Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: IACR Cryptology ePrint Archive
    Year: 2009
    Volume: 2009
    DBLP: db/journals/iacr/iacr2009.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 638  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Benjamin Justus, Daniel Loebenberger.
    Differential Addition in generalized Edwards Coordinates.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Arpita Patra, C. Pandu Rangan.
    Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Yu Sasaki, Lei Wang, Kazumaro Aoki.
    Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Berndt M. Gammel, Stefan Mangard.
    On the Duality of Probing and Fault Attacks.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Karthik Chandrashekar Iyer, Aravinda Subramanya.
    Image Encryption by Pixel Property Separation.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Matthias Fitzi, Dominik Raub.
    Tight Bounds for Protocols with Hybrid Security.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel.
    Attacks on the DECT authentication mechanisms.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi.
    Foundations of Non-Malleable Hash and One-Way Functions.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Kirill Morozov, George Savvides.
    Computational Oblivious Transfer and Interactive Hashing.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Gregory M. Zaverucha, Douglas R. Stinson.
    Anonymity in Shared Symmetric Key Primitives.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Show item 1 to 10 of 638  

    Your query returned 638 matches in the database.