![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2011
- Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission in Asynchronous Directed Graphs. INDOCRYPT 2011: 359-378 - Martin Ågren, Thomas Johansson:
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. INDOCRYPT 2011: 114-133 - Ross J. Anderson:
Cryptology: Where Is the New Frontier? INDOCRYPT 2011: 160 - Jean-Philippe Aumasson, María Naya-Plasencia, Markku-Juhani O. Saarinen
:
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN. INDOCRYPT 2011: 134-145 - Subhadeep Banik
, Subhamoy Maitra, Santanu Sarkar
:
On the Evolution of GGHN Cipher. INDOCRYPT 2011: 181-195 - Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil:
Square Always Exponentiation. INDOCRYPT 2011: 40-57 - Craig Costello
, Kristin E. Lauter, Michael Naehrig:
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. INDOCRYPT 2011: 320-342 - Roy D'Souza, David Jao
, Ilya Mironov
, Omkant Pandey:
Publicly Verifiable Secret Sharing for Cloud-Based Key Management. INDOCRYPT 2011: 290-309 - Roger Dingledine:
Tor and the Censorship Arms Race: Lessons Learned. INDOCRYPT 2011: 1 - Robert Drylo:
On Constructing Families of Pairing-Friendly Elliptic Curves with Variable Discriminant. INDOCRYPT 2011: 310-319 - Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel:
Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule. INDOCRYPT 2011: 94-113 - Shay Gueron
:
Software Optimizations for Cryptographic Primitives on General Purpose x86_64 Platforms. INDOCRYPT 2011: 399-400 - Sourav Sen Gupta
, Anupam Chattopadhyay, Ayesha Khalid:
HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers. INDOCRYPT 2011: 196-215 - Mohammad Hassan Habibi, Mohammad Reza Aref, Di Ma
:
Addressing Flaws in RFID Authentication Protocols. INDOCRYPT 2011: 216-235 - Jin Hong
, Ga Won Lee, Daegun Ma:
Analysis of the Parallel Distinguished Point Tradeoff. INDOCRYPT 2011: 161-180 - Jens-Peter Kaps, Panasayya Yalla, Kishore Kumar Surapathi, Bilal Habib, Susheel Vadlamudi, Smriti Gurung, John Pham:
Lightweight Implementations of SHA-3 Candidates on FPGAs. INDOCRYPT 2011: 270-289 - Lakshmi Kuppusamy
, Jothi Rangasamy
, Douglas Stebila
, Colin Boyd, Juanma González Nieto:
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. INDOCRYPT 2011: 379-398 - Tanja Lange:
Elliptic Curves for Applications. INDOCRYPT 2011: 2 - Hemanta K. Maji, Manoj Prabhakaran:
The Limits of Common Coins: Further Results. INDOCRYPT 2011: 344-358 - Florian Mendel
, Tomislav Nad:
Boomerang Distinguisher for the SIMD-512 Compression Function. INDOCRYPT 2011: 255-269 - Maxime Nassar, Sylvain Guilley, Jean-Luc Danger:
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. INDOCRYPT 2011: 22-39 - María Naya-Plasencia, Andrea Röck, Willi Meier:
Practical Analysis of Reduced-Round Keccak. INDOCRYPT 2011: 236-254 - Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang:
On Related-Key Attacks and KASUMI: The Case of A5/3. INDOCRYPT 2011: 146-159 - Christof Paar:
The Yin and Yang Sides of Embedded Security. INDOCRYPT 2011: 93 - Chester Rebeiro
, Rishabh Poddar, Amit Datta, Debdeep Mukhopadhyay:
An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines. INDOCRYPT 2011: 58-75 - Eric Rescorla:
Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography? INDOCRYPT 2011: 343 - Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. INDOCRYPT 2011: 3-21 - Santanu Sarkar
:
Partial Key Exposure: Generalized Framework to Attack RSA. INDOCRYPT 2011: 76-92 - Daniel J. Bernstein, Sanjit Chatterjee:
Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings. Lecture Notes in Computer Science 7107, Springer 2011, ISBN 978-3-642-25577-9 [contents]
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-05 20:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint