default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2015
- Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. CRYPTO (1) 2015: 388-409 - Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations. CRYPTO (1) 2015: 538-557 - Prabhanjan Ananth, Abhishek Jain:
Indistinguishability Obfuscation from Compact Functional Encryption. CRYPTO (1) 2015: 308-326 - Alex Biryukov, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. CRYPTO (1) 2015: 116-140 - Céline Blondeau, Thomas Peyrin, Lei Wang:
Known-Key Distinguisher on Full PRESENT. CRYPTO (1) 2015: 455-474 - Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Algebraic Decomposition for Probing Security. CRYPTO (1) 2015: 742-763 - Kai-Min Chung, Huijia Lin, Rafael Pass:
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation. CRYPTO (1) 2015: 287-307 - Benoit Cogliati, Rodolphe Lampe, Yannick Seurin:
Tweaking Even-Mansour Ciphers. CRYPTO (1) 2015: 189-208 - Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
New Multilinear Maps Over the Integers. CRYPTO (1) 2015: 267-286 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. CRYPTO (1) 2015: 433-454 - Nico Döttling, Dominique Schröder:
Efficient Pseudorandom Functions via On-the-Fly Adaptation. CRYPTO (1) 2015: 329-350 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably Weak Instances of Ring-LWE. CRYPTO (1) 2015: 63-92 - Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman:
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE. CRYPTO (1) 2015: 683-701 - Pierre-Alain Fouque, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi:
Cryptanalysis of the Co-ACD Assumption. CRYPTO (1) 2015: 561-580 - Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. CRYPTO (1) 2015: 601-620 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. CRYPTO (1) 2015: 368-387 - Henri Gilbert, Jérôme Plût, Joana Treger:
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes. CRYPTO (1) 2015: 475-490 - Qian Guo, Thomas Johansson, Paul Stankovski:
Coded-BKW: Solving LWE Using Lattice Codes. CRYPTO (1) 2015: 23-42 - Mohammad Hajiabadi, Bruce M. Kapron:
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations. CRYPTO (1) 2015: 224-243 - Mike Hamburg:
Decaf: Eliminating Cofactors Through Point Compression. CRYPTO (1) 2015: 705-723 - Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár:
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. CRYPTO (1) 2015: 493-517 - Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP. CRYPTO (1) 2015: 581-600 - Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. CRYPTO (1) 2015: 141-160 - Pierre Karpman, Thomas Peyrin, Marc Stevens:
Practical Free-Start Collision Attacks on 76-step SHA-1. CRYPTO (1) 2015: 623-642 - Marcel Keller, Emmanuela Orsini, Peter Scholl:
Actively Secure OT Extension with Optimal Overhead. CRYPTO (1) 2015: 724-741 - Paul Kirchner, Pierre-Alain Fouque:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. CRYPTO (1) 2015: 43-62 - Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON Block Cipher Family. CRYPTO (1) 2015: 161-185 - Thijs Laarhoven:
Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing. CRYPTO (1) 2015: 3-22 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of Full Sprout. CRYPTO (1) 2015: 663-682
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-02 04:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint