Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 34 matches
- 2007
- François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier:
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. INDOCRYPT 2007: 341-350 - Rana Barua, Sumit Kumar Pandey, Ravi Pankaj:
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. INDOCRYPT 2007: 351-360 - Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters:
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication. INDOCRYPT 2007: 167-182 - Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan:
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. INDOCRYPT 2007: 384-392 - Giovanni Di Crescenzo, Vishal Saraswat:
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. INDOCRYPT 2007: 282-296 - Frédéric Didier:
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function. INDOCRYPT 2007: 404-413 - Shlomi Dolev, Limor Lahiani, Moti Yung:
Secret Swarm UnitReactive k-Secret Sharing. INDOCRYPT 2007: 123-137 - Orr Dunkelman, Gautham Sekar, Bart Preneel:
Improved Meet-in-the-Middle Attacks on Reduced-Round DES. INDOCRYPT 2007: 86-100 - Duo Lei, Chao Li:
Extended Multi-Property-Preserving and ECM-Construction. INDOCRYPT 2007: 361-372 - Håkan Englund, Thomas Johansson, Meltem Sönmez Turan:
A Framework for Chosen IV Statistical Analysis of Stream Ciphers. INDOCRYPT 2007: 268-281 - Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois:
First-Order Differential Power Analysis on the Duplication Method. INDOCRYPT 2007: 210-223 - Praveen Gauravaram, Katsuyuki Okeya:
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. INDOCRYPT 2007: 393-403 - K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao:
Solving Discrete Logarithms from Partial Knowledge of the Key. INDOCRYPT 2007: 224-237 - Hüseyin Hisil, Gary Carter, Ed Dawson:
New Formulae for Efficient Elliptic Curve Arithmetic. INDOCRYPT 2007: 138-151 - David Jao, Dimitar Jetchev, Ramarathnam Venkatesan:
On the Bits of Elliptic Curve Diffie-Hellman Keys. INDOCRYPT 2007: 33-47 - Wen Ji, Lei Hu:
New Description of SMS4 by an Embedding overGF(28). INDOCRYPT 2007: 238-251 - Ramakanth Kavuluru, Andrew Klapper:
On the k -Operation Linear Complexity of Periodic Sequences. INDOCRYPT 2007: 322-330 - Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design of a Differential Power Analysis Resistant Masked AES S-Box. INDOCRYPT 2007: 373-383 - Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez:
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. INDOCRYPT 2007: 414-424 - Kazuhiko Minematsu, Toshiyasu Matsushima:
Tweakable Enciphering Schemes from Hash-Sum-Expansion. INDOCRYPT 2007: 252-267 - Pradeep Kumar Mishra, Vassil S. Dimitrov:
A Graph Theoretic Analysis of Double Base Number Systems. INDOCRYPT 2007: 152-166 - V. N. Muralidhara, Sandeep Sen:
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography. INDOCRYPT 2007: 48-57 - Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai:
Trade-Off Traitor Tracing. INDOCRYPT 2007: 331-340 - Markku-Juhani Olavi Saarinen:
Linearization Attacks Against Syndrome Based Hashes. INDOCRYPT 2007: 1-9 - Markku-Juhani Olavi Saarinen:
A Meet-in-the-Middle Collision Attack Against the New FORK-256. INDOCRYPT 2007: 10-17 - Gautham Sekar, Souradyuti Paul, Bart Preneel:
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. INDOCRYPT 2007: 58-72 - Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-signature Schemes Without Random Oracles. INDOCRYPT 2007: 197-209 - Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. INDOCRYPT 2007: 101-122 - Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang:
Transitive Signatures from Braid Groups. INDOCRYPT 2007: 183-196 - Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311
skipping 4 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-30 14:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint