![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IACR Cryptology ePrint Archive, Volume 2004
Volume 2004, 2004
- Yuichi Komano, Kazuo Ohta:
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation. 2 - Erik Zenner:
On the Role of the Inner State Size in Stream Ciphers. 3 - Huafei Zhu:
Universal Undeniable Signatures. 5 - Boaz Barak, Yehuda Lindell, Tal Rabin:
Protocol Initialization for the Framework of Universal Composability. 6 - Aggelos Kiayias, Yiannis Tsiounis, Moti Yung:
Traceable Signatures. 7 - Mihir Bellare, Adriana Palacio:
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. 8 - Juan A. Garay, Philip D. MacKenzie, Ke Yang:
Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness. 9 - Tom St. Denis:
Fast Pseudo-Hadamard Transforms. 10 - Adam J. Slagell:
Known-Plaintext Attack Against a Permutation Based Video. 11 - María Isabel González Vasco, Rainer Steinwandt:
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. 12 - Jean-Sébastien Coron, Antoine Joux:
Cryptanalysis of a Provably Secure Cryptographic Hash Function. 13 - Sugata Gangopadhyay, Subhamoy Maitra:
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions. 14 - Trond Stølen Gustavsen, Kristian Ranestad:
An AGM-type elliptic curve point counting algorithm in characteristic three. 15 - Dennis Hofheinz, Jörn Müller-Quade:
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer. 16 - Michael Scott:
Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints. 17 - Song-Ju Kim, Ken Umeno, Akio Hasegawa:
Corrections of the NIST Statistical Test Suite for Randomness. 18 - Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. 19 - Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Optimal Signcryption from Any Trapdoor Permutation. 20 - Claude Barral, Jean-Sébastien Coron, David Naccache:
Externalized Fingerprint Matching. 21 - Steven M. Bellovin, William R. Cheswick:
Privacy-Enhanced Searches Using Encrypted Bloom Filters. 22 - Asnat Dadon-Elichai:
RDS: Remote Distributed Scheme for Protecting Mobile Agents. 23 - Sergey Agievich, Andrey Afonenko:
Exponential S-boxes. 24 - Hamilton E. Link, William D. Neumann:
Clarifying Obfuscation: Improving the Security of White-Box Encoding. 25 - Tom St. Denis:
The CSQUARE Transform. 26 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups. 27 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. 28 - Guido Bertoni, Luca Breveglieri, Thomas J. Wollinger, Christof Paar:
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. 29 - Colin Stahlke:
Point Compression on Jacobians of Hyperelliptic Curves over Fq. 30 - Igor A. Semaev:
Summation polynomials and the discrete logarithm problem on elliptic curves. 31 - Michael Scott, Paulo S. L. M. Barreto:
Compressed Pairings. 32 - Muxiang Zhang:
New Approaches to Password Authenticated Key Exchange based on RSA. 33 - Gideon Samid:
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic. 34 - Phillip Rogaway, Thomas Shrimpton:
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. 35 - Yan-Cheng Chang:
Single Database Private Information Retrieval with Logarithmic Communication. 36 - Fuw-Yi Yang, Jinn-ke Jan:
A Provably Secure Scheme for Restrictive Partially Blind Signatures. 37 - Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing without Key Exposure. 38 - Victor K. Wei:
A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. 39 - Lizhen Yang, Kefei Chen:
Cryptanalysis of a timestamp-based password authentication scheme. 40 - Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries. 41 - (Withdrawn) Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge. 42
- Xiutao Feng, Quanlong Wang, Zongduo Dai:
Multi-sequences with d-perfect property. 43 - Sujing Zhou:
Transitive Signatures Based on Non-adaptive Standard Signatures. 44 - Yehuda Lindell:
Lower Bounds and Impossibility Results for Concurrent Self Composition. 45 - Lih-Chung Wang, Fei-Hwang Chang:
Revision of Tractable Rational Map Cryptosystem. 46 - Yodai Watanabe:
On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes. 47 - Bartosz Zoltak:
Tail-MAC: A Message Authentication Scheme for Stream Ciphers. 48 - Christophe Clavier:
Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm. 49 - Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen:
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1. 50 - Yan-Cheng Chang, Michael Mitzenmacher:
Privacy Preserving Keyword Searches on Remote Encrypted Data. 51 - Tal Malkin, Satoshi Obana, Moti Yung:
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. 52 - Juan A. Garay, Philip D. MacKenzie, Ke Yang:
Efficient and Universally Composable Committed Oblivious Transfer and Applications. 53 - Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. 54 - Christophe Doche:
Redundant Trinomials for Finite Fields of Characteristic 2. 55 - Alex Biryukov, Christophe De Cannière, Michaël Quisquater:
On Multiple Linear Approximations. 57 - Michael Scott, Paulo S. L. M. Barreto:
Generating more MNT elliptic curves. 58 - Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. 59 - Ben Lynn, Manoj Prabhakaran, Amit Sahai:
Positive Results and Techniques for Obfuscation. 60 - Bo-Yin Yang, Jiun-Ming Chen:
TTS: Rank Attacks in Tame-Like Multivariate PKCs. 61 - John Black, Martin Cochran, Thomas Shrimpton:
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. 62 - Helger Lipmaa:
An Oblivious Transfer Protocol with Log-Squared Communication. 63 - Ratna Dutta, Rana Barua, Palash Sarkar:
Pairing-Based Cryptographic Protocols : A Survey. 64 - Ian F. Blake, V. Kumar Murty, Guangwu Xu:
Refinements of Miller's Algorithm for Computing Weil/Tate Pairing. 65 - Kris Tiri, Ingrid Verbauwhede:
A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC's. 66 - Kris Tiri, Ingrid Verbauwhede:
Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC's against Differential Power Analysis. 67 - Kris Tiri, Ingrid Verbauwhede:
Synthesis of Secure FPGA Implementations. 68 - Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. 69 - Steven D. Galbraith, Victor Rotger:
Easy decision-Diffie-Hellman groups. 70 - Waldyr D. Benits Jr., Routo Terada:
An IBE Scheme to Exchange Authenticated Secret Keys. 71 - Christopher Wolf, Bart Preneel:
Asymmetric Cryptography: Hidden Field Equations. 72 - Pierrick Gaudry:
Index calculus for abelian varieties and the elliptic curve discrete logarithm problem. 73 - Liam Keliher, Henk Meijer, Stafford E. Tavares:
Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael. 74 - Alexis Warner Machado:
An Hybrid Mode of Operation. 75 - Aggelos Kiayias, Moti Yung:
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders. 76 - Mihir Bellare, Haixia Shi, Chong Zhang:
Foundations of Group Signatures: The Case of Dynamic Groups. 77 - Tadayoshi Kohno:
Analysis of the WinZip encryption method. 78 - Zhaohui Cheng, Luminita Vasiu, Richard Comley:
Pairing-Based One-Round Tripartite Key Agreement Protocols. 79 - Marius Oliver Gheorghita:
HENKOS Stream Cipher. 80 - Philip Hawkes, Gregory G. Rose:
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers. 81 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. 82 - Bo Yang, Kaijie Wu, Ramesh Karri
:
Scan Based Side Channel Attack on Data Encryption Standard. 83 - David Galindo, Sebastià Martín Molleví, Jorge L. Villar:
Evaluating elliptic curve based KEMs in the light of pairings. 84 - Tom St. Denis:
The CS2 Block Cipher. 85 - Amit Sahai, Brent Waters:
Fuzzy Identity Based Encryption. 86 - Karl Rubin, Alice Silverberg:
Using primitive subgroups to do more with fewer bits. 87 - (Withdrawn) Efficient Batch Verification of Signature Schemes based on Bilinear Maps. 88
- Mahalingam Ramkumar, Nasir D. Memon:
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance. 89 - Ratna Dutta, Rana Barua, Palash Sarkar:
Provably Secure Authenticated Tree Based Group Key Agreement Protocol. 90 - Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Signature Bouquets: Immutability for Aggregated/Condensed Signatures. 91 - Hongjun Wu:
A New Stream Cipher HC-256. 92 - Giuseppe Ateniese, Breno de Medeiros:
A Provably Secure Nyberg-Rueppel Signature Variant with Applications. 93 - Alex Biryukov:
Block Ciphers and Stream Ciphers: The State of the Art. 94 - Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda:
GNFS Factoring Statistics of RSA-100, 110, ..., 150. 95 - (Withdrawn) On the Ambiguity of Concurrent Signatures. 96
- Vipul Goyal:
How To Re-initialize a Hash Chain. 97 - María Isabel González Vasco, David Pérez-García:
Attacking a Public Key Cryptosystem Based on Tree Replacement. 98 - Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. 99 - Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, Claire Whelan:
The Sorcerer's Apprentice Guide to Fault Attacks. 100 - Johannes Blömer, Jorge Guajardo, Volker Krummel:
Provably Secure Masking of AES. 101 - Benoît Libert, Jean-Jacques Quisquater:
The Exact Security of an Identity Based Signature and its Applications. 102 - Jintai Ding, Dieter Schmidt:
Cryptanalysis of SFlash v3. 103 - Lan Nguyen, Reihaneh Safavi-Naini:
Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings. 104 - Alessandro Acquisti:
Receipt-Free Homomorphic Elections and Write-in Ballots. 105 - Pim Tuyls, Jasper Goseling:
Capacity and Examples of Template Protecting Biometric Authentication Systems. 106 - Bertrand Byramjee, Sylvain Duquesne:
Classification of genus 2 curves over F2n and optimization of their arithmetic. 107 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. 108 - Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons:
Concealing Complex Policies with Hidden Credentials. 109 - Carlisle Adams:
Designing Against the 'Overdefined System of Equations' Attack. 110 - Gregory V. Bard:
The Vulnerability of SSL to Chosen Plaintext Attack. 111 - Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Relation between XL algorithm and Gröbner Bases Algorithms. 112 - Dominik Raub, Rainer Steinwandt, Jörn Müller-Quade:
On the Security and Composability of the One Time Pad. 113 - Liqun Chen, John Malone-Lee:
Improved Identity-Based Signcryption. 114 - Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won:
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange. 115 - Ran Canetti, Eyal Kushilevitz, Yehuda Lindell:
On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions. 116 - Noel McCullagh, Paulo S. L. M. Barreto:
Efficient and Forward-Secure Identity-Based Signcryption. 117 - Stéphane Flon, Roger Oyono, Christophe Ritzenthaler:
Fast addition on non-hyperelliptic genus 3 curves. 118 - Masayuki Abe, Serge Fehr:
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. 119 - Bartosz Zoltak:
Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup. 120 - Tsz Hon Yuen, Victor K. Wei:
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. 121 - Noel McCullagh, Paulo S. L. M. Barreto:
A New Two-Party Identity-Based Authenticated Key Agreement. 122 - Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On security of XTR public key cryptosystems against Side Channel Attacks. 123 - Douglas Wikström:
Universally Composable DKG with Linear Number of Exponentiations. 124 - Shai Halevi:
EME*: extending EME to handle arbitrary-length messages with associated data. 125 - Haining Fan, Yiqi Dai:
Two Software Normal Basis Multiplication Algorithms for GF(2n). 126 - Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won:
DDH-based Group Key Agreement in a Mobile Environment. 127 - Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic Block Ciphers. 128 - Joe Suzuki:
Generalizing Kedlaya's order counting based on Miura Theory. 129 - David P. Woodruff, Jessica Staddon:
Private Inference Control. 130 - Jung Hee Cheon, Yongdae Kim, HyoJin Yoon:
A New ID-based Signature with Batch Verification. 131 - Robert Granger, Dan Page, Martijn Stam:
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography. 132 - Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. 133 - Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller:
Secure and Efficient Masking of AES - A Mission Impossible? 134 - Vipul Goyal:
More Efficient Server Assisted One Time Signatures. 135 - Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. 136 - Haining Fan, Yiqi Dai:
New GF(2n) Parallel Multiplier Using Redundant Representation. 137 - Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval:
How to Disembed a Program? 138 - Manoj Prabhakaran, Amit Sahai:
New Notions of Security: Achieving Universal Composability without Trusted Setup. 139 - (Withdrawn) Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher. 140
- Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Elastic AES. 141 - (Withdrawn) Elliptic Curve based Signcryption and its Multi-party Schemes. 142
- Nicolas T. Courtois:
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash. 143 - Alexander Maximov, Martin Hell, Subhamoy Maitra:
Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables. 144 - Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax
, Hervé Pelletier:
Electromagnetic Side Channels of an FPGA Implementation of AES. 145 - Eli Biham, Rafi Chen:
Near-Collisions of SHA-0. 146 - Matthew J. Campagna, Amit Sethi:
Key Recovery Method for CRT Implementation of RSA. 147 - Zuowen Tan, Zhuojun Liu:
