821\_6}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/CaiC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/ChenC05, author = {Liqun Chen and Zhaohui Cheng}, editor = {Nigel P. Smart}, title = {Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {442--459}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_29}, doi = {10.1007/11586821\_29}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/ChenC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CidMR05, author = {Carlos Cid and Sean Murphy and Matthew J. B. Robshaw}, editor = {Nigel P. Smart}, title = {An Algebraic Framework for Cipher Embeddings}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {278--289}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_19}, doi = {10.1007/11586821\_19}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/CidMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/DentM05, author = {Alexander W. Dent and John Malone{-}Lee}, editor = {Nigel P. Smart}, title = {The Physically Observable Security of Signature Schemes}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {220--232}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_15}, doi = {10.1007/11586821\_15}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/DentM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/DingGSWY05, author = {Jintai Ding and Jason E. Gower and Dieter Schmidt and Christopher Wolf and Zhijun Yin}, editor = {Nigel P. Smart}, title = {Complexity Estimates for the F\({}_{\mbox{4}}\) Attack on the Perturbed Matsumoto-Imai Cryptosystem}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {262--277}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_18}, doi = {10.1007/11586821\_18}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/DingGSWY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/DodsSS05, author = {C. Dods and Nigel P. Smart and Martijn Stam}, editor = {Nigel P. Smart}, title = {Hash Based Digital Signature Schemes}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {96--115}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_8}, doi = {10.1007/11586821\_8}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/DodsSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GalbraithM05, author = {Steven D. Galbraith and James F. McKee}, editor = {Nigel P. Smart}, title = {Pairings on Elliptic Curves over Finite Commutative Rings}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {392--409}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_26}, doi = {10.1007/11586821\_26}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/GalbraithM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Hedabou05, author = {Mustapha Hedabou}, editor = {Nigel P. Smart}, title = {Efficient Countermeasures for Thwarting the {SCA} Attacks on the Frobenius Based Methods}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {248--261}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_17}, doi = {10.1007/11586821\_17}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Hedabou05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Jakimoski05, author = {Goce Jakimoski}, editor = {Nigel P. Smart}, title = {Unconditionally Secure Information Authentication in Presence of Erasures}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {304--321}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_21}, doi = {10.1007/11586821\_21}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Jakimoski05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KimKJ05, author = {Woo Tae Kim and Se H. Kang and Eon Kyeong Joo}, editor = {Nigel P. Smart}, title = {Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {47--58}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_4}, doi = {10.1007/11586821\_4}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/KimKJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KoblitzM05, author = {Neal Koblitz and Alfred Menezes}, editor = {Nigel P. Smart}, title = {Pairing-Based Cryptography at High Security Levels}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {13--36}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_2}, doi = {10.1007/11586821\_2}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/KoblitzM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KonigM05, author = {Robert K{\"{o}}nig and Ueli M. Maurer}, editor = {Nigel P. Smart}, title = {Generalized Strong Extractors and Deterministic Privacy Amplification}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {322--339}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_22}, doi = {10.1007/11586821\_22}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/KonigM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/KudlaP05, author = {Caroline Kudla and Kenneth G. Paterson}, editor = {Nigel P. Smart}, title = {Non-interactive Designated Verifier Proofs and Undeniable Signatures}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {136--154}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_10}, doi = {10.1007/11586821\_10}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/KudlaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/LeeKSHLM05, author = {Changhoon Lee and Jongsung Kim and Jaechul Sung and Seokhie Hong and Sangjin Lee and Dukjae Moon}, editor = {Nigel P. Smart}, title = {Related-Key Differential Attacks on Cobra-H64 and Cobra-H128}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {201--219}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_14}, doi = {10.1007/11586821\_14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/LeeKSHLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Malone-Lee05, author = {John Malone{-}Lee}, editor = {Nigel P. Smart}, title = {A General Construction for Simultaneous Signing and Encrypting}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {116--135}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_9}, doi = {10.1007/11586821\_9}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Malone-Lee05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Maurer05, author = {Ueli M. Maurer}, editor = {Nigel P. Smart}, title = {Abstract Models of Computation in Cryptography}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {1--12}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_1}, doi = {10.1007/11586821\_1}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Maurer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/MaurerS05, author = {Ueli M. Maurer and Johan Sj{\"{o}}din}, editor = {Nigel P. Smart}, title = {Domain Expansion of MACs: Alternative Uses of the {FIL-MAC}}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {168--185}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_12}, doi = {10.1007/11586821\_12}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/MaurerS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Mitchell05, author = {Chris J. Mitchell}, editor = {Nigel P. Smart}, title = {Partial Key Recovery Attacks on XCBC, {TMAC} and {OMAC}}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {155--167}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_11}, doi = {10.1007/11586821\_11}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Mitchell05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/PramstallerRR05, author = {Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Nigel P. Smart}, title = {Exploiting Coding Theory for Collision Attacks on {SHA-1}}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {78--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_7}, doi = {10.1007/11586821\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/PramstallerRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Saez05, author = {Germ{\'{a}}n S{\'{a}}ez}, editor = {Nigel P. Smart}, title = {On Threshold Self-healing Key Distribution Schemes}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {340--354}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_23}, doi = {10.1007/11586821\_23}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Saez05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SchaathunC05, author = {Hans Georg Schaathun and G{\'{e}}rard D. Cohen}, editor = {Nigel P. Smart}, title = {A Trellis-Based Bound on (2, 1)-Separating Codes}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {59--67}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_5}, doi = {10.1007/11586821\_5}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/SchaathunC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SidorenkoS05, author = {Andrey Sidorenko and Berry Schoenmakers}, editor = {Nigel P. Smart}, title = {Concrete Security of the Blum-Blum-Shub Pseudorandom Generator}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {355--375}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_24}, doi = {10.1007/11586821\_24}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/SidorenkoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Stam05, author = {Martijn Stam}, editor = {Nigel P. Smart}, title = {A Key Encapsulation Mechanism for {NTRU}}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {410--427}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_27}, doi = {10.1007/11586821\_27}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/Stam05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ima/2005, editor = {Nigel P. Smart}, title = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821}, doi = {10.1007/11586821}, isbn = {3-540-30276-X}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.