Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
44
search results - page 2 / 9
»
eurocrypt 2008
Sort
relevance
views
votes
recent
update
View
thumb
title
32
click to vote
EUROCRYPT
2008
Springer
87
views
Cryptology
»
more
EUROCRYPT 2008
»
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
14 years 18 days ago
Download
www.iacr.org
Lei Wang, Kazuo Ohta, Noboru Kunihiro
claim paper
Read More »
20
click to vote
EUROCRYPT
2008
Springer
101
views
Cryptology
»
more
EUROCRYPT 2008
»
A New Mode of Operation for Block Ciphers and Length-Preserving MACs
14 years 18 days ago
Download
www.iacr.org
Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniy...
claim paper
Read More »
24
click to vote
EUROCRYPT
2008
Springer
73
views
Cryptology
»
more
EUROCRYPT 2008
»
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves
14 years 18 days ago
Download
www.iacr.org
Hao Chen, Ronald Cramer, Robbert de Haan, Ignacio ...
claim paper
Read More »
22
click to vote
EUROCRYPT
2008
Springer
118
views
Cryptology
»
more
EUROCRYPT 2008
»
A Practical Attack on KeeLoq
14 years 18 days ago
Download
www.cosic.esat.kuleuven.be
Sebastiaan Indesteege, Nathan Keller, Orr Dunkelma...
claim paper
Read More »
35
click to vote
EUROCRYPT
2008
Springer
105
views
Cryptology
»
more
EUROCRYPT 2008
»
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
14 years 18 days ago
Download
www.cs.umd.edu
Predicate encryption is a new paradigm for public-key encryption generalizing, among other things, identity-based encryption. In a predicate encryption scheme, secret keys corresp...
Jonathan Katz, Amit Sahai, Brent Waters
claim paper
Read More »
« Prev
« First
page 2 / 9
Last »
Next »