skip to main content
Skip header Section
Handbook of Applied CryptographyOctober 1996
Publisher:
  • CRC Press, Inc.
  • Subs. of Times Mirror 2000 Corporate Blvd. NW Boca Raton, FL
  • United States
ISBN:978-0-8493-8523-0
Published:01 October 1996
Pages:
816
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

Cited By

  1. Reddy B and Reddy T (2024). CompactChain: an efficient stateless chain for UTXO-model blockchain, Frontiers of Computer Science: Selected Publications from Chinese Universities, 18:2, Online publication date: 1-Apr-2024.
  2. Fanfakh A, Noura H and Couturier R (2024). Simultaneous encryption and authentication of messages over GPUs, Multimedia Tools and Applications, 83:2, (4757-4789), Online publication date: 1-Jan-2024.
  3. Artuğer F (2024). A novel algorithm based on DNA coding for substitution box generation problem, Neural Computing and Applications, 36:3, (1283-1294), Online publication date: 1-Jan-2024.
  4. ACM
    Fei Y, Zhu H and Yin J (2023). FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT, Formal Aspects of Computing, 35:4, (1-36), Online publication date: 31-Dec-2024.
  5. Liang S, Zeng X, Xiao Z and Sun Z (2023). Binary Sequences With Length n and Nonlinear Complexity Not Less Than n/2, IEEE Transactions on Information Theory, 69:12, (8116-8125), Online publication date: 1-Dec-2023.
  6. Kumar Y and Kumar V (2023). A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications, Wireless Personal Communications: An International Journal, 133:1, (395-452), Online publication date: 1-Nov-2023.
  7. Beguinet H, Chevalier C, Ricosset T and Senet H Formal Verification of a Post-quantum Signal Protocol with Tamarin Verification and Evaluation of Computer and Communication Systems, (105-121)
  8. Sakib S, Amariucai G and Guan Y (2023). ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications, IEEE Transactions on Dependable and Secure Computing, 20:5, (3636-3652), Online publication date: 1-Sep-2023.
  9. Cheval V, Cremers C, Dax A, Hirschi L, Jacomme C and Kremer S Hash gone bad Proceedings of the 32nd USENIX Conference on Security Symposium, (5899-5916)
  10. Palacios S, Ault A, Krogmeier J, Bhargava B and Brinton C (2023). AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts, IEEE Transactions on Dependable and Secure Computing, 20:4, (3269-3286), Online publication date: 1-Jul-2023.
  11. Ogiela M and Ogiela U (2023). Linguistic methods in healthcare application and COVID-19 variants classification, Neural Computing and Applications, 35:19, (13935-13940), Online publication date: 1-Jul-2023.
  12. Baee M, Simpson L, Boyen X, Foo E and Pieprzyk J (2023). ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption, IEEE Transactions on Dependable and Secure Computing, 20:3, (1799-1817), Online publication date: 1-May-2023.
  13. ACM
    Reisinger T, Wagner I and Boiten E (2022). Security and Privacy in Unified Communication, ACM Computing Surveys, 55:3, (1-36), Online publication date: 30-Apr-2023.
  14. ACM
    Hu X, He D, Luo M, Peng C, Feng Q and Huang X (2023). High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU, ACM Transactions on Embedded Computing Systems, 22:2, (1-35), Online publication date: 31-Mar-2023.
  15. ACM
    Mourning C, Chenji H, Hallman-Thrasher A, Kaya S, Abukamail N, Juedes D and Karanth A Reflections of Cybersecurity Workshop for K-12 Teachers Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1, (987-993)
  16. Zhu X, Fu S, Hu H, Wu Q, Liu B and Zhou Z (2023). HCV, Security and Communication Networks, 2023, Online publication date: 1-Jan-2023.
  17. Elsaid S, Alotaibi E and Alsaleh S (2023). A robust hybrid cryptosystem based on DNA and Hyperchaotic for images encryption, Multimedia Tools and Applications, 82:2, (1995-2019), Online publication date: 1-Jan-2023.
  18. ACM
    Junior C, Vanderlei I, Araujo J and Rocha R Evaluation of Open-Source E-Voting Systems Using Helios Voting in Public University Elections Proceedings of the Brazilian Symposium on Multimedia and the Web, (11-18)
  19. Cao Y, Udhayakumar K, Veerakumari K and Rakkiyappan R (2022). Memory sampled data control for switched-type neural networks and its application in image secure communications, Mathematics and Computers in Simulation, 201:C, (564-587), Online publication date: 1-Nov-2022.
  20. Pirayesh J, Giaretta A, Conti M and Keshavarzi P (2022). A PLS-HECC-based device authentication and key agreement scheme for smart home networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 216:C, Online publication date: 24-Oct-2022.
  21. Camtepe S, Duda J, Mahboubi A, Morawiecki P, Nepal S, Pawłowski M and Pieprzyk J (2022). ANS-based compression and encryption with 128-bit security, International Journal of Information Security, 21:5, (1051-1067), Online publication date: 1-Oct-2022.
  22. Ansari O and Amin M (2022). Directional modulation techniques for secure wireless communication: a comprehensive survey, EURASIP Journal on Wireless Communications and Networking, 2022:1, Online publication date: 24-Sep-2022.
  23. ACM
    Mangipudi E and Kate A D-KODE: Distributed Mechanism to Manage a Billion Discrete-log Keys Proceedings of the 4th ACM Conference on Advances in Financial Technologies, (308-325)
  24. Sateesan A, Vliegen J, Daemen J and Mentens N (2022). Hardware-oriented optimization of Bloom filter algorithms and architectures for ultra-high-speed lookups in network applications, Microprocessors & Microsystems, 93:C, Online publication date: 1-Sep-2022.
  25. Zode P and Deshmukh R (2022). Optimization of elliptic curve scalar multiplication using constraint based scheduling, Journal of Parallel and Distributed Computing, 167:C, (232-239), Online publication date: 1-Sep-2022.
  26. ACM
    Natgunanathan I, Praitheeshan P, Gao L, Xiang Y and Pan L (2022). Blockchain-Based Audio Watermarking Technique for Multimedia Copyright Protection in Distribution Networks, ACM Transactions on Multimedia Computing, Communications, and Applications, 18:3, (1-23), Online publication date: 31-Aug-2022.
  27. ACM
    Heßeling C, Keller J and Litzinger S Network Steganography Through Redundancy in Higher-Radix Floating-Point Representations Proceedings of the 17th International Conference on Availability, Reliability and Security, (1-7)
  28. Noura H and Chehab A (2022). Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms, Journal of Information Security and Applications, 68:C, Online publication date: 1-Aug-2022.
  29. Luy E, Karatas Z and Ciftci O (2022). Comment on “An enhanced and secured RSA public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)”, Information Processing Letters, 177:C, Online publication date: 1-Aug-2022.
  30. Noura H, Couturier R, Salman O and Mazouzi K (2022). DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm, The Journal of Supercomputing, 78:12, (14034-14071), Online publication date: 1-Aug-2022.
  31. ACM
    Heßeling C, Keller J and Litzinger S Kleptography in Authentication Protocols: Why is it Still Possible? Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference, (109-110)
  32. Zhang X, Huang C, Gu D, Zhang J, Xue J and Wang H (2022). Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems, Journal of Systems Architecture: the EUROMICRO Journal, 127:C, Online publication date: 1-Jun-2022.
  33. Nabi S, Kumar M, Singh P, Aggarwal N and Kumar K (2022). A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions, Multimedia Systems, 28:3, (939-992), Online publication date: 1-Jun-2022.
  34. ACM
    Hao F and van Oorschot P SoK Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, (697-711)
  35. Carr H, Jenkins C, Moir M, Miraldo V and Silva L Towards Formal Verification of HotStuff-Based Byzantine Fault Tolerant Consensus in Agda NASA Formal Methods, (616-635)
  36. Panda S, Mondal S, Dewri R and Das A (2022). Towards achieving efficient access control of medical data with both forward and backward secrecy, Computer Communications, 189:C, (36-52), Online publication date: 1-May-2022.
  37. Koley S (2022). A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography, Journal of King Saud University - Computer and Information Sciences, 34:3, (636-645), Online publication date: 1-Mar-2022.
  38. Kim H, Kim D, Yi O and Ma L (2022). Convolution Neural Network-Based Sensitive Security Parameter Identification and Analysis, Wireless Communications & Mobile Computing, 2022, Online publication date: 1-Jan-2022.
  39. Alves F, Mateus-Coelho N and Cruz-Cunha M (2022). ChevroCrypto – Cryptography API, Procedia Computer Science, 204:C, (116-122), Online publication date: 1-Jan-2022.
  40. Zamli K, Kader A, Din F and Alhadawi H (2021). Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization, Neural Computing and Applications, 33:23, (16641-16658), Online publication date: 1-Dec-2021.
  41. ACM
    Turan F and Verbauwhede I (2020). Trust in FPGA-accelerated Cloud Computing, ACM Computing Surveys, 53:6, (1-28), Online publication date: 30-Nov-2021.
  42. Neupane K Long-Term Secure Asymmetric Group Key Agreement Innovative Security Solutions for Information Technology and Communications, (296-307)
  43. ACM
    De Feo L, Poettering B and Sorniotti A On the (In)Security of ElGamal in OpenPGP Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (2066-2080)
  44. ACM
    Keller J Multilevel Network Steganography in Fountain Codes European Interdisciplinary Cybersecurity Conference, (72-76)
  45. ACM
    Keller J How to Tweak a Cryptographic Permutation by Direct Manipulation European Interdisciplinary Cybersecurity Conference, (85-86)
  46. Zheng T, Yang Z, Wang C, Li Z, Yuan J and Guan X (2021). Wireless Covert Communications Aided by Distributed Cooperative Jamming Over Slow Fading Channels, IEEE Transactions on Wireless Communications, 20:11, (7026-7039), Online publication date: 1-Nov-2021.
  47. Sun Z, Zeng X, Li C, Zhang Y and Yi L (2021). The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields, IEEE Transactions on Information Theory, 67:11, (7550-7560), Online publication date: 1-Nov-2021.
  48. Li G, Chen W, Zhang B and Lu S (2021). A fine-grained anonymous handover authentication protocol based on consortium blockchain for wireless networks, Journal of Parallel and Distributed Computing, 157:C, (157-167), Online publication date: 1-Nov-2021.
  49. Haouam M, Meraoumia A, Laimeche L and Bendib I (2021). S-DCTNet: Security-oriented biometric feature extraction technique, Multimedia Tools and Applications, 80:28-29, (36059-36091), Online publication date: 1-Nov-2021.
  50. Munilla J, Burmester M and Barco R (2021). An enhanced symmetric-key based 5G-AKA protocol, Computer Networks: The International Journal of Computer and Telecommunications Networking, 198:C, Online publication date: 24-Oct-2021.
  51. Alsahlani A and Popa A (2022). LMAAS-IoT, Journal of Network and Computer Applications, 192:C, Online publication date: 15-Oct-2021.
  52. Olvera-Martinez L, Jimenez-Borgonio T, Frias-Carmona T, Abarca-Rodriguez M, Diaz-Rodriguez C, Cedillo-Hernandez M, Nakano-Miyatake M and Perez-Meana H (2022). First SN P visual cryptographic circuit with astrocyte control of structural plasticity for security applications, Neurocomputing, 457:C, (67-73), Online publication date: 7-Oct-2021.
  53. Isobe T, Ito R and Minematsu K Security Analysis of SFrame Computer Security – ESORICS 2021, (127-146)
  54. Karmakar J, Pathak A, Nandi D and Mandal M (2021). Sparse representation based compressive video encryption using hyper-chaos and DNA coding, Digital Signal Processing, 117:C, Online publication date: 1-Oct-2021.
  55. Aslani M, Shamsollahi M and Nouri A (2021). Improving data protection in BSS based secure communication: mixing matrix design, Wireless Networks, 27:7, (4747-4758), Online publication date: 1-Oct-2021.
  56. Szaban M (2021). Simple method of selecting totalistic rules for pseudorandom number generator based on nonuniform cellular automaton, The Journal of Supercomputing, 77:10, (11215-11227), Online publication date: 1-Oct-2021.
  57. Sharma H, Mishra D, Sharma R and Kumar N (2021). Multi-image steganography and authentication using crypto-stego techniques, Multimedia Tools and Applications, 80:19, (29067-29093), Online publication date: 1-Aug-2021.
  58. ACM
    Picek S and Jakobovic D Evolutionary computation and machine learning in cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1089-1118)
  59. Chang Z, Ezerman M, Fahreza A, Ling S, Szmidt J and Wang H (2021). Binary de Bruijn Sequences via Zech’s Logarithms, SN Computer Science, 2:4, Online publication date: 1-Jul-2021.
  60. Tanaka K, Miyaji A and Jin Y Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems Applied Cryptography and Network Security, (393-414)
  61. Rezazadeh Baee M, Simpson L, Boyen X, Foo E and Pieprzyk J (2021). Authentication strategies in vehicular communications: a taxonomy and framework, EURASIP Journal on Wireless Communications and Networking, 2021:1, Online publication date: 21-May-2021.
  62. ACM
    Agrawal N, Binns R, Van Kleek M, Laine K and Shadbolt N Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, (1-13)
  63. Fan C, Shih Y, Huang J and Chiu W (2021). Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System, IEEE Transactions on Network and Service Management, 18:1, (701-712), Online publication date: 1-Mar-2021.
  64. Boubiche D, Athmani S, Boubiche S and Toral-Cruz H (2021). Cybersecurity Issues in Wireless Sensor Networks: Current Challenges and Solutions, Wireless Personal Communications: An International Journal, 117:1, (177-213), Online publication date: 1-Mar-2021.
  65. Melki R, Noura H, Hernandez Fernandez J and Chehab A (2021). Message authentication algorithm for OFDM communication systems, Telecommunications Systems, 76:3, (403-422), Online publication date: 1-Mar-2021.
  66. Cao Z and Markowitch O (2021). A note on “new quantum key agreement protocols based on Bell states”, Quantum Information Processing, 20:2, Online publication date: 1-Feb-2021.
  67. Koley S (2021). Visual attention model based dual watermarking for simultaneous image copyright protection and authentication, Multimedia Tools and Applications, 80:5, (6755-6783), Online publication date: 1-Feb-2021.
  68. Larriba A, Cerdà i Cucó A, Sempere J and López D (2021). Distributed Trust, a Blockchain Election Scheme, Informatica, 32:2, (321-355), Online publication date: 1-Jan-2021.
  69. Perazzone J, Yu P, Sadler B and Blum R (2021). Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI, IEEE Transactions on Information Forensics and Security, 16, (2173-2185), Online publication date: 1-Jan-2021.
  70. He Q, Xin X and Yang Q (2021). Security analysis and improvement of a quantum multi-signature protocol, Quantum Information Processing, 20:1, Online publication date: 1-Jan-2021.
  71. Morgan A, Pass R and Shi E On the Adaptive Security of MACs and PRFs Advances in Cryptology – ASIACRYPT 2020, (724-753)
  72. Shafique A and Ahmed F (2020). Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain, Wireless Personal Communications: An International Journal, 115:3, (2243-2268), Online publication date: 1-Dec-2020.
  73. ACM
    Humbert M, Trubert B and Huguenin K (2019). A Survey on Interdependent Privacy, ACM Computing Surveys, 52:6, (1-40), Online publication date: 30-Nov-2020.
  74. ACM
    Holtzen S, Van den Broeck G and Millstein T (2020). Scaling exact inference for discrete probabilistic programs, Proceedings of the ACM on Programming Languages, 4:OOPSLA, (1-31), Online publication date: 13-Nov-2020.
  75. ACM
    Jin C, Burleson W, van Dijk M and Rührmair U Erasable PUFs Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security, (21-33)
  76. ACM
    Massimo J and Paterson K A Performant, Misuse-Resistant API for Primality Testing Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, (195-210)
  77. Stefanuk V, Zhozhikashvily A and Savinitch L Intelligent Systems with Restricted Autonomy Artificial Intelligence, (460-471)
  78. Gong X, Hua Q and Jin H Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union Wireless Algorithms, Systems, and Applications, (121-133)
  79. Dang T, Dang K and Küng J (2020). Interaction and Visualization Design for User Privacy Interface on Online Social Networks, SN Computer Science, 1:5, Online publication date: 1-Sep-2020.
  80. Peng K Paid and Anonymous Usage of Cloud Software Information Security Applications, (308-320)
  81. Chen K and Chen J Anonymous End to End Encryption Group Messaging Protocol Based on Asynchronous Ratchet Tree Information and Communications Security, (588-605)
  82. Tiloca M, Dini G, Rizki K and Raza S (2019). Group rekeying based on member join history, International Journal of Information Security, 19:4, (343-381), Online publication date: 1-Aug-2020.
  83. Taranov K, Rothenberger B, Perrig A and Hoefler T sRDMA Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference, (691-704)
  84. ACM
    Picek S and Jakobovic D Evolutionary computation and machine learning in cryptology Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, (1147-1173)
  85. Fairweather E, Wittner R, Chapman M, Holub P and Curcin V Non-repudiable Provenance for Clinical Decision Support Systems Provenance and Annotation of Data and Processes, (165-182)
  86. Hines P A Diagrammatic Approach to Information Flow in Encrypted Communication Graphical Models for Security, (166-185)
  87. Chee Y, Chrisnata J, Etzion T and Kiah H Efficient Algorithm for the Linear Complexity of Sequences and Some Related Consequences 2020 IEEE International Symposium on Information Theory (ISIT), (2897-2902)
  88. Hadj Alouane W and Boujemaa H (2019). Cooperative jamming AF networks via Nakagami‐m fading channels, Transactions on Emerging Telecommunications Technologies, 31:6, Online publication date: 8-Jun-2020.
  89. Xie N, Zhang S and Liu A (2020). Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems, IEEE/ACM Transactions on Networking, 28:3, (1144-1157), Online publication date: 1-Jun-2020.
  90. Delgado-Segura S, Pérez-Solà C, Navarro-Arribas G and Herrera-Joancomartí J (2020). A fair protocol for data trading based on Bitcoin transactions, Future Generation Computer Systems, 107:C, (832-840), Online publication date: 1-Jun-2020.
  91. Sahu H, Pillai N, Gupta I and Sharma R (2020). SMT Solver-Based Cryptanalysis of Block Ciphers, SN Computer Science, 1:3, Online publication date: 1-May-2020.
  92. Kotulski Z, Nowak T, Sepczuk M and Tunia M (2020). 5G networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 171:C, Online publication date: 22-Apr-2020.
  93. Pogue T and Nicolici N (2020). Incremental Fault Analysis: Relaxing the Fault Model of Differential Fault Attacks, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 28:3, (750-763), Online publication date: 1-Mar-2020.
  94. Bera B, Chattaraj D and Das A (2020). Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment, Computer Communications, 153:C, (229-249), Online publication date: 1-Mar-2020.
  95. Haenni R and Locher P Performance of Shuffling: Taking It to the Limits Financial Cryptography and Data Security, (369-385)
  96. Xin X, Wang Z, Yang Q and Li F (2020). Quantum designated verifier signature based on Bell states, Quantum Information Processing, 19:3, Online publication date: 10-Feb-2020.
  97. Hong W, Zhou X, Chen T and Hsieh C (2020). An efficient reversible authentication scheme for demosaiced images with improved detectability, Image Communication, 80:C, Online publication date: 1-Feb-2020.
  98. Rothstein-Morris E, Sun J and Chattopadhyay S Systematic Classification of Attackers via Bounded Model Checking Verification, Model Checking, and Abstract Interpretation, (226-247)
  99. Patel K and Das M Transcript Management Using Blockchain Enabled Smart Contracts Distributed Computing and Internet Technology, (392-407)
  100. Liu H, Gu T, Liu Y, Song J, Zeng Z and Meng W (2020). Fault-Tolerant Privacy-Preserving Data Aggregation for Smart Grid, Wireless Communications & Mobile Computing, 2020, Online publication date: 1-Jan-2020.
  101. Lv N, Chen T, Zhu S, Yang J, Ma Y, Jing J, Lin J and Galdi C (2020). High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators, Security and Communication Networks, 2020, Online publication date: 1-Jan-2020.
  102. Zhu S, Ma Y, Li X, Yang J, Lin J and Jing J (2020). On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data, IEEE Transactions on Information Forensics and Security, 15, (1696-1708), Online publication date: 1-Jan-2020.
  103. Gupta N, Das M and Nandi S LandLedger: Blockchain-powered Land Property Administration System 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), (1-6)
  104. Siddhanti A, Bodapati S, Chattopadhyay A, Maitra S, Roy D and Stănică P Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable Functions Progress in Cryptology – INDOCRYPT 2019, (556-577)
  105. Idalino T, Moura L and Adams C Modification Tolerant Signature Schemes: Location and Correction Progress in Cryptology – INDOCRYPT 2019, (23-44)
  106. Hong C, Jang J, Heo J and Yang H (2019). Quantum digital signature in a network, Quantum Information Processing, 19:1, Online publication date: 6-Dec-2019.
  107. Oonishi K, Huang X and Kunihiro N Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage Information Security and Cryptology – ICISC 2019, (278-296)
  108. ACM
    Qiu P, Wang D, Lyu Y and Qu G VoltJockey Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, (195-209)
  109. ACM
    Ryan K Hardware-Backed Heist Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, (181-194)
  110. Perach B and kvatinsky s (2019). An Asynchronous and Low-Power True Random Number Generator Using STT-MTJ, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27:11, (2473-2484), Online publication date: 1-Nov-2019.
  111. Sturm C, Scalanczi J, Schönig S and Jablonski S (2019). A Blockchain-based and resource-aware process execution engine, Future Generation Computer Systems, 100:C, (19-34), Online publication date: 1-Nov-2019.
  112. Díaz-Sánchez D, Marín-Lopez A, Mendoza F, Cabarcos P and Sherratt R (2019). TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications, IEEE Communications Surveys & Tutorials, 21:4, (3502-3531), Online publication date: 1-Oct-2019.
  113. Lai Y, Hwang J, Jin Z, Kim S, Cho S and Teoh A (2019). Symmetric keyring encryption scheme for biometric cryptosystem, Information Sciences: an International Journal, 502:C, (492-509), Online publication date: 1-Oct-2019.
  114. Bullock M, Gagatsos C, Guha S and Bash B Fundamental Limits of Quantum-Secure Covert Communication over Bosonic Channels 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (56-63)
  115. Le D, Kelkar M and Kate A Flexible Signatures: Making Authentication Suitable for Real-Time Environments Computer Security – ESORICS 2019, (173-193)
  116. Chetry M, Bishoi S and Matyas V (2019). When Lagged Fibonacci Generators jump, Discrete Applied Mathematics, 267:C, (64-72), Online publication date: 31-Aug-2019.
  117. Hong J and Lee H (2019). Solving discrete logarithm problems faster with the aid of pre-computation, Discrete Applied Mathematics, 267:C, (93-119), Online publication date: 31-Aug-2019.
  118. ACM
    Steinebach M, Lutz S and Liu H Privacy and Robust Hashes Proceedings of the 14th International Conference on Availability, Reliability and Security, (1-8)
  119. ACM
    Alashwali E, Szalachowski P and Martin A Does "www." Mean Better Transport Layer Security? Proceedings of the 14th International Conference on Availability, Reliability and Security, (1-7)
  120. Qin L, Lapets A, Jansen F, Flockhart P, Albab K, Globus-Harris I, Roberts S and Varia M From usability to secure computing and back again Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security, (191-210)
  121. Phiri K and Kim H (2019). Linear Secret Sharing Scheme with Reduced Number of Polynomials , Security and Communication Networks, 10.1155/2019/5134534, 2019, (1-16), Online publication date: 4-Aug-2019.
  122. Hu J, Yan S, Shu F and Wang J (2019). Covert Transmission With a Self-Sustained Relay, IEEE Transactions on Wireless Communications, 18:8, (4089-4102), Online publication date: 1-Aug-2019.
  123. Kaminaga M, Suzuki T and Fukase M (2019). Determining the Optimal Random-Padding Size for Rabin Cryptosystems, IEEE Transactions on Information Forensics and Security, 14:8, (2232-2242), Online publication date: 1-Aug-2019.
  124. Liu Z and Pun C (2022). Reversible image reconstruction for reversible data hiding in encrypted images, Signal Processing, 161:C, (50-62), Online publication date: 1-Aug-2019.
  125. Ogiela L and Ogiela U (2019). Cognitive and biologically cryptographic protocols for data security, Cognitive Systems Research, 56:C, (1-6), Online publication date: 1-Aug-2019.
  126. Pérez-Solà C, Delgado-Segura S, Navarro-Arribas G and Herrera-Joancomartí J (2019). Double-spending prevention for Bitcoin zero-confirmation transactions, International Journal of Information Security, 18:4, (451-463), Online publication date: 1-Aug-2019.
  127. Meshram C, Lee C, Meshram S and Li C (2019). An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:16, (6937-6946), Online publication date: 1-Aug-2019.
  128. ACM
    Ryabko B and Fionov A Linear Hash Functions as a Means of Distortion--Rate Optimization in Data Embedding Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, (235-238)
  129. Joy S and Chandran P (2019). A formal framework for verifying IKA property of protocols, Journal of King Saud University - Computer and Information Sciences, 31:3, (318-326), Online publication date: 1-Jul-2019.
  130. Xiao Z, Zeng X, Li C and Jiang Y (2019). Binary sequences with period N and nonlinear complexity N ??2, Cryptography and Communications, 11:4, (735-757), Online publication date: 1-Jul-2019.
  131. Adamoudis M, Draziotis K and Poulakis D Enhancing an Attack to DSA Schemes Algebraic Informatics, (13-25)
  132. Kim H, Cho H and Pyo C (2019). GPU-based acceleration of the Linear Complexity Test for random number generator testing, Journal of Parallel and Distributed Computing, 128:C, (115-125), Online publication date: 1-Jun-2019.
  133. Petrenko K, Mashatan A and Shirazi F (2022). Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization, Journal of Information Security and Applications, 46:C, (151-163), Online publication date: 1-Jun-2019.
  134. ACM
    Marin E, Argones Rúa E, Singelée D and Preneel B On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, (113-122)
  135. Carneiro J and Oliveira L Evaluating Post-quantum Signatures for IoT Devices Green, Pervasive, and Cloud Computing, (104-114)
  136. ACM
    Hussain S, Echeverria M, Singla A, Chowdhury O and Bertino E Insecure connection bootstrapping in cellular networks Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, (1-11)
  137. Ravichandran D, Rajagopalan S, Upadhyay H, Rayappan J and Amirtharajan R (2019). Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA, Journal of Signal Processing Systems, 91:5, (475-501), Online publication date: 1-May-2019.
  138. Chang Z, Ezerman M, Ling S and Wang H (2019). On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials, Designs, Codes and Cryptography, 87:5, (1137-1160), Online publication date: 1-May-2019.
  139. Korzhik V, Cuong N and Morales-Luna G Cipher Modification Against Steganalysis Based on NIST Tests Proceedings of the 24th Conference of Open Innovations Association FRUCT, (179-186)
  140. Karati A and Biswas G (2018). Provably secure and authenticated data sharing protocol for IoT‐based crowdsensing network, Transactions on Emerging Telecommunications Technologies, 30:4, Online publication date: 15-Apr-2019.
  141. Dworak K and Boryczka U Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms Intelligent Information and Database Systems, (275-286)
  142. Jain A and Chaudhari N (2020). An Improved Genetic Algorithm and A New Discrete Cuckoo Algorithm for Solving the Classical Substitution Cipher, International Journal of Applied Metaheuristic Computing, 10:2, (109-130), Online publication date: 1-Apr-2019.
  143. Milanezi Junior J, da Costa J, Römer F, Miranda R, Marinho M and Del Galdo G (2019). M-estimator based Chinese Remainder Theorem with few remainders using a Kroenecker product based mapping vector, Digital Signal Processing, 87:C, (60-74), Online publication date: 1-Apr-2019.
  144. Kumar M, Mohapatra R, Agarwal S, Sathish G and Raw S (2019). A new RGB image encryption using generalized Vigenére-type table over symmetric group associated with virtual planet domain, Multimedia Tools and Applications, 78:8, (10227-10263), Online publication date: 1-Apr-2019.
  145. Som S, Mitra A, Palit S and Chaudhuri B (2019). A selective bitplane image encryption scheme using chaotic maps, Multimedia Tools and Applications, 78:8, (10373-10400), Online publication date: 1-Apr-2019.
  146. ACM
    Zahhafi L and Khadir O Anonymous Secure E-voting over a Network for Multiple Elections Proceedings of the 2nd International Conference on Networking, Information Systems & Security, (1-6)
  147. ACM
    Ezziri S and Khadir O Amelioration of a proxy signature using RSA encryption Proceedings of the 2nd International Conference on Networking, Information Systems & Security, (1-7)
  148. ACM
    Tiloca M, Guglielmo D, Dini G, Anastasi G and Das S (2018). DISH, ACM Transactions on Sensor Networks, 15:1, (1-28), Online publication date: 28-Feb-2019.
  149. Eduardo V, De Bona L and Zola W Speculative encryption on GPU applied to cryptographic file systems Proceedings of the 17th USENIX Conference on File and Storage Technologies, (93-105)
  150. Qi X, Gao R, Liu L and Yang W (2019). An improved fair channel hopping protocol for dynamic environments in cognitive radio networks, Wireless Networks, 25:2, (903-911), Online publication date: 1-Feb-2019.
  151. Cardell S, Fúster-Sabater A and Valverde J (2019). Binomial Representation of Cryptographic Binary Sequences and Its Relation to Cellular Automata, Complexity, 2019, Online publication date: 1-Jan-2019.
  152. Misra S, Tourani R, Natividad F, Mick T, Majd N and Huang H (2019). AccConF, IEEE Transactions on Dependable and Secure Computing, 16:1, (5-17), Online publication date: 1-Jan-2019.
  153. Aziz A and Singh K (2019). Lightweight Security Scheme for Internet of Things, Wireless Personal Communications: An International Journal, 104:2, (577-593), Online publication date: 1-Jan-2019.
  154. Lucia W, Gheitasi K and Ghaderi M A Command Governor Based Approach for Detection of Setpoint Attacks in Constrained Cyber-Physical Systems 2018 IEEE Conference on Decision and Control (CDC), (4529-4534)
  155. Belkhouja T, Mohamed A, Al-Ali A, Du X and Guizani M Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack 2018 IEEE Global Communications Conference (GLOBECOM), (1-5)
  156. Noura M, Noura H, Chehab A, Mansour M, Sleem L and Couturier R (2018). A dynamic approach for a lightweight and secure cipher for medical images, Multimedia Tools and Applications, 77:23, (31397-31426), Online publication date: 1-Dec-2018.
  157. Kumari S, Karuppiah M, Das A, Li X, Wu F and Kumar N (2018). A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers, The Journal of Supercomputing, 74:12, (6428-6453), Online publication date: 1-Dec-2018.
  158. ACM
    Martins P, Sousa L and Mariano A (2017). A Survey on Fully Homomorphic Encryption, ACM Computing Surveys, 50:6, (1-33), Online publication date: 30-Nov-2018.
  159. Schellenberg F, Gnad D, Moradi A and Tahoori M Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (1-7)
  160. Donis-Vela A and Garcia-Escartin J (2018). A quantum primality test with order finding, Quantum Information & Computation, 18:13-14, (1143-1151), Online publication date: 1-Nov-2018.
  161. Anzani M, Haj Seyyed Javadi H and Modirir V (2018). Key-management scheme for wireless sensor networks based on merging blocks of symmetric design, Wireless Networks, 24:8, (2867-2879), Online publication date: 1-Nov-2018.
  162. ACM
    Mundt T, Gladisch A, Rietschel S, Bauer J, Goltz J and Wiedenmann S General Security Considerations of LoRaWAN Version 1.1 Infrastructures Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access, (118-123)
  163. Qureshi M CEASER Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, (775-787)
  164. ACM
    K. K, Rebeiro C and Hazra A (2018). An Algorithmic Approach to Formally Verify an ECC Library, ACM Transactions on Design Automation of Electronic Systems, 23:5, (1-26), Online publication date: 18-Oct-2018.
  165. ACM
    Blank M, Lahbaiel H, Kaebisch S and Kosch H Role models and lifecycles in IoT and their impact on the W3C WoT thing description Proceedings of the 8th International Conference on the Internet of Things, (1-4)
  166. ACM
    Patel S, Persiano G and Yeo K Private Stateful Information Retrieval Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1002-1019)
  167. ACM
    Albrecht M, Massimo J, Paterson K and Somorovsky J Prime and Prejudice Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (281-298)
  168. Ergun S Vulnerability Analysis of a Chaos-Based Random Number Generator 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), (3331-3334)
  169. Kang M, Choi H, Pramanik T, Han S and Moon S (2018). Universal quantum encryption for quantum signature using the swap test, Quantum Information Processing, 17:10, (1-11), Online publication date: 1-Oct-2018.
  170. ACM
    Zhou T, Cai Z, Xiao B, Wang L, Xu M and Chen Y (2018). Location Privacy-Preserving Data Recovery for Mobile Crowdsensing, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2:3, (1-23), Online publication date: 18-Sep-2018.
  171. Gorski P, Iacono L, Wermke D, Stransky C, Moeller S, Acar Y and Fahl S Developers deserve security warnings, too Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, (265-280)
  172. ACM
    Deng L, Shiau J, Lu H and Bowman D (2018). Secure and Fast Encryption (SAFE) with Classical Random Number Generators, ACM Transactions on Mathematical Software, 44:4, (1-17), Online publication date: 9-Aug-2018.
  173. Li , Sun J, Liu Y, Sun M and Dong J (2018). A Formal Specification and Verification Framework for Timed Security Protocols, IEEE Transactions on Software Engineering, 44:8, (725-746), Online publication date: 1-Aug-2018.
  174. Ahmad M, Doja M and Beg M (2018). ABC Optimization Based Construction of Strong Substitution-Boxes, Wireless Personal Communications: An International Journal, 101:3, (1715-1729), Online publication date: 1-Aug-2018.
  175. Shi H, Liu D, Lu H and Zhou C (2018). A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing, Multimedia Tools and Applications, 77:16, (20535-20567), Online publication date: 1-Aug-2018.
  176. Ghouti L (2018). Robust perceptual color image hashing using randomized hypercomplex matrix factorizations, Multimedia Tools and Applications, 77:15, (19895-19929), Online publication date: 1-Aug-2018.
  177. Kumar V, Jangirala S and Ahmad M (2018). An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing, Journal of Medical Systems, 42:8, (1-25), Online publication date: 1-Aug-2018.
  178. Wu C, Fan C, Huang J, Tseng Y and Kikuchi H (2018). Probably Secure Efficient Anonymous Credential Scheme, International Journal of Software Innovation, 6:3, (18-35), Online publication date: 1-Jul-2018.
  179. Hu J, Yan S, Zhou X, Shu F, Li J and Wang J (2018). Covert Communication Achieved by a Greedy Relay in Wireless Networks, IEEE Transactions on Wireless Communications, 17:7, (4766-4779), Online publication date: 1-Jul-2018.
  180. Xie N and Zhang S (2018). Blind Authentication at the Physical Layer Under Time-Varying Fading Channels, IEEE Journal on Selected Areas in Communications, 36:7, (1465-1479), Online publication date: 1-Jul-2018.
  181. Ogiela L and Ogiela M (2018). Towards cognitive service management and semantic information sharing in the Cloud, Multimedia Tools and Applications, 77:14, (18625-18635), Online publication date: 1-Jul-2018.
  182. ACM
    Lapets A, Jansen F, Albab K, Issa R, Qin L, Varia M and Bestavros A Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, (1-5)
  183. Hollmann H, Rietman R, de Hoogh S, Tolhuizen L and Gorissen P A Multi-layer Recursive Residue Number System 2018 IEEE International Symposium on Information Theory (ISIT), (1460-1464)
  184. Xie N and Chen C (2018). Slope Authentication at the Physical Layer, IEEE Transactions on Information Forensics and Security, 13:6, (1579-1594), Online publication date: 1-Jun-2018.
  185. Ogiela M and Ogiela L (2018). Cognitive cryptography techniques for intelligent information management, International Journal of Information Management: The Journal for Information Professionals, 40:C, (21-27), Online publication date: 1-Jun-2018.
