Pages that link to "Item:Q5459065"
From MaRDI portal
The following pages link to Advances in Cryptology – ASIACRYPT 2006 (Q5459065):
Displayed 30 items.
- Finding SHA-1 Characteristics: General Results and Applications (Q5459066) (← links)
- Improved Collision Search for SHA-0 (Q5459067) (← links)
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions (Q5459068) (← links)
- New Guess-and-Determine Attack on the Self-Shrinking Generator (Q5459069) (← links)
- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Q5459070) (← links)
- Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity (Q5459071) (← links)
- Secure Sketch for Biometric Templates (Q5459073) (← links)
- The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography (Q5459074) (← links)
- Extending Scalar Multiplication Using Double Bases (Q5459075) (← links)
- HIBE With Short Public Parameters Without Random Oracle (Q5459076) (← links)
- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys (Q5459077) (← links)
- On the Generic Construction of Identity-Based Signatures with Additional Properties (Q5459078) (← links)
- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator (Q5459079) (← links)
- On the Security of OAEP (Q5459080) (← links)
- Relationship Between Standard Model Plaintext Awareness and Message Hiding (Q5459081) (← links)
- On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms (Q5459082) (← links)
- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption (Q5459083) (← links)
- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants (Q5459084) (← links)
- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding (Q5459085) (← links)
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform (Q5459086) (← links)
- Combining Compression Functions and Block Cipher-Based Hash Functions (Q5459087) (← links)
- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model (Q5459088) (← links)
- A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols (Q5459089) (← links)
- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution (Q5459090) (← links)
- KFC – The Krazy Feistel Cipher (Q5459091) (← links)
- Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions (Q5459092) (← links)
- New Cryptanalytic Results on IDEA (Q5459093) (← links)
- New Approach for Selectively Convertible Undeniable Signature Schemes (Q5459094) (← links)
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures (Q5459095) (← links)
- Analysis of One Popular Group Signature Scheme (Q5459096) (← links)