default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2009
- Nuttapong Attrapadung, Hideki Imai:
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. IMACC 2009: 278-300 - Koichi Betsumiya, Rowena Alma L. Betty, Akihiro Munemasa:
Mass Formula for Even Codes over. IMACC 2009: 65-77 - Julia Borghoff, Lars R. Knudsen, Mathias Stolpe:
Bivium as a Mixed-Integer Linear Programming Problem. IMACC 2009: 133-152 - Delphine Boucher, Felix Ulmer:
Codes as Modules over Skew Polynomial Rings. IMACC 2009: 38-55 - Julien Cathalo, David Naccache, Jean-Jacques Quisquater:
Comparing with RSA. IMACC 2009: 326-335 - Sanjit Chatterjee, Koray Karabina, Alfred Menezes:
A New Protocol for the Nearby Friend Problem. IMACC 2009: 236-251 - Hao Chen, San Ling, Carles Padró, Huaxiong Wang, Chaoping Xing:
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes. IMACC 2009: 263-277 - Léonard Dallot, Damien Vergnaud:
Provably Secure Code-Based Threshold Ring Signatures. IMACC 2009: 222-235 - Lars Eirik Danielsen, Matthew Geoffrey Parker, Patrick Solé:
The Rayleigh Quotient of Bent Functions. IMACC 2009: 418-432 - Yves Edel, Alexander Pott:
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions. IMACC 2009: 383-401 - Stefania Fanali:
On Linear Codes from Maximal Curves. IMACC 2009: 91-111 - Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Security of Cyclic Double Block Length Hash Functions. IMACC 2009: 153-175 - Steven D. Galbraith, Raminder S. Ruprai:
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems. IMACC 2009: 368-382 - Martin Geisler, Nigel P. Smart:
Distributing the Key Distribution Centre in Sakai-Kasahara Based Systems. IMACC 2009: 252-262 - Benoît Gérard, Jean-Pierre Tillich:
On Linear Cryptanalysis with Many Linear Approximations. IMACC 2009: 112-132 - Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi:
Practical Zero-Knowledge Proofs for Circuit Evaluation. IMACC 2009: 469-494 - Masaaki Harada, Akihiro Munemasa:
On the Classification of Self-dual -Codes. IMACC 2009: 78-90 - Antoine Joux, Reynald Lercier, David Naccache, Emmanuel Thomé:
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. IMACC 2009: 351-367 - Koray Karabina:
Double-Exponentiation in Factor-4 Groups and Its Applications. IMACC 2009: 336-350 - Dalia Khader, Liqun Chen, James H. Davenport:
Certificate-Free Attribute Authentication. IMACC 2009: 301-325 - Azadeh Khaleghi, Danilo Silva, Frank R. Kschischang:
Subspace Codes. IMACC 2009: 1-21 - Gregor Leander, Erik Zenner, Philip Hawkes:
Cache Timing Analysis of LFSR-Based Stream Ciphers. IMACC 2009: 433-445 - Sihem Mesnager:
A New Family of Hyper-Bent Boolean Functions in Polynomial Form. IMACC 2009: 402-417 - Sean Murphy, Maura B. Paterson:
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic. IMACC 2009: 202-221 - Onur Özen, Martijn Stam:
Another Glance at Double-Length Hashing. IMACC 2009: 176-201 - Eirik Rosnes:
On Linear Programming Decoding on a Quantized Additive White Gaussian Noise Channel. IMACC 2009: 22-37 - Hans Georg Schaathun:
On Higher Weights and Code Existence. IMACC 2009: 56-64 - Werner Schindler, Colin D. Walter:
Optimal Recovery of Secret Keys from Weak Side Channel Traces. IMACC 2009: 446-468 - Matthew Geoffrey Parker:
Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings. Lecture Notes in Computer Science 5921, Springer 2009, ISBN 978-3-642-10867-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-08 17:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint