Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: IACR Cryptology ePrint Archive
    Year: 2011
    Volume: 2011
    DBLP: db/journals/iacr/iacr2011.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 714  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Gilad Asharov, Yehuda Lindell.
    A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Alex Escala, Javier Herranz, Paz Morillo.
    Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Journal article
    Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi.
    Cryptanalysis of improved Yeh
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Suresh Chari, Charanjit S. Jutla, Arnab Roy.
    Universally Composable Security Analysis of OAuth v2.0.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Journal article
    Zijian Zhang, Liehuang Zhu, Lejian Liao.
    Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Journal article
    Peng Xu, Hai Jin.
    SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Swapnoneel Roy, Amlan K. Das, Yu Li.
    Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III.
    Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Journal article
    Debiao He, Jin Hu.
    An efficient certificateless two-party authenticated key agreement scheme from pairings.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Pierrick Gaudry, David R. Kohel, Benjamin A. Smith.
    Counting Points on Genus 2 Curves with Real Multiplication.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Show item 1 to 10 of 714  

    Your query returned 714 matches in the database.