default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 483 matches
- 2006
- Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. IACR Cryptol. ePrint Arch. 2006: 304 (2006) - Masayuki Abe, Serge Fehr:
Perfect NIZK with Adaptive Soundness. IACR Cryptol. ePrint Arch. 2006: 423 (2006) - Onur Aciiçmez, Çetin Kaya Koç:
Trace-Driven Cache Attacks on AES. IACR Cryptol. ePrint Arch. 2006: 138 (2006) - Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert:
On the Power of Simple Branch Prediction Analysis. IACR Cryptol. ePrint Arch. 2006: 351 (2006) - Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç:
Predicting Secret Keys via Branch Prediction. IACR Cryptol. ePrint Arch. 2006: 288 (2006) - Giovanni Agosta, Gerardo Pelosi:
Countermeasures for the Simple Branch Prediction Analysis. IACR Cryptol. ePrint Arch. 2006: 482 (2006) - Stéphanie Alt:
Authenticated Hybrid Encryption for Multiple Recipients. IACR Cryptol. ePrint Arch. 2006: 29 (2006) - Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, Sampath Kannan:
Security Protocols with Isotropic Channels. IACR Cryptol. ePrint Arch. 2006: 396 (2006) - José de Jesús Angel Angel, Guillermo Morales-Luna:
Counting Prime Numbers with Short Binary Signed Representation. IACR Cryptol. ePrint Arch. 2006: 121 (2006) - Sarang Aravamuthan, Sachin Lodha:
The Average Transmission Overhead of Broadcast Encryption. IACR Cryptol. ePrint Arch. 2006: 324 (2006) - Sarang Aravamuthan, Viswanatha Rao Thumparthy:
A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks. IACR Cryptol. ePrint Arch. 2006: 316 (2006) - Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006. IACR Cryptol. ePrint Arch. 2006: 464 (2006) - Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2006: 225 (2006) - Timothy Atkinson, Roman Barták, Marius-Calin Silaghi, E. Tuleu, Markus Zanker:
Private and Efficient Stable Marriages (Matching). IACR Cryptol. ePrint Arch. 2006: 345 (2006) - Timothy Atkinson, Marius-Calin Silaghi:
An efficient way to access an array at a secret index. IACR Cryptol. ePrint Arch. 2006: 157 (2006) - Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang:
Malicious KGC Attacks in Certificateless Cryptography. IACR Cryptol. ePrint Arch. 2006: 255 (2006) - Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 368 (2006) - Jean-Philippe Aumasson:
On the pseudo-random generator ISAAC. IACR Cryptol. ePrint Arch. 2006: 438 (2006) - Roberto Avanzi, Francesco Sica:
Scalar Multiplication on Koblitz Curves using Double Bases. IACR Cryptol. ePrint Arch. 2006: 67 (2006) - Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:
An Analysis of the Hermes8 Stream Ciphers. IACR Cryptol. ePrint Arch. 2006: 269 (2006) - Steve Babbage, Matthew Dodd:
Finding Characteristic Polynomials with Jump Indices. IACR Cryptol. ePrint Arch. 2006: 10 (2006) - Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. IACR Cryptol. ePrint Arch. 2006: 219 (2006) - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability. IACR Cryptol. ePrint Arch. 2006: 132 (2006) - Michael Backes, Peeter Laud:
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis. IACR Cryptol. ePrint Arch. 2006: 266 (2006) - Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. IACR Cryptol. ePrint Arch. 2006: 58 (2006) - Michael Backes, Jörn Müller-Quade, Dominique Unruh:
On the Necessity of Rewinding in Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2006: 315 (2006) - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. IACR Cryptol. ePrint Arch. 2006: 68 (2006) - Gergei Bana, Payman Mohassel, Till Stegers:
Computational Soundness of Formal Indistinguishability and Static Equivalence. IACR Cryptol. ePrint Arch. 2006: 323 (2006) - Boaz Barak, Manoj Prabhakaran, Amit Sahai:
Concurrent Non-Malleable Zero Knowledge. IACR Cryptol. ePrint Arch. 2006: 355 (2006) - Johann Barbier, Eric Filiol, Kichenakoumar Mayoura:
New features for JPEG Steganalysis. IACR Cryptol. ePrint Arch. 2006: 301 (2006)
skipping 453 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-20 15:34 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint