Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2016
- Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Deterministic Encoding into Twisted Edwards Curves. ACISP (2) 2016: 285-297 - Nasour Bagheri, Florian Mendel, Yu Sasaki:
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. ACISP (2) 2016: 301-316 - Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Attack on Three Variants of the RSA Cryptosystem. ACISP (2) 2016: 258-268 - Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione:
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures. ACISP (2) 2016: 37-54 - Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. ACISP (2) 2016: 3-20 - Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. ACISP (2) 2016: 333-346 - Yao Cheng, Yingjiu Li, Robert H. Deng:
A Feasible No-Root Approach on Android. ACISP (2) 2016: 481-489 - Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme. ACISP (2) 2016: 427-434 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch. ACISP (2) 2016: 317-332 - Timothy Glennan, Christopher Leckie, Sarah M. Erfani:
Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning. ACISP (2) 2016: 493-501 - Kai He, Jian Weng, Man Ho Au, Yijun Mao, Robert H. Deng:
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. ACISP (2) 2016: 207-222 - Keting Jia, Ning Wang:
Impossible Differential Cryptanalysis of 14-Round Camellia-192. ACISP (2) 2016: 363-378 - Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Public Key Encryption with Authorized Keyword Search. ACISP (2) 2016: 170-186 - Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats. ACISP (2) 2016: 467-477 - Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. ACISP (2) 2016: 223-239 - Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe Lin Jiang, Jin Li:
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage. ACISP (2) 2016: 153-169 - Xiaodong Lin, Rongxing Lu:
Proxy Re-encryption with Delegatable Verifiability. ACISP (2) 2016: 120-133 - Jiqiang Lu:
On the Security of the LAC Authenticated Encryption Algorithm. ACISP (2) 2016: 395-408 - Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu:
Identity-Based Group Encryption. ACISP (2) 2016: 87-102 - Kazuhiko Minematsu:
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO). ACISP (2) 2016: 347-362 - Shiran Pan, Shen Yan, Wen Tao Zhu:
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes. ACISP (2) 2016: 446-453 - Ying-Han Pang, Khor Ean Yee, Shih Yin Ooi:
Biometric Access Control with High Dimensional Facial Features. ACISP (2) 2016: 437-445 - Jhordany Rodriguez Parra, Terence Chan, Siu-Wai Ho:
A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems. ACISP (2) 2016: 505-513 - Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang:
Edit Distance Based Encryption and Its Application. ACISP (2) 2016: 103-119 - Lingyue Qin, Huaifeng Chen, Xiaoyun Wang:
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques. ACISP (2) 2016: 409-424 - Ling Song, Zhangjie Huang, Qianqian Yang:
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA. ACISP (2) 2016: 379-394 - Shifeng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, Dawu Gu:
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions. ACISP (2) 2016: 134-150 - Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs. ACISP (2) 2016: 243-257 - Xiaofen Wang, Yi Mu:
Content-Based Encryption. ACISP (2) 2016: 57-72 - Zhe Xia, Xiaoyun Yang, Min Xiao, Debiao He:
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry. ACISP (2) 2016: 73-86
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-01 06:35 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint