Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
44
search results - page 1 / 9
»
eurocrypt 2006
Sort
relevance
views
votes
recent
update
View
thumb
title
21
click to vote
EUROCRYPT
2006
Springer
84
views
Cryptology
»
more
EUROCRYPT 2006
»
Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry's Crypt
14 years 2 months ago
Download
www.iacr.org
Vanessa Gratzer, David Naccache
claim paper
Read More »
23
click to vote
EUROCRYPT
2006
Springer
110
views
Cryptology
»
more
EUROCRYPT 2006
»
Parallel and Concurrent Security of the HB and HB+ Protocols
14 years 2 months ago
Download
eprint.iacr.org
Jonathan Katz, Ji Sun Shin
claim paper
Read More »
27
click to vote
EUROCRYPT
2006
Springer
111
views
Cryptology
»
more
EUROCRYPT 2006
»
Herding Hash Functions and the Nostradamus Attack
14 years 2 months ago
Download
www.cs.washington.edu
In this paper, we develop a new attack on Damg
John Kelsey, Tadayoshi Kohno
claim paper
Read More »
39
click to vote
EUROCRYPT
2006
Springer
185
views
Cryptology
»
more
EUROCRYPT 2006
»
Practical Identity-Based Encryption Without Random Oracles
14 years 2 months ago
Download
www.iacr.org
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems
Craig Gentry
claim paper
Read More »
35
click to vote
EUROCRYPT
2006
Springer
106
views
Cryptology
»
more
EUROCRYPT 2006
»
Efficient Binary Conversion for Paillier Encrypted Values
14 years 2 months ago
Download
www.win.tue.nl
We consider the framework of secure n-party computation based on threshold homomorphic cryptosystems as put forth by Cramer,
Berry Schoenmakers, Pim Tuyls
claim paper
Read More »
« Prev
« First
page 1 / 9
Last »
Next »