![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2014
- Tanja Lange, Kristin E. Lauter, Petr Lisonek:
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8282, Springer 2014, ISBN 978-3-662-43413-0 [contents] - 2013
- Diego F. Aranha
, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini
:
The Realm of the Pairings. Selected Areas in Cryptography 2013: 3-25 - Rachid El Bansarkhani, Johannes Buchmann:
Improvement and Efficient Implementation of a Lattice-Based Signature Scheme. Selected Areas in Cryptography 2013: 48-67 - Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Justine Wild:
Horizontal Collision Correlation Attack on Elliptic Curves. Selected Areas in Cryptography 2013: 553-570 - Ryad Benadjila, Jian Guo
, Victor Lomné, Thomas Peyrin
:
Implementing Lightweight Block Ciphers on x86 Architectures. Selected Areas in Cryptography 2013: 324-351 - Thierry P. Berger, Marine Minier, Gaël Thomas:
Extended Generalized Feistel Networks Using Matrix Representation. Selected Areas in Cryptography 2013: 289-305 - Andrey Bogdanov
, Huizheng Geng, Meiqin Wang, Long Wen, Baudoin Collard:
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA. Selected Areas in Cryptography 2013: 306-323 - Joppe W. Bos
, Craig Costello
, Michael Naehrig:
Exponentiating in Pairing Groups. Selected Areas in Cryptography 2013: 438-455 - Joppe W. Bos, Peter L. Montgomery, Daniel Shumow, Gregory M. Zaverucha:
Montgomery Multiplication Using Vector Instructions. Selected Areas in Cryptography 2013: 471-489 - Charles Bouillaguet, Chen-Mou Cheng, Tung Chou
, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs. Selected Areas in Cryptography 2013: 205-222 - Charles Bouillaguet, Bastien Vayssière:
Provable Second Preimage Resistance Revisited. Selected Areas in Cryptography 2013: 513-532 - Johannes Buchmann, Daniel Cabarcas, Florian Göpfert, Andreas Hülsing
, Patrick Weiden:
Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers. Selected Areas in Cryptography 2013: 402-417 - Jung Hee Cheon, Taechan Kim
, Yong Soo Song
:
A Group Action on ℤp˟ and the Generalized DLP with Auxiliary Inputs. Selected Areas in Cryptography 2013: 121-135 - Cécile Delerablée, Tancrède Lepoint
, Pascal Paillier, Matthieu Rivain:
White-Box Security Notions for Symmetric Encryption Schemes. Selected Areas in Cryptography 2013: 247-264 - Christophe Doche, Daniel Sutantyo:
Faster Repeated Doublings on Binary Elliptic Curves. Selected Areas in Cryptography 2013: 456-470 - Thomas Eisenbarth
, Ingo von Maurich, Xin Ye:
Faster Hash-Based Signatures with Bounded Leakage. Selected Areas in Cryptography 2013: 223-243 - Faruk Göloglu
, Robert Granger, Gary McGuire, Jens Zumbrägel:
Solving a 6120 -bit DLP on a Desktop Computer. Selected Areas in Cryptography 2013: 136-152 - Kevin J. Henry, Maura B. Paterson
, Douglas R. Stinson:
Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes. Selected Areas in Cryptography 2013: 89-117 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
:
Multiple Limited-Birthday Distinguishers and Applications. Selected Areas in Cryptography 2013: 533-550 - Antoine Joux
:
A New Index Calculus Algorithm with Complexity $$L(1/4+o(1))$$ in Small Characteristic. Selected Areas in Cryptography 2013: 355-379 - Dmitry Khovratovich, Christian Rechberger:
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE. Selected Areas in Cryptography 2013: 174-184 - Tancrède Lepoint
, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel
:
Two Attacks on a White-Box AES Implementation. Selected Areas in Cryptography 2013: 265-285 - Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing:
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over \mathrm p. Selected Areas in Cryptography 2013: 421-437 - Toshihiro Ohigashi
, Takanori Isobe, Yuhei Watanabe
, Masakatu Morii:
How to Recover Any Byte of Plaintext on RC4. Selected Areas in Cryptography 2013: 155-173 - David F. Oswald, Daehyun Strobel, Falk Schellenberg
, Timo Kasper, Christof Paar:
When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice. Selected Areas in Cryptography 2013: 571-588 - Thomas Pöppelmann, Tim Güneysu
:
Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware. Selected Areas in Cryptography 2013: 68-85 - Sujoy Sinha Roy, Frederik Vercauteren
, Ingrid Verbauwhede
:
High Precision Discrete Gaussian Sampling on FPGAs. Selected Areas in Cryptography 2013: 383-401 - Yu Sasaki, Lei Wang:
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. Selected Areas in Cryptography 2013: 493-512 - Hongjun Wu
, Bart Preneel
:
AEGIS: A Fast Authenticated Encryption Algorithm. Selected Areas in Cryptography 2013: 185-201 - Feng Zhang, Yanbin Pan, Gengran Hu:
A Three-Level Sieve Algorithm for the Shortest Vector Problem. Selected Areas in Cryptography 2013: 29-47
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-18 14:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint