Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2017
- Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Ricosset:
Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography. ACNS 2017: 3-19 - Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang:
Related-Key Impossible-Differential Attack on Reduced-Round Skinny. ACNS 2017: 208-228 - Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:
Accountable Storage. ACNS 2017: 623-644 - Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks. ACNS 2017: 124-144 - David Bernhard, Ngoc Khanh Nguyen, Bogdan Warinschi:
Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model). ACNS 2017: 336-353 - Alex Biryukov, Daniel Dinu, Yann Le Corre:
Side-Channel Attacks Meet Secure Network Protocols. ACNS 2017: 435-454 - Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:
Multi-client Oblivious RAM Secure Against Malicious Servers. ACNS 2017: 686-707 - Olivier Blazy, Céline Chevalier, Paul Germouty:
Almost Optimal Oblivious Transfer from QA-NIZK. ACNS 2017: 579-598 - Dan Boneh, Sam Kim, Valeria Nikolaenko:
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes. ACNS 2017: 457-477 - Claude Carlet, Annelie Heuser, Stjepan Picek:
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience. ACNS 2017: 393-414 - Ignacio Cascudo, Bernardo David:
SCRAPE: Scalable Randomness Attested by Public Entities. ACNS 2017: 537-556 - John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa:
Legacy-Compliant Data Authentication for Industrial Control System Traffic. ACNS 2017: 665-685 - David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. ACNS 2017: 557-578 - Yi-Ruei Chen, Wen-Guey Tzeng:
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security. ACNS 2017: 165-183 - Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini:
A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium. ACNS 2017: 184-207 - Daniel Demmler, Marco Holz, Thomas Schneider:
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. ACNS 2017: 599-619 - Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters:
Signature Schemes with Randomized Verification. ACNS 2017: 373-389 - Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk:
Simple Security Definitions for and Constructions of 0-RTT Key Exchange. ACNS 2017: 20-38 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. ACNS 2017: 39-58 - Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek:
Faster Secure Multi-party Computation of AES and DES Using Lookup Tables. ACNS 2017: 229-249 - Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi:
Secure and Efficient Pairing at 256-Bit Security Level. ACNS 2017: 59-79 - Kaoru Kurosawa, Rie Habuka:
More Efficient Construction of Bounded KDM Secure Encryption. ACNS 2017: 354-372 - Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. ACNS 2017: 478-497 - Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu:
Are You Lying: Validating the Time-Location of Outdoor Images. ACNS 2017: 103-123 - San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease. ACNS 2017: 293-312 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Maliciously Secure Multi-Client ORAM. ACNS 2017: 645-664 - Weizhi Meng, Wenjuan Li, Lee Wang Hao, Lijun Jiang, Jianying Zhou:
A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords. ACNS 2017: 145-162 - Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices. ACNS 2017: 83-102 - Akshayaram Srinivasan, Chandrasekaran Pandu Rangan:
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption. ACNS 2017: 273-292 - Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma:
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. ACNS 2017: 415-434
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 12:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint