Sign in
Mycrypt
2005
2009
2013
2017
2005
2017
Keyphrases
Publications
volume 10311, 2017
Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers
Mycrypt
10311 (2017)
2016
Rouzbeh Behnia
,
Syh-Yuan Tan
,
Swee-Huay Heng
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme.
Mycrypt
(2016)
Daniel Slamanig
,
Raphael Spreitzer
,
Thomas Unterluggauer
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks.
Mycrypt
(2016)
Marine Minier
,
Raphael C.-W. Phan
Tuple Cryptanalysis: Slicing and Fusing Multisets.
Mycrypt
(2016)
Goichiro Hanaoka
Towards User-Friendly Cryptography.
Mycrypt
(2016)
Herman Galteland
,
Kristian Gjøsteen
Malware, Encryption, and Rerandomization - Everything Is Under Attack.
Mycrypt
(2016)
Xavier Boyen
The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture).
Mycrypt
(2016)
Claude Crépeau
,
Nan Yang
Multi-prover Interactive Proofs: Unsound Foundations.
Mycrypt
(2016)
Subhabrata Samajder
,
Palash Sarkar
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations.
Mycrypt
(2016)
Britta Hale
,
Christopher Carr
,
Danilo Gligoroski
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control.
Mycrypt
(2016)
Nicolas T. Courtois
Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis.
Mycrypt
(2016)
Lucjan Hanzlik
,
Kamil Kluczniak
,
Miroslaw Kutylowski
Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices.
Mycrypt
(2016)
Yosuke Todo
Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree.
Mycrypt
(2016)
Afonso Arriaga
,
Vincenzo Iovino
,
Qiang Tang
Updatable Functional Encryption.
Mycrypt
(2016)
Colin Boyd
,
Xavier Boyen
,
Christopher Carr
,
Thomas Haines
Key Recovery: Inert and Public.
Mycrypt
(2016)
Marc Beunardeau
,
Houda Ferradi
,
Rémi Géraud
,
David Naccache
Honey Encryption for Language - Robbing Shannon to Pay Turing?
Mycrypt
(2016)
Emmanuel Volte
,
Valérie Nachef
,
Nicolas Marrière
Improvements of Attacks on Various Feistel Schemes.
Mycrypt
(2016)
Herman Galteland
,
Stig Fr. Mjølsnes
,
Ruxandra F. Olimid
Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking.
Mycrypt
(2016)
Tyge Tiessen
From Higher-Order Differentials to Polytopic Cryptyanalysis.
Mycrypt
(2016)
Houda Ferradi
,
Rémi Géraud
,
David Naccache
Human Public-Key Encryption.
Mycrypt
(2016)
Miroslaw Kutylowski
,
Jacek Cichon
,
Lucjan Hanzlik
,
Kamil Kluczniak
,
Xiaofeng Chen
,
Jianfeng Wang
Protecting Electronic Signatures in Case of Key Leakage.
Mycrypt
(2016)
Atsushi Fujioka
One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators.
Mycrypt
(2016)
Neal Koblitz
Time for a Paradigm Shift in Our Disciplinary Culture?
Mycrypt
(2016)
Russell W. F. Lai
,
Henry K. F. Cheung
,
Sherman S. M. Chow
,
Anthony Man-Cho So
Another Look at Anonymous Communication - Security and Modular Constructions.
Mycrypt
(2016)
Michal Kulis
,
Pawel Lorek
,
Filip Zagórski
Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators.
Mycrypt
(2016)
Veronika Kuchta
,
Olivier Markowitch
Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices.
Mycrypt
(2016)
Danny Francis
,
Syarifah Ruqayyah Aljunid
,
Takuya Nishida
,
Yu-ichi Hayashi
,
Takaaki Mizuki
,
Hideaki Sone
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions.
Mycrypt
(2016)
Setareh Sharifian
,
Reihaneh Safavi-Naini
,
Fuchun Lin
A Virtual Wiretap Channel for Secure Message Transmission.
Mycrypt
(2016)
Sanjit Chatterjee
,
Neal Koblitz
,
Alfred Menezes
,
Palash Sarkar
Another Look at Tightness II: Practical Issues in Cryptography.
Mycrypt
(2016)
Ryo Nishimaki
Watermarking Cryptographic Programs.
Mycrypt
(2016)
Alfred Menezes
,
Palash Sarkar
,
Shashank Singh
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography.
Mycrypt
(2016)
2005
Jorge Nakahara Jr.
,
Daniel Santana de Freitas
,
Raphael Chung-Wei Phan
New Multiset Attacks on Rijndael with Large Blocks.
Mycrypt
(2005)
Sung-Ming Yen
,
Wei-Chih Lien
,
Sang-Jae Moon
,
JaeCheol Ha
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.
Mycrypt
(2005)
Hideki Imai
Trends and Challenges for Securer Cryptography in Practice.
Mycrypt
(2005)
Raphael Chung-Wei Phan
Advanced Slide Attacks Revisited: Realigning Slide on DES.
Mycrypt
(2005)
Adam L. Young
,
Moti Yung
Questionable Encryption and Its Applications.
Mycrypt
(2005)
Arjen K. Lenstra
,
Benjamin M. M. de Weger
Twin RSA.
Mycrypt
(2005)
Jean Monnerat
,
Yvonne Anne Oswald
,
Serge Vaudenay
Optimization of the MOVA Undeniable Signature Scheme.
Mycrypt
(2005)
Mathieu Ciet
,
Francesco Sica
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm.
Mycrypt
(2005)
Yuichi Komano
,
Kazuo Ohta
,
Atsushi Shimbo
,
Shin-ichi Kawamura
On the Security of Probabilistic Multisignature Schemes and Their Optimality.
Mycrypt
(2005)
Raphael Overbeck
A New Structural Attack for GPT and Variants.
Mycrypt
(2005)
Colin Boyd
,
Kim-Kwang Raymond Choo
Security of Two-Party Identity-Based Key Agreement.
Mycrypt
(2005)
Christopher Wolf
,
Bart Preneel
, and Variations.
Mycrypt
(2005)
Kristian Gjøsteen
Homomorphic Cryptosystems Based on Subgroup Membership Problems.
Mycrypt
(2005)
Sherman S. M. Chow
,
Richard W. C. Lui
,
Lucas Chi Kwong Hui
,
Siu-Ming Yiu
Identity Based Delegation Network.
Mycrypt
(2005)
Aggelos Kiayias
,
Moti Yung
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Mycrypt
(2005)
Frederik Armknecht
,
Gwénolé Ars
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.
Mycrypt
(2005)
Katja Schmidt-Samoa
,
Tsuyoshi Takagi
q and Its Applications to Trapdoor Commitment Schemes.
Mycrypt
(2005)
Changhoon Lee
,
Jongsung Kim
,
Seokhie Hong
,
Jaechul Sung
,
Sangjin Lee
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.
Mycrypt
(2005)
volume 3715, 2005
Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings
Mycrypt
3715 (2005)