文件名称:EUROCRYPT-2009
介绍说明--下载内容均来自于网络,请自行研究使用
密码学国际顶级会议论文集,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings, cryptography researchers seeking valuable literature
(系统自动生成,下载前可以参看下载内容)
下载文件列表
文件名 | 大小 | 更新时间 |
---|---|---|
EUROCRYPT09\A Double-Piped Mode of Operation for MACs | PRFs and PROs Security beyond the Birthday Barrier .pdf | |
...........\A Leakage-Resilient Mode of Operation .pdf | ||
...........\A New Randomness Extraction Paradigm for Hybrid Encryption .pdf | ||
...........\A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks .pdf | ||
...........\A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks .pdf | ||
...........\Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) .pdf | ||
...........\Asymmetric Group Key Agreement .pdf | ||
...........\back-matter.pdf | ||
...........\Breaking RSA Generically Is Equivalent to Factoring .pdf | ||
...........\Cryptanalysis of MDC-2 .pdf | ||
...........\Cryptanalysis on HMAC NMAC MD5 and MD5 MAC .pdf | ||
...........\Cryptography without (Hardly Any) Secrets .pdf | ||
...........\Cube Attacks on Tweakable Black Box Polynomials .pdf | ||
...........\Double-Base Number System for Multi-scalar Multiplications .pdf | ||
...........\ECM on Graphics Cards .pdf | ||
...........\Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves .pdf | ||
...........\Finding Preimages in Full MD5 Faster Than Exhaustive Search .pdf | ||
...........\front-matter.pdf | ||
...........\Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields .pdf | ||
...........\Key Agreement from Close Secrets over Unsecured Channels.pdf | ||
...........\On Randomizing Hash Functions to Strengthen the Security of Digital Signatures .pdf | ||
...........\On the Portability of Generalized Schnorr Proofs .pdf | ||
...........\On the Security Loss in Cryptographic Reductions .pdf | ||
...........\On the Security of Cryptosystems with Quadratic Decryption The Nicest Cryptanalysis .pdf | ||
...........\On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model .pdf | ||
...........\Optimal Randomness Extraction from a Diffie-Hellman Element .pdf | ||
...........\Order-Preserving Symmetric Encryption .pdf | ||
...........\Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening .pdf | ||
...........\Practical Chosen Ciphertext Secure Encryption from Factoring .pdf | ||
...........\Realizing Hash-and-Sign Signatures under Standard Assumptions .pdf | ||
...........\Resettably Secure Computation .pdf | ||
...........\Salvaging Merkle-Damg_ard for.pdf | ||
...........\Simulation without the Artificial Abort Simplified Proof and Improved Concrete Security for Waters IBE Scheme .pdf | ||
...........\Smashing SQUASH-0 .pdf | ||
...........\Traitors Collaborating in Public Pirates 2.0 .pdf | ||
...........\Verifiable Random Functions from Identity-Based Key Encapsulation .pdf | ||
EUROCRYPT09 |