![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2022
- Riham AlTawy
, Andreas Hülsing
:
Selected Areas in Cryptography - 28th International Conference, SAC 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13203, Springer 2022, ISBN 978-3-030-99276-7 [contents] - 2021
- Parhat Abla, Mingsheng Wang:
Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext Size. SAC 2021: 398-418 - Ward Beullens:
MAYO: Practical Post-quantum Signatures from Oil-and-Vinegar Maps. SAC 2021: 355-376 - Tim Beyne
, Yu Long Chen, Christoph Dobraunig
, Bart Mennink:
Multi-user Security of the Elephant v2 Authenticated Encryption Mode. SAC 2021: 155-178 - Tim Beyne
, Siemen Dhooghe
, Adrián Ranea
, Danilo Sijacic:
A Low-Randomness Second-Order Masked AES. SAC 2021: 87-110 - Alex Biryukov
, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto:
Automated Truncation of Differential Trails and Trail Clustering in ARX. SAC 2021: 286-307 - Pierre Briaud, Jean-Pierre Tillich, Javier A. Verbel:
A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem. SAC 2021: 419-438 - Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF. SAC 2021: 441-460 - Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme
:
A Simpler Model for Recovering Superpoly on Trivium. SAC 2021: 266-285 - Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani:
Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies. SAC 2021: 461-482 - Armando Faz-Hernández
, Watson Ladd
, Deepak Maram
:
ZKAttest: Ring and Group Signatures for Existing ECDSA Keys. SAC 2021: 68-83 - Paul Frixons, María Naya-Plasencia, André Schrottenloher:
Quantum Boomerang Attacks and Some Applications. SAC 2021: 332-352 - Robin Jadoul
, Nigel P. Smart
, Barry Van Leeuwen
:
MPC for Q2 Access Structures over Rings and Fields. SAC 2021: 131-151 - Haruhisa Kosuge, Hidema Tanaka:
Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS{MT}}$. SAC 2021: 377-397 - Deepak Kumaraswamy
, Shyam Murthy
, Srinivas Vivek
:
Revisiting Driver Anonymity in ORide. SAC 2021: 25-46 - Sabrina Kunzweiler
, Yan Bo Ti
, Charlotte Weitkämper:
Secret Keys in Genus-2 SIDH. SAC 2021: 483-507 - Alessandro Melloni
, Martijn Stam
, Øyvind Ytrehus
:
On Evaluating Anonymity of Onion Routing. SAC 2021: 3-24 - Kazuhiko Minematsu
, Akiko Inoue
, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo:
Parallel Verification of Serial MAC and AE Modes. SAC 2021: 200-219 - Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. SAC 2021: 223-245 - Animesh Roy, Dibyendu Roy, Subhamoy Maitra:
How Do the Arbiter PUFs Sample the Boolean Function Class? SAC 2021: 111-130 - André Schrottenloher:
Improved Quantum Algorithms for the k-XOR Problem. SAC 2021: 311-331 - Ling Sun, Wei Wang, Meiqin Wang:
Improved Attacks on GIFT-64. SAC 2021: 246-265 - Yosuke Todo, Yu Sasaki:
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. SAC 2021: 179-199 - Keita Xagawa
:
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application. SAC 2021: 47-67
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-09 01:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint