![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2018
- Md. Mamunur Rashid Akand
, Reihaneh Safavi-Naini:
In-Region Authentication. ACNS 2018: 557-578 - Ryan Amiri, Aysajan Abidin
, Petros Wallden
, Erika Andersson:
Efficient Unconditionally Secure Signatures Using Universal Hashing. ACNS 2018: 143-162 - Ralph Ankele, Florian Böhl, Simon Friedberger:
MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth. ACNS 2018: 381-399 - Ralph Ankele, Eik List:
Differential Cryptanalysis of Round-Reduced Sparx-64/128. ACNS 2018: 459-475 - Guido Bertoni
, Joan Daemen, Michaël Peeters, Gilles Van Assche, Ronny Van Keer, Benoît Viguier:
KangarooTwelve: Fast Hashing Based on Keccak-p. ACNS 2018: 400-418 - Johannes Blömer, Jan Bobolz:
Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures. ACNS 2018: 221-239 - Estuardo Alpirez Bock, Chris Brzuska, Wil Michiels, Alexander Treff:
On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography. ACNS 2018: 103-120 - Cecilia Boschini
, Jan Camenisch, Gregory Neven:
Floppy-Sized Group Signatures from Lattices. ACNS 2018: 163-182 - Xavier Boyen, Qinyi Li:
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices. ACNS 2018: 535-553 - Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-client Verifiable Computation. ACNS 2018: 637-656 - Sébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré:
Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs. ACNS 2018: 262-279 - Dario Catalano, Dario Fiore, Luca Nizzardo:
On the Security Notions for Homomorphic Signatures. ACNS 2018: 183-201 - Andrea Cerulli, Emiliano De Cristofaro, Claudio Soriente:
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection. ACNS 2018: 280-300 - Jean-Sébastien Coron:
Formal Verification of Side-Channel Countermeasures via Elementary Circuit Transformations. ACNS 2018: 65-82 - Geoffroy Couteau
:
New Protocols for Secure Equality Test and Comparison. ACNS 2018: 303-320 - Benjamin Dowling
, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. ACNS 2018: 3-21 - F. Betül Durak, Serge Vaudenay:
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains. ACNS 2018: 440-458 - Antonio Faonio
, Jesper Buus Nielsen, Mark Simkin, Daniele Venturi:
Continuously Non-malleable Codes with Split-State Refresh. ACNS 2018: 121-139 - Marc Fischlin, Patrick Harasser:
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent. ACNS 2018: 202-220 - Georg Fuchsbauer, Michele Orrù
:
Non-interactive Zaps of Knowledge. ACNS 2018: 44-62 - Daniel Genkin, S. Dov Gordon, Samuel Ranellucci:
Best of Both Worlds in Secure Computation, with Low Communication Overhead. ACNS 2018: 340-359 - Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom
:
Drive-By Key-Extraction Cache Attacks from Portable Code. ACNS 2018: 83-102 - Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, Kyonghwan Yoon:
Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. ACNS 2018: 243-261 - Yotam Harchol, Ittai Abraham, Benny Pinkas:
Distributed SSH Key Management with Proactive RSA Threshold Signatures. ACNS 2018: 22-43 - Stanislaw Jarecki, Boyang Wei:
3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval. ACNS 2018: 360-378 - Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:
Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric. ACNS 2018: 616-633 - Seny Kamara, Alptekin Küpçü
:
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring. ACNS 2018: 696-714 - Suyash Kandele
, Souradyuti Paul
:
Message-Locked Encryption with File Update. ACNS 2018: 678-695 - Handan Kilinç, Serge Vaudenay:
Formal Analysis of Distance Bounding with Secure Hardware. ACNS 2018: 579-597 - Jiangtao Li
, Junqing Gong:
Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext. ACNS 2018: 497-515
skipping 7 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-03 14:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint