Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/joc/joc24.bht:"
@article{DBLP:journals/joc/AbdallaBCDMNSS11, author = {Michel Abdalla and James Birkett and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Jacob C. N. Schuldt and Nigel P. Smart}, title = {Wildcarded Identity-Based Encryption}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {42--82}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9060-3}, doi = {10.1007/S00145-010-9060-3}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AsharovL11, author = {Gilad Asharov and Yehuda Lindell}, title = {Utility Dependence in Correct and Fair Rational Secret Sharing}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {157--202}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9064-z}, doi = {10.1007/S00145-010-9064-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AsharovL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BarakCLPR11, author = {Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin}, title = {Secure Computation Without Authentication}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {720--760}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9075-9}, doi = {10.1007/S00145-010-9075-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BarakCLPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BatinaGPRSV11, author = {Lejla Batina and Benedikt Gierlichs and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, title = {Mutual Information Analysis: a Comprehensive Study}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {269--291}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9084-8}, doi = {10.1007/S00145-010-9084-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BaudetLMT11, author = {Mathieu Baudet and David Lubicz and Julien Micolod and Andr{\'{e}} Tassiaux}, title = {On the Security of Oscillator-Based Random Number Generators}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {398--425}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9089-3}, doi = {10.1007/S00145-010-9089-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BaudetLMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BonehB11, author = {Dan Boneh and Xavier Boyen}, title = {Efficient Selective Identity-Based Encryption Without Random Oracles}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {659--693}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9078-6}, doi = {10.1007/S00145-010-9078-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BonehB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanettiH11, author = {Ran Canetti and Jonathan Herzog}, title = {Universally Composable Symbolic Security Analysis}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {83--147}, year = {2011}, url = {https://doi.org/10.1007/s00145-009-9055-0}, doi = {10.1007/S00145-009-9055-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CanettiH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanivetMLCVR11, author = {Gaetan Canivet and Paolo Maistri and R{\'{e}}gis Leveugle and Jessy Cl{\'{e}}di{\`{e}}re and Florent Valette and Marc Renaudin}, title = {Glitch and Laser Fault Attacks onto a Secure {AES} Implementation on a SRAM-Based {FPGA}}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {247--268}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9083-9}, doi = {10.1007/S00145-010-9083-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CanivetMLCVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dominguez-OviedoHA11, author = {Agustin Dominguez{-}Oviedo and M. Anwar Hasan and Bijan Ansari}, title = {Fault-Based Attack on Montgomery's Ladder Algorithm}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {346--374}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9087-5}, doi = {10.1007/S00145-010-9087-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dominguez-OviedoHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/EngeGT11, author = {Andreas Enge and Pierrick Gaudry and Emmanuel Thom{\'{e}}}, title = {An \emph{L}(1/3) Discrete Logarithm Algorithm for Low Degree Curves}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {24--41}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9057-y}, doi = {10.1007/S00145-010-9057-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/EngeGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FischlinF11, author = {Marc Fischlin and Roger Fischlin}, title = {Efficient Non-Malleable Commitment Schemes}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {203--244}, year = {2011}, url = {https://doi.org/10.1007/s00145-009-9043-4}, doi = {10.1007/S00145-009-9043-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FischlinF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GalbraithLS11, author = {Steven D. Galbraith and Xibin Lin and Michael Scott}, title = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {446--469}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9065-y}, doi = {10.1007/S00145-010-9065-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GalbraithLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GarayMPY11, author = {Juan A. Garay and Philip D. MacKenzie and Manoj Prabhakaran and Ke Yang}, title = {Resource Fairness and Composability of Cryptographic Protocols}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {615--658}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9080-z}, doi = {10.1007/S00145-010-9080-Z}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GarayMPY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GrasslIMS11, author = {Markus Grassl and Ivana Ilic and Spyros S. Magliveras and Rainer Steinwandt}, title = {Cryptanalysis of the Tillich-Z{\'{e}}mor Hash Function}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {148--156}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9063-0}, doi = {10.1007/S00145-010-9063-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GrasslIMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HellJ11, author = {Martin Hell and Thomas Johansson}, title = {Breaking the Stream Ciphers {F-FCSR-H} and {F-FCSR-16} in Real Time}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {427--445}, year = {2011}, url = {https://doi.org/10.1007/s00145-009-9053-2}, doi = {10.1007/S00145-009-9053-2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/HellJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Hofheinz11, author = {Dennis Hofheinz}, title = {Possibility and Impossibility Results for Selective Decommitments}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {470--516}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9066-x}, doi = {10.1007/S00145-010-9066-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Hofheinz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HohenbergerRSV11, author = {Susan Hohenberger and Guy N. Rothblum and Abhi Shelat and Vinod Vaikuntanathan}, title = {Securely Obfuscating Re-Encryption}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {694--719}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9077-7}, doi = {10.1007/S00145-010-9077-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HohenbergerRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/IndesteegeP11, author = {Sebastiaan Indesteege and Bart Preneel}, title = {Practical Collisions for EnRUPT}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {1--23}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9058-x}, doi = {10.1007/S00145-010-9058-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/IndesteegeP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KidronL11, author = {Dafna Kidron and Yehuda Lindell}, title = {Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {517--544}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9069-7}, doi = {10.1007/S00145-010-9069-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KidronL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LindellZ11, author = {Yehuda Lindell and Hila Zarosim}, title = {Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {761--799}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9072-z}, doi = {10.1007/S00145-010-9072-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LindellZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LiskovRW11, author = {Moses D. Liskov and Ronald L. Rivest and David A. Wagner}, title = {Tweakable Block Ciphers}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {588--613}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9073-y}, doi = {10.1007/S00145-010-9073-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LiskovRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MaitiS11, author = {Abhranil Maiti and Patrick Schaumont}, title = {Improved Ring Oscillator {PUF:} An FPGA-friendly Secure Primitive}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {375--397}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9088-4}, doi = {10.1007/S00145-010-9088-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MaitiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MonneratV11, author = {Jean Monnerat and Serge Vaudenay}, title = {Short Undeniable Signatures Based on Group Homomorphisms}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {545--587}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9070-1}, doi = {10.1007/S00145-010-9070-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MonneratV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NikovaRS11, author = {Svetla Nikova and Vincent Rijmen and Martin Schl{\"{a}}ffer}, title = {Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {292--321}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9085-7}, doi = {10.1007/S00145-010-9085-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NikovaRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PaarQS11, author = {Christof Paar and Jean{-}Jacques Quisquater and Berk Sunar}, title = {Guest Editorial}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {245--246}, year = {2011}, url = {https://doi.org/10.1007/s00145-011-9099-9}, doi = {10.1007/S00145-011-9099-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PaarQS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PoschmannMKLWL11, author = {Axel Poschmann and Amir Moradi and Khoongming Khoo and Chu{-}Wee Lim and Huaxiong Wang and San Ling}, title = {Side-Channel Resistant Crypto for Less than 2, 300 {GE}}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {322--345}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9086-6}, doi = {10.1007/S00145-010-9086-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PoschmannMKLWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.