Provably Secure Delegation-by-Certification Proxy Signature Schemes. 148 - Elena Trichina, Lesya M. Korkishko:
Secure and Efficient AES Software Implementation for Smart Caards. 149 - Young-Ran Lee, Hyang-Sook Lee:
An Authenticated Certificateless Public Key Encryption Scheme. 150 - Mitsuhiro Haneda, Mitsuru Kawazoe, Tetsuya Takahashi:
Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type y2=x2k+1+ax. 151 - Neal Koblitz, Alfred Menezes:
Another Look at "Provable Security". 152 - Pierrick Gaudry, Emmanuel Thomé, Nicolas Thériault, Claus Diem:
A double large prime variation for small genus hyperelliptic index calculus. 153 - Amir Herzberg:
Controlling Spam by Secure Internet Content Selection. 154 - Amir Herzberg, Ahmad Jbara:
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks. 155 - Kenneth G. Paterson, Fred Piper, Rüdiger Schack:
Quantum cryptography: a practical information security perspective. 156 - Robert Granger, Dan Page, Martijn Stam:
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three. 157 - Olivier Benoît, Nora Dabbous, Laurent Gauteron, Pierre Girard, Helena Handschuh, David Naccache, Stéphane Socié, Claire Whelan:
Mobile Terminal Security. 158 - Gergely Ács, Levente Buttyán, István Vajda:
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. 159 - Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable Public-Key Tracing and Revoking. 160 - Koh-ichi Nagao:
Improvement of ThéLeriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus. 161 - Ivan Damgård, Thomas Pedersen, Louis Salvail:
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission. 162 - (Withdrawn) On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards. 163
- Man Ho Au, Victor K. Wei:
ID-based Cryptography from Composite Degree Residuosity. 164 - Dan Page, Nigel P. Smart, Frederik Vercauteren:
A comparison of MNT curves and supersingular curves. 165 - Éliane Jaulmes, Reynald Lercier:
FRMAC, a Fast Randomized Message Authentication Code. 166 - Fuw-Yi Yang, Jinn-ke Jan:
A Secure and Efficient Key Exchange Protocol for Mobile Communications. 167 - Tzuong-Tsieng Moh, Jiun-Ming Chen, Bo-Yin Yang:
Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack. 168 - Alexander W. Dent, Allan Tomlinson:
Regional Blackouts: Protection of Broadcast Content on 3G Networks. 169 - Rafail Ostrovsky, Charles Rackoff, Adam D. Smith:
Efficient Consistency Proofs for Generalized Queries on a Committed Database. 170 - Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles. 171 - Dan Boneh, Xavier Boyen:
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. 172 - Dan Boneh, Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles. 173 - Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. 174 - Yehuda Lindell, Benny Pinkas:
A Proof of Yao's Protocol for Secure Two-Party Computation. 175 - Andrew Burnett, Adam Duffy, Tom Dowling:
A Biometric Identity Based Signature Scheme. 176 - Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin:
Updating the Parameters of a Threshold Scheme by Minimal Broadcast. 177 - Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe:
Optimal Updating of Ideal Threshold Schemes. 178 - Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. 179 - Brent R. Waters:
Efficient Identity-Based Encryption Without Random Oracles. 180 - Yehuda Lindell, Anna Lysyanskaya, Tal Rabin:
On the Composition of Authenticated Byzantine Agreement. 181 - Minh-Huyen Nguyen, Salil P. Vadhan:
Simpler Session-Key Generation from Short Random Passwords. 182 - Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn:
A New Forward Secure Signature Scheme. 183 - Amit K. Awasthi, Sunder Lal:
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. 184 - Frederik Armknecht:
On the Existence of low-degree Equations for Algebraic Attacks. 185 - (Withdrawn) A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy. 186
- Mathieu Ciet, Michael Neve, Eric Peeters, Jean-Jacques Quisquater:
Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version. 187 - Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax
:
Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design. 188 - Denis Xavier Charles, Kristin E. Lauter:
Computing Modular Polynomials. 189 - Javier Herranz, Germán Sáez:
Distributed Ring Signatures for Identity-Based Scenarios. 190 - Pradeep Kumar Mishra:
Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations. 191 - (Withdrawn) Security Pitfalls of an efficient remote user authentication scheme using smart cards. 192
- David A. McGrew, John Viega:
The Security and Performance of the Galois/Counter Mode of Operation (Full Version). 193 - Rosario Gennaro, Victor Shoup:
A Note on An Encryption Scheme of Kurosawa and Desmedt. 194 - Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi:
Signed Binary Representations Revisited. 195 - Shaoquan Jiang, Guang Gong:
Password Based Key Exchange with Mutual Authentication. 196 - Helmut Kahl:
SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation. 197 - Laszlo Hars:
Long Modular Multiplication for Cryptographic Applications. 198 - Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu:
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. 199 - An Braeken, Svetla Nikova, Ventzislav Nikov:
On Cheating Immune Secret Sharing. 200 - Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He:
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing. 201 - Yuri L. Borissov, An Braeken, Svetla Nikova:
Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions. 202 - John Black, Martin Cochran, Ryan W. Gardner:
How to Cheat at Chess: A Security Analysis of the Internet Chess Club. 203 - Markus Volkmer, André Schaumburg:
Authenticated tree parity machine key exchange. 204 - Ernie Brickell, Jan Camenisch, Liqun Chen:
Direct Anonymous Attestation. 205 - Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Proxy Signature Using Bilinear Pairings. 206 - Philip Hawkes, Michael Paddon, Gregory G. Rose:
On Corrective Patterns for the SHA-2 Family. 207 - Jean-Sébastien Coron, Alexander May:
Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring. 208 - Christoph Ludwig:
The Security and Efficiency of Micciancio's Cryptosystem. 209 - Alexander W. Dent:
Hybrid Cryptography. 210 - Ian F. Blake, Aldar C.-F. Chan:
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing. 211 - Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. 212 - Fangguo Zhang:
Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery. 213 - An Braeken, Christopher Wolf, Bart Preneel:
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality. 214 - Mihir Bellare, Gregory Neven:
Transitive Signatures: New Schemes and Proofs. 215 - Markus Volkmer, Sebastian Wallner:
Tree Parity Machine Rekeying Architectures. 216 - Aggelos Kiayias, Moti Yung:
Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice. 217 - Eiichiro Fujisaki:
Plaintext-Simulatability. 218 - Yevgeniy Dodis, Adam D. Smith:
Entropic Security and the Encryption of High Entropy Messages. 219 - Heiko Stamer, Friedrich Otto:
On Oleshchuk's Public Key Cryptosystem. 220 - Mihir Bellare, Adriana Palacio:
Towards Plaintext-Aware Public-Key Encryption without Random Oracles. 221 - An Braeken, Christopher Wolf, Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. 222 - Xinxin Fan, Yumin Wang:
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves. 223 - Marc Joye, David Naccache, Stéphanie Porte:
The Polynomial Composition Problem in (Z/nZ)[X]. 224 - Jovan Dj. Golic:
Vectorial Boolean functions and induced algebraic equations. 225 - Boaz Barak, Yehuda Lindell, Salil P. Vadhan:
Lower Bounds for Non-Black-Box Zero Knowledge. 226 - Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
Sign Change Fault Attacks On Elliptic Curve Cryptosystems. 227 - Honggang Hu, Dengguo Feng:
Distribution of R-Patterns in the Kerdock-code binary sequences and the highest level sequences of primitive sequences over Z2l. 228 - Xin Lü, Zhi Ma, Dengguo Feng:
Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes. 229 - Fuw-Yi Yang, Jinn-ke Jan:
A Provable Secure Scheme for Partially Blind Signatures. 230 - Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption. 231 - Frederik Armknecht, Joseph Lano, Bart Preneel:
Extending the Resynchronization Attack. 232 - Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. 233 - Zuo-Wen Tan, Zhuo-Jun Liu:
On the security of some nonrepudiable threshold proxy signature schemes with known signers. 234 - Alfred Menezes, Edlyn Teske:
Cryptographic Implications of Hess' Generalized GHS Attack. 235 - Xiaotong Fu, Chunxiang Xu, Guozhen Xiao:
Forgery Attacks on Chang et al.'s signature scheme with message recovery. 236 - Christopher Wolf, An Braeken, Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. 237 - Amit K. Awasthi, Sunder Lal:
Security Analysis of A Dynamic ID-based Remote User Authentication Scheme. 238 - Arkady Berenstein, Leon Chernyak:
Geometric Key Establishment. 239 - Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura:
A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields. 240 - Colm O'hEigeartaigh:
A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2. 241 - Vladimir Shpilrain, Gabriel Zapata:
Combinatorial group theory and public key cryptography. 242 - Giuseppe Ateniese, Breno de Medeiros:
On the Key Exposure Problem in Chameleon Hashes. 243 - Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. 244 - Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On codes, matroids and secure multi-party computation from linear secret sharing schemes. 245 - Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell:
Upper and Lower Bounds on Black-Box Steganography. 246 - Jovan Dj. Golic, Guglielmo Morgari:
Vectorial fast correlation attacks. 247 - An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties. 248 - Zhaohui Cheng, Richard Comley:
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol. 249 - Jing Xu, Zhenfeng Zhang, Dengguo Feng:
Identity Based Threshold Proxy Signature. 250 - Junghyun Nam, Seungjoo Kim, Dongho Won:
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices. 251 - Mihir Bellare, Chanathip Namprempre, Gregory Neven:
Security Proofs for Identity-Based Identification and Signature Schemes. 252 - Stefan Lucks:
Design Principles for Iterated Hash Functions. 253 - Jovan Dj. Golic:
New paradigms for digital generation and post-processing of random data. 254 - Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi:
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. 255 - Claude Carlet, Sihem Mesnager:
On the supports of the Walsh transforms of Boolean functions. 256 - Junghyun Nam, Seungjoo Kim, Dongho Won:
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme. 257 - Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart:
Escrow-Free Encryption Supporting Cryptographic Workflow. 258 - An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Boolean Functions with Generalized Cryptographic Properties. 259 - Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won:
Secure Group Communications over Combined Wired/Wireless Networks. 260 - Dan Boneh, Jonathan Katz:
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. 261 - Lihua Liu, Zhengjun Cao:
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. 262 - Christopher Wolf, Bart Preneel:
Applications of Multivariate Quadratic Public Key Systems. 263 - Philip Hawkes, Michael Paddon, Gregory G. Rose:
Musings on the Wang et al. MD5 Collision. 264 - Yongge Wang, Bei-tseng Chu:
sSCADA: Securing SCADA Infrastructure Communications. 265 - Majid Khabbazian, T. Aaron Gulliver:
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods. 266 - Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. 267 - Zhengjun Cao, Lihua Liu:
Untraceability of Wang-Fu Group Signature Scheme. 268 - Lifeng Guo:
Cryptanalysis of Threshold-Multisignature Schemes. 269 - Fuw-Yi Yang, Jinn-ke Jan:
An Enhanced and Secure Protocol for Authenticated Key Exchange. 270 - Philip Hawkes, Michael Paddon, Gregory G. Rose:
The Mundja Streaming MAC. 271 - Tom Shrimpton:
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security. 272 - Lifeng Guo:
Cryptanalysis of Threshold-Multisignature schemes. 273 - Qingshu Meng, Min Yang, Huanguo Zhang, Jingsong Cui:
A novel algorithm enumerating Bent functions. 274 - Wei-Chi Ku, Chun-Ming Ho:
An e-Voting Scheme with Improved Resistance to Bribe and Coercion. 275 - Claude Carlet:
Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions. 276 - David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan:
Experimenting with Faults, Lattices and the DSA. 277 - David A. McGrew, Scott R. Fluhrer:
The Extended Codebook (XCB) Mode of Operation. 278 - Jean-Claude Bajard, Laurent Imbert, Graham A. Jullien:
Parallel Montgomery Multiplication in GF(2k) using Trinomial Residue Arithmetic. 279 - Zhengjun Cao:
Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme. 280 - Patrick P. Tsang, Victor K. Wei:
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. 281 - Ventzislav Nikov, Svetla Nikova:
New Monotone Span Programs from Old. 282 - Dan Page, Frederik Vercauteren:
Fault and Side-Channel Attacks on Pairing Based Cryptography. 283 - Qingshu Meng, Huanguo Zhang, Min Yang, Jingsong Cui:
ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS. 284 - Annegret Weng:
Generation of random Picard curves for cryptography. 285 - Daniele Micciancio:
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions. 286 - Quang Viet Duong, Kaoru Kurosawa:
Almost Ideal Contrast Visual Cryptography with Reversing. 287 - (Withdrawn) A New Designated Confirmer Signature Variant with Intended Recipient. 288
- Kai Wirt:
Fault attack on the DVB Common Scrambling Algorithm. 289 - Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. 290 - Martin Boesgaard, Thomas Pedersen, Mette Vesterager, Erik Zenner:
The Rabbit Stream Cipher - Design and Security Analysis. 291 - Ruishan Zhang, Kefei Chen:
Asynchronous Proactive RSA. 292 - Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Provably Secure Authentication of Digital Media Through Invertible Watermarks. 293 - Souradyuti Paul, Bart Preneel:
Solving Systems of Differential Equations of Addition. 294 - Jiang Wu, Ruizhong Wei:
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security. 295 - Mridul Nandi:
Designs of Efficient Secure Large Hash Values. 296 - Johannes Buchmann, Luis Carlos Coronado García, Martin Döring, Daniela Engelbert, Christoph Ludwig, Raphael Overbeck, Arthur Schmidt, Ulrich Vollmer, Ralf-Philipp Weinmann:
Post-Quantum Signatures. 297 - Zuo-Wen Tan, Zhuo-Jun Liu:
Nominative Proxy Signature Schemes. 298 - Zhengjun Cao, Sherman S. M. Chow:
Security Flaws in a Pairing-based Group Signature Scheme. 299 - Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. 300 - Bartosz Zoltak:
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme. 301 - Lifeng Guo:
Security of Wang-Li Threshold Signature Scheme. 302 - Soonhak Kwon:
Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields. 303 - John Kelsey, Bruce Schneier:
Second Preimages on n-bit Hash Functions for Much Less than 2n Work. 304 - Paulo S. L. M. Barreto:
A note on efficient computation of cube roots in characteristic 3. 305 - Daniel R. L. Brown, Robert P. Gallant:
The Static Diffie-Hellman Problem. 306 - Zhengjun Cao:
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme. 307 - Guohong Xie:
Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement. 308 - Mihir Bellare, Oded Goldreich, Anton Mityagin:
The Power of Verification Queries in Message Authentication and Authenticated Encryption. 309 - Yevgeniy Dodis, Aleksandr Yampolskiy:
A Verifiable Random Function With Short Proofs and Keys. 310 - Mårten Trolin, Douglas Wikström:
Hierarchical Group Signatures. 311 - David Jao, Stephen D. Miller, Ramarathnam Venkatesan:
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves. 312 - Fuw-Yi Yang, Jinn-ke Jan, Woei-Jiunn Jeng:
Cryptanalysis of a threshold proxy signature with known signers. 313 - AbdelNasir Alshamsi, Takamichi Saito:
A Technical Comparison of IPSec and SSL. 314 - Qin Wang, Zhenfu Cao:
Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes. 315 - Zhengjun Cao:
On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme. 316 - Ran Canetti, Shai Halevi, Jonathan Katz:
Adaptively-Secure, Non-Interactive Public-Key Encryption. 317 - Martin Hirt, Jesper Buus Nielsen:
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation. 318 - Martin Boesgaard, Ove Scavenius, Thomas Pedersen, Thomas Christensen, Erik Zenner:
Badger - A Fast and Provably Secure MAC. 319 - Alfonso De Gregorio:
Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults. 320 - Vladimir Shpilrain, Alexander Ushakov:
The conjugacy search problem in public key cryptography: unnecessary and insufficient. 321 - Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. 322 - Tanja Lange:
A note on López-Dahab coordinates. 323 - Giuliano Laccetti, Giovanni Schmid:
On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions. 324 - Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida:
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules. 325 - Zhengjun Cao:
Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme. 326 - Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. 327 - (Withdrawn) Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model. 328
- Ran Canetti, Shai Halevi, Michael Steiner:
Hardness amplification of weakly verifiable puzzles. 329 - Mridul Nandi, Douglas R. Stinson:
Multicollision Attacks on Generalized Hash Functions. 330 - Mihir Bellare, Phillip Rogaway:
Code-Based Game-Playing Proofs and the Security of Triple Encryption. 331 - Victor Shoup:
Sequences of games: a tool for taming complexity in security proofs. 332 - Marius-Calin Silaghi:
Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem. 333 - Ran Canetti, Jonathan Herzog:
Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange). 334 - Iftach Haitner, Ronen Shaltiel:
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions. 335 - Stefan Wolf, Jürg Wullschleger:
Oblivious Transfer Is Symmetric. 336 - Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. 337 - Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. 338 - Don Coppersmith, Nick Howgrave-Graham, S. V. Nagaraj:
Divisors in Residue Classes, Constructively. 339 - Morris Dworkin:
Request for Review of Key Wrap Algorithms. 340 - Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli:
Reducing Complexity Assumptions for Statistically-Hiding Commitment. 341 - Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau:
A comb method to render ECC resistant against Side Channel Attacks. 342 - Kim-Kwang Raymond Choo:
Revisit Of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols. 343 - Nick Howgrave-Graham, Joseph H. Silverman, Ari Singer, William Whyte:
Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures. 344 - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. 345 - Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa:
Random Switching Logic: A Countermeasure against DPA based on Transition Probability. 346 - Marco Macchetti:
Addendum to "On the Generalized Linear Equivalence of Functions over Finite Fields". 347 - Junghyun Nam, Seungjoo Kim, Dongho Won:
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords. 348 - Dong Jin Park, Pil Joong Lee:
A DPA Attack on the Improved Ha-Moon Algorithm. 349 - Jintai Ding, Dieter Schmidt:
Multivariable public-key cryptosystems. 350 - (Withdrawn) Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security. 351
- Marten van Dijk, Robert Granger, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff:
Practical Cryptography in High Dimensional Tori. 352 - Patrick Fitzpatrick, Christopher Wolf:
Direct Division in Factor Rings. 353 - Alexander Maximov:
Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra. 354 - Pei-Yih Ting, Po-Yueh Hung:
A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates. 355 - Ondrej Mikle:
Practical Attacks on Digital Signatures Using MD5 Message Digest. 356 - Dan Kaminsky:
MD5 To Be Considered Harmful Someday. 357 - Xavier Boyen:
Reusable Cryptographic Fuzzy Extractors. 358 - Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. 359 - Christopher Wolf, Bart Preneel:
Equivalent Keys in HFE, C*, and variations. 360 - Christopher Wolf, Bart Preneel:
Superfluous Keys in Multivariate Quadratic Asymmetric Systems. 361 - Kristian Gjøsteen:
A new security proof for Damgård's ElGamal. 362 - Qiang Tang
, Chris J. Mitchell:
Rethinking the security of some authenticated group key agreement schemes. 363 - Krystian Matusiewicz, Josef Pieprzyk:
Finding good differential patterns for attacks on SHA-1. 364 - Steven D. Galbraith, James F. McKee, P. C. Valença:
Ordinary abelian varieties having small embedding degree. 365 - Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key. 366 - Patrick Felke:
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches. 367 - Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek:
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience. 368 - Filipe Rosado da-Fonseca:
SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks. 369 - Victor K. Wei:
Tracing-by-Linking Group Signautres. 370 - Vipul Goyal:
Construction and Traversal of Hash Chain with Public Links. 371 - (Withdrawn) On The Security of Two Key-Updating Signature Schemes. 372
- Chunming Tang, Dingyi Pei, Zhuojun Liu:
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs. 373 - Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo:
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. 374 - Paulo S. L. M. Barreto, Steven D. Galbraith, Colm O'hEigeartaigh, Michael Scott:
Efficient Pairing Computation on Supersingular Abelian Varieties. 375 - Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo:
Cryptanalysis of RCES/RSES Image Encryption Scheme. 376 - Javier Herranz, Germán Sáez:
New Distributed Ring Signatures for General Families of Signing Subsets. 377
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.