default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2013
- Hassan Aly, Mohammed ElGayyar:
Attacking AES Using Bernstein's Attack on Modern Processors. AFRICACRYPT 2013: 127-139 - Utsab Bose, Anup Kumar Bhattacharya, Abhijit Das:
GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field. AFRICACRYPT 2013: 26-42 - Fabian van den Broek, Erik Poll:
A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers. AFRICACRYPT 2013: 406-423 - Michael Clear, Arthur Hughes, Hitesh Tewari:
Homomorphic Encryption with Access Policies: Characterization and New Constructions. AFRICACRYPT 2013: 61-87 - Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
Brandt's Fully Private Auction Protocol Revisited. AFRICACRYPT 2013: 88-106 - Alexandre Duc, Serge Vaudenay:
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems. AFRICACRYPT 2013: 107-126 - Louis Goubin, Ange Martinelli, Matthieu Walle:
Impact of Sboxes Size upon Side Channel Resistance and Block Cipher Design. AFRICACRYPT 2013: 240-259 - David Gstir, Martin Schläffer:
Fast Software Encryption Attacks on AES. AFRICACRYPT 2013: 359-374 - Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh:
Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model. AFRICACRYPT 2013: 140-155 - Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of Involutory MDS Matrices. AFRICACRYPT 2013: 43-60 - Andreas Hülsing:
W-OTS+ - Shorter Signatures for Hash-Based Signature Schemes. AFRICACRYPT 2013: 173-188 - Michael Hutter, Peter Schwabe:
NaCl on 8-Bit AVR Microcontrollers. AFRICACRYPT 2013: 156-172 - Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay:
New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs. AFRICACRYPT 2013: 189-207 - Marco Macchetti:
Cryptanalysis of AES and Camellia with Related S-boxes. AFRICACRYPT 2013: 208-221 - Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier:
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. AFRICACRYPT 2013: 222-239 - Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit:
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. AFRICACRYPT 2013: 1-25 - Isheeta Nargis, Payman Mohassel, Wayne Eberly:
Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority. AFRICACRYPT 2013: 260-278 - Christophe Nègre, Jean-Marc Robert:
Impact of Optimized Field Operations AB, AC and AB + CD in Scalar Multiplication over Binary Elliptic Curve. AFRICACRYPT 2013: 279-296 - Abderrahmane Nitaj:
An Attack on RSA Using LSBs of Multiples of the Prime Factors. AFRICACRYPT 2013: 297-310 - Kun Peng:
Modification and Optimisation of an ElGamal-Based PVSS Scheme. AFRICACRYPT 2013: 311-327 - Kun Peng, Li Yi:
Studying a Range Proof Technique - Exception and Optimisation. AFRICACRYPT 2013: 328-341 - Duong Hieu Phan, Viet Cuong Trinh:
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model. AFRICACRYPT 2013: 342-358 - Michael Schneider:
Sieving for Shortest Vectors in Ideal Lattices. AFRICACRYPT 2013: 375-391 - Sebastian Staamann:
An Identity-Based Key-Encapsulation Mechanism Built on Identity-Based Factors Selection. AFRICACRYPT 2013: 392-405 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
On the Expansion Length Of Triple-Base Number Systems. AFRICACRYPT 2013: 424-432 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Triple-Base Number System for Scalar Multiplication. AFRICACRYPT 2013: 433-451 - Amr M. Youssef, Abderrahmane Nitaj, Aboul Ella Hassanien:
Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings. Lecture Notes in Computer Science 7918, Springer 2013, ISBN 978-3-642-38552-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-20 00:48 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint