Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/mycrypt:"
@proceedings{DBLP:conf/mycrypt/2016, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61273-7}, doi = {10.1007/978-3-319-61273-7}, isbn = {978-3-319-61272-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/ArriagaI016, author = {Afonso Arriaga and Vincenzo Iovino and Qiang Tang}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Updatable Functional Encryption}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {347--363}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_17}, doi = {10.1007/978-3-319-61273-7\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/ArriagaI016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/BehniaTH16, author = {Rouzbeh Behnia and Syh{-}Yuan Tan and Swee{-}Huay Heng}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {474--477}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_23}, doi = {10.1007/978-3-319-61273-7\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/BehniaTH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/BeunardeauFGN16, author = {Marc Beunardeau and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Honey Encryption for Language - Robbing Shannon to Pay Turing?}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {127--144}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_7}, doi = {10.1007/978-3-319-61273-7\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/BeunardeauFGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/BoydBCH16, author = {Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Key Recovery: Inert and Public}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {111--126}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_6}, doi = {10.1007/978-3-319-61273-7\_6}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/BoydBCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Boyen16, author = {Xavier Boyen}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture)}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {3--10}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_1}, doi = {10.1007/978-3-319-61273-7\_1}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Boyen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/ChatterjeeKMS16, author = {Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Another Look at Tightness {II:} Practical Issues in Cryptography}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {21--55}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_3}, doi = {10.1007/978-3-319-61273-7\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/ChatterjeeKMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Courtois16, author = {Nicolas T. Courtois}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {506--520}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_27}, doi = {10.1007/978-3-319-61273-7\_27}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Courtois16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/CrepeauY16, author = {Claude Cr{\'{e}}peau and Nan Yang}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Multi-prover Interactive Proofs: Unsound Foundations}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {485--493}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_25}, doi = {10.1007/978-3-319-61273-7\_25}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/CrepeauY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/FerradiGN16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Human Public-Key Encryption}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {494--505}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_26}, doi = {10.1007/978-3-319-61273-7\_26}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/FerradiGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/FrancisANHMS16, author = {Danny Francis and Syarifah Ruqayyah Aljunid and Takuya Nishida and Yu{-}ichi Hayashi and Takaaki Mizuki and Hideaki Sone}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {193--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_10}, doi = {10.1007/978-3-319-61273-7\_10}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/FrancisANHMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Fujioka16, author = {Atsushi Fujioka}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {436--460}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_21}, doi = {10.1007/978-3-319-61273-7\_21}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Fujioka16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/GaltelandG16, author = {Herman Galteland and Kristian Gj{\o}steen}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Malware, Encryption, and Rerandomization - Everything Is Under Attack}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {233--251}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_12}, doi = {10.1007/978-3-319-61273-7\_12}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/GaltelandG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/GaltelandMO16, author = {Herman Galteland and Stig Fr. Mj{\o}lsnes and Ruxandra F. Olimid}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {463--473}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_22}, doi = {10.1007/978-3-319-61273-7\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/GaltelandMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/HaleCG16, author = {Britta Hale and Christopher Carr and Danilo Gligoroski}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {{CARIBE:} Cascaded {IBE} for Maximum Flexibility and User-Side Control}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {389--408}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_19}, doi = {10.1007/978-3-319-61273-7\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/HaleCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Hanaoka16, author = {Goichiro Hanaoka}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Towards User-Friendly Cryptography}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {481--484}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_24}, doi = {10.1007/978-3-319-61273-7\_24}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Hanaoka16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/HanzlikKK16, author = {Lucjan Hanzlik and Kamil Kluczniak and Miroslaw Kutylowski}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Controlled Randomness - {A} Defense Against Backdoors in Cryptographic Devices}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {215--232}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_11}, doi = {10.1007/978-3-319-61273-7\_11}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/HanzlikKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Koblitz16, author = {Neal Koblitz}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Time for a Paradigm Shift in Our Disciplinary Culture?}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {11--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_2}, doi = {10.1007/978-3-319-61273-7\_2}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Koblitz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KuchtaM16, author = {Veronika Kuchta and Olivier Markowitch}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {409--435}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_20}, doi = {10.1007/978-3-319-61273-7\_20}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KuchtaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KulisLZ16, author = {Michal Kulis and Pawel Lorek and Filip Zag{\'{o}}rski}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {145--167}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_8}, doi = {10.1007/978-3-319-61273-7\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KulisLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KutylowskiCHKCW16, author = {Miroslaw Kutylowski and Jacek Cichon and Lucjan Hanzlik and Kamil Kluczniak and Xiaofeng Chen and Jianfeng Wang}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Protecting Electronic Signatures in Case of Key Leakage}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {252--274}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_13}, doi = {10.1007/978-3-319-61273-7\_13}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KutylowskiCHKCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/LaiCCS16, author = {Russell W. F. Lai and Henry K. F. Cheung and Sherman S. M. Chow and Anthony Man{-}Cho So}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Another Look at Anonymous Communication - Security and Modular Constructions}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {56--82}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_4}, doi = {10.1007/978-3-319-61273-7\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/LaiCCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/MenezesS016, author = {Alfred Menezes and Palash Sarkar and Shashank Singh}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Challenges with Assessing the Impact of {NFS} Advances on the Security of Pairing-Based Cryptography}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {83--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_5}, doi = {10.1007/978-3-319-61273-7\_5}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/MenezesS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/MinierP16, author = {Marine Minier and Raphael C.{-}W. Phan}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Tuple Cryptanalysis: Slicing and Fusing Multisets}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {294--320}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_15}, doi = {10.1007/978-3-319-61273-7\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/MinierP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Nishimaki16, author = {Ryo Nishimaki}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Watermarking Cryptographic Programs}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {521--543}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_28}, doi = {10.1007/978-3-319-61273-7\_28}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Nishimaki16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/SamajderS16, author = {Subhabrata Samajder and Palash Sarkar}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {277--293}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_14}, doi = {10.1007/978-3-319-61273-7\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/SamajderS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/SharifianSL16, author = {Setareh Sharifian and Reihaneh Safavi{-}Naini and Fuchun Lin}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {A Virtual Wiretap Channel for Secure Message Transmission}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {171--192}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_9}, doi = {10.1007/978-3-319-61273-7\_9}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/SharifianSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/SlamanigSU16, author = {Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Linking-Based Revocation for Group Signatures: {A} Pragmatic Approach for Efficient Revocation Checks}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {364--388}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_18}, doi = {10.1007/978-3-319-61273-7\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/SlamanigSU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Tiessen16, author = {Tyge Tiessen}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {From Higher-Order Differentials to Polytopic Cryptyanalysis}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {544--552}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_29}, doi = {10.1007/978-3-319-61273-7\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Tiessen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Todo16, author = {Yosuke Todo}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {553--571}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_30}, doi = {10.1007/978-3-319-61273-7\_30}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Todo16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/VolteNM16, author = {Emmanuel Volte and Val{\'{e}}rie Nachef and Nicolas Marri{\`{e}}re}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Improvements of Attacks on Various Feistel Schemes}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {321--344}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_16}, doi = {10.1007/978-3-319-61273-7\_16}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/VolteNM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/ArmknechtA05, author = {Frederik Armknecht and Gw{\'{e}}nol{\'{e}} Ars}, editor = {Ed Dawson and Serge Vaudenay}, title = {Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {16--32}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_3}, doi = {10.1007/11554868\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/ArmknechtA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/AugotFS05, author = {Daniel Augot and Matthieu Finiasz and Nicolas Sendrier}, editor = {Ed Dawson and Serge Vaudenay}, title = {A Family of Fast Syndrome Based Cryptographic Hash Functions}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {64--83}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_6}, doi = {10.1007/11554868\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/AugotFS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/BoydC05, author = {Colin Boyd and Kim{-}Kwang Raymond Choo}, editor = {Ed Dawson and Serge Vaudenay}, title = {Security of Two-Party Identity-Based Key Agreement}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {229--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_17}, doi = {10.1007/11554868\_17}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/BoydC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/ChooBH05, author = {Kim{-}Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock}, editor = {Ed Dawson and Serge Vaudenay}, title = {On Session Key Construction in Provably-Secure Key Establishment Protocols}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {116--131}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_9}, doi = {10.1007/11554868\_9}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/ChooBH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/ChowLHY05, author = {Sherman S. M. Chow and Richard W. C. Lui and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Ed Dawson and Serge Vaudenay}, title = {Identity Based Delegation Network}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {99--115}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_8}, doi = {10.1007/11554868\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/ChowLHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/CietS05, author = {Mathieu Ciet and Francesco Sica}, editor = {Ed Dawson and Serge Vaudenay}, title = {An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {171--182}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_12}, doi = {10.1007/11554868\_12}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/CietS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Gjosteen05, author = {Kristian Gj{\o}steen}, editor = {Ed Dawson and Serge Vaudenay}, title = {Homomorphic Cryptosystems Based on Subgroup Membership Problems}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {314--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_22}, doi = {10.1007/11554868\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Gjosteen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Imai05, author = {Hideki Imai}, editor = {Ed Dawson and Serge Vaudenay}, title = {Trends and Challenges for Securer Cryptography in Practice}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {1}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_1}, doi = {10.1007/11554868\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Imai05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KiayiasY05, author = {Aggelos Kiayias and Moti Yung}, editor = {Ed Dawson and Serge Vaudenay}, title = {Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {151--170}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_11}, doi = {10.1007/11554868\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KiayiasY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KomanoOSK05, author = {Yuichi Komano and Kazuo Ohta and Atsushi Shimbo and Shin{-}ichi Kawamura}, editor = {Ed Dawson and Serge Vaudenay}, title = {On the Security of Probabilistic Multisignature Schemes and Their Optimality}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {132--150}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_10}, doi = {10.1007/11554868\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KomanoOSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KunzliJM05, author = {Simon K{\"{u}}nzli and Pascal Junod and Willi Meier}, editor = {Ed Dawson and Serge Vaudenay}, title = {Distinguishing Attacks on T-Functions}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {2--15}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_2}, doi = {10.1007/11554868\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KunzliJM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/LeeKHSL05, author = {Changhoon Lee and Jongsung Kim and Seokhie Hong and Jaechul Sung and Sangjin Lee}, editor = {Ed Dawson and Serge Vaudenay}, title = {Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {244--262}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_18}, doi = {10.1007/11554868\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/LeeKHSL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/LenstraW05, author = {Arjen K. Lenstra and Benjamin M. M. de Weger}, editor = {Ed Dawson and Serge Vaudenay}, title = {Twin {RSA}}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {222--228}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_16}, doi = {10.1007/11554868\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/LenstraW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/MonneratOV05, author = {Jean Monnerat and Yvonne Anne Oswald and Serge Vaudenay}, editor = {Ed Dawson and Serge Vaudenay}, title = {Optimization of the {MOVA} Undeniable Signature Scheme}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {196--209}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_14}, doi = {10.1007/11554868\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/MonneratOV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/NakaharaFP05, author = {Jorge Nakahara Jr. and Daniel Santana de Freitas and Raphael Chung{-}Wei Phan}, editor = {Ed Dawson and Serge Vaudenay}, title = {New Multiset Attacks on Rijndael with Large Blocks}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {277--295}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_20}, doi = {10.1007/11554868\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/NakaharaFP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Overbeck05, author = {Raphael Overbeck}, editor = {Ed Dawson and Serge Vaudenay}, title = {A New Structural Attack for {GPT} and Variants}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {50--63}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_5}, doi = {10.1007/11554868\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Overbeck05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/PengBD05, author = {Kun Peng and Colin Boyd and Ed Dawson}, editor = {Ed Dawson and Serge Vaudenay}, title = {Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {84--98}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_7}, doi = {10.1007/11554868\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/PengBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Phan05, author = {Raphael Chung{-}Wei Phan}, editor = {Ed Dawson and Serge Vaudenay}, title = {Advanced Slide Attacks Revisited: Realigning Slide on {DES}}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {263--276}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_19}, doi = {10.1007/11554868\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mycrypt/Phan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Schmidt-SamoaT05, author = {Katja Schmidt{-}Samoa and Tsuyoshi Takagi}, editor = {Ed Dawson and Serge Vaudenay}, title = {Paillier's Cryptosystem Modulo p\({}^{\mbox{2}}\)q and Its Applications to Trapdoor Commitment Schemes}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {296--313}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_21}, doi = {10.1007/11554868\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Schmidt-SamoaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/WolfP05, author = {Christopher Wolf and Bart Preneel}, editor = {Ed Dawson and Serge Vaudenay}, title = {Equivalent Keys in HFE, C\({}^{\mbox{*}}\), and Variations}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {33--49}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_4}, doi = {10.1007/11554868\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/WolfP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/YenLMH05, author = {Sung{-}Ming Yen and Wei{-}Chih Lien and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Ed Dawson and Serge Vaudenay}, title = {Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {183--195}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_13}, doi = {10.1007/11554868\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/YenLMH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/YoungY05, author = {Adam L. Young and Moti Yung}, editor = {Ed Dawson and Serge Vaudenay}, title = {Questionable Encryption and Its Applications}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {210--221}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_15}, doi = {10.1007/11554868\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/YoungY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mycrypt/2005, editor = {Ed Dawson and Serge Vaudenay}, title = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868}, doi = {10.1007/11554868}, isbn = {3-540-28938-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.