Pages that link to "Item:Q5458260"
From MaRDI portal
The following pages link to Progress in Cryptology - INDOCRYPT 2006 (Q5458260):
Displayed 31 items.
- Whither Cryptography? (Q5458261) (← links)
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 (Q5458262) (← links)
- Differential and Rectangle Attacks on Reduced-Round SHACAL-1 (Q5458263) (← links)
- Algebraic Attacks on Clock-Controlled Cascade Ciphers (Q5458264) (← links)
- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication (Q5458265) (← links)
- Update on Tiger (Q5458266) (← links)
- RC4-Hash: A New Hash Function Based on RC4 (Q5458267) (← links)
- Security of VSH in the Real World (Q5458268) (← links)
- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols (Q5458269) (← links)
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols (Q5458270) (← links)
- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols (Q5458271) (← links)
- Another Look at “Provable Security”. II (Q5458272) (← links)
- Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions (Q5458274) (← links)
- General Conversion for Obtaining Strongly Existentially Unforgeable Signatures (Q5458276) (← links)
- Conditionally Verifiable Signature (Q5458277) (← links)
- Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission (Q5458278) (← links)
- Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks (Q5458279) (← links)
- Enciphering with Arbitrary Small Finite Domains (Q5458281) (← links)
- Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240 (Q5458282) (← links)
- Symmetric Nonce Respecting Security Model and the MEM Mode of Operation (Q5458283) (← links)
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach (Q5458284) (← links)
- Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function (Q5458285) (← links)
- A Simple and Unified Method of Proving Indistinguishability (Q5458286) (← links)
- Extended Double-Base Number System with Applications to Elliptic Curve Cryptography (Q5458287) (← links)
- CMSS – An Improved Merkle Signature Scheme (Q5458289) (← links)
- Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature (Q5458290) (← links)
- Secure Cryptographic Workflow in the Standard Model (Q5458291) (← links)
- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext (Q5458292) (← links)
- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction (Q5458293) (← links)
- AES Software Implementations on ARM7TDMI (Q5458294) (← links)
- Galois LFSR, Embedded Devices and Side Channel Weaknesses (Q5458295) (← links)