  186. Popescu C (2018). A secure and efficient payment protocol based on ElGamal cryptographic algorithms, Electronic Commerce Research, 18:2, (339-358), Online publication date: 1-Jun-2018.
  187. ACM
    Weiser S, Spreitzer R and Bodner L Single Trace Attack Against RSA Key Generation in Intel SGX SSL Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (575-586)
  188. ACM
    Harmouch Y and El Kouch R A chaotic keystream generation for stream cipher Proceedings of the International Conference on Learning and Optimization Algorithms: Theory and Applications, (1-6)
  189. Irshad A, Sher M, Chaudhry S, Kumari S, Sangaiah A, Li X and Wu F (2018). A secure mutual authenticated key agreement of user with multiple servers for critical systems, Multimedia Tools and Applications, 77:9, (11067-11099), Online publication date: 1-May-2018.
  190. Aljawarneh S, Yassein M and Talafha W (2018). A multithreaded programming approach for multimedia big data, Multimedia Tools and Applications, 77:9, (10997-11016), Online publication date: 1-May-2018.
  191. Santos M, Carneiro J, Teixeira F, Franco A, Henriques M and Oliveira L Federated authentication of things Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, (136-137)
  192. Ogiela U, Takizawa M and Ogiela L (2018). Cognitive Approaches for Medicine in Cloud Computing, Journal of Medical Systems, 42:4, (1-5), Online publication date: 1-Apr-2018.
  193. Ahmad M and Ahmad Z (2018). Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption, International Journal of Rough Sets and Data Analysis, 5:2, (131-147), Online publication date: 1-Apr-2018.
  194. ACM
    Mercadier D, Dagand P, Lacassagne L and Muller G Usuba Proceedings of the 2018 4th Workshop on Programming Models for SIMD/Vector Processing, (1-8)
  195. ACM
    Almazrooie M, Abdullah R, Samsudin A and Mutter K Quantum Grover Attack on the Simplified-AES Proceedings of the 2018 7th International Conference on Software and Computer Applications, (204-211)
  196. Zhang Y, Xiang Y, Wang T, Wu W and Shen J (2018). An over-the-air key establishment protocol using keyless cryptography, Future Generation Computer Systems, 79:P1, (284-294), Online publication date: 1-Feb-2018.
  197. Sun D, Mu Y and Susilo W (2018). Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure, Personal and Ubiquitous Computing, 22:1, (55-67), Online publication date: 1-Feb-2018.
  198. Wang Y, Zhao Y, Zhou Q and Lin Z (2018). Image encryption using partitioned cellular automata, Neurocomputing, 275:C, (1318-1332), Online publication date: 31-Jan-2018.
  199. Lara-Nino C, Diaz-Perez A, Morales-Sandoval M and Wang W (2018). Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  200. He D, Zeadally S, Wu L and Wang H (2017). Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography, Computer Networks: The International Journal of Computer and Telecommunications Networking, 128:C, (154-163), Online publication date: 9-Dec-2017.
  201. Wang Y, Pang H, Yang Y and Ding X (2017). Secure server-aided top-k monitoring, Information Sciences: an International Journal, 420:C, (345-363), Online publication date: 1-Dec-2017.
  202. Korzhik V, Starostin V and Akhrameeva K Investigation of Keyless Cryptosystem Proposed by Dean and Goldsmith Proceedings of the 21st Conference of Open Innovations Association FRUCT, (194-201)
  203. Hellaoui H, Koudil M and Bouabdallah A (2017). Energy-efficient mechanisms in security of the internet of things, Computer Networks: The International Journal of Computer and Telecommunications Networking, 127:C, (173-189), Online publication date: 9-Nov-2017.
  204. Yavuz A, Mudgerikar A, Singla A, Papapanagiotou I and Bertino E (2017). Real-Time Digital Signatures for Time-Critical Networks, IEEE Transactions on Information Forensics and Security, 12:11, (2627-2639), Online publication date: 1-Nov-2017.
  205. Alomar N, Alsaleh M and Alarifi A (2017). Someone in Your Contact List: Cued Recall-Based Textual Passwords, IEEE Transactions on Information Forensics and Security, 12:11, (2574-2589), Online publication date: 1-Nov-2017.
  206. Irshad A, Kumari S, Li X, Wu F, Chaudhry S and Arshad H (2017). An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification, Wireless Personal Communications: An International Journal, 97:2, (2145-2166), Online publication date: 1-Nov-2017.
  207. ACM
    Shi E, Chan T, Rieffel E and Song D (2017). Distributed Private Data Analysis, ACM Transactions on Algorithms, 13:4, (1-38), Online publication date: 31-Oct-2017.
  208. ACM
    Bellare M, Jaeger J and Len J Better Than Advertised Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (891-906)
  209. ACM
    Saxena R, Jain M, Singh D and Kushwah A An enhanced parallel version of RSA public key crypto based algorithm using openMP Proceedings of the 10th International Conference on Security of Information and Networks, (37-42)
  210. Wang A, Wang C, Zheng X, Tian W, Xu R and Zhang G (2017). Random key rotation, Computers and Electrical Engineering, 63:C, (220-231), Online publication date: 1-Oct-2017.
  211. Dworak K and Boryczka U Genetic Algorithm as Optimization Tool for Differential Cryptanalysis of DES6 Computational Collective Intelligence, (107-116)
  212. ACM
    Deng Z, Feldman A, Kurtz S and Chong F (2017). Lemonade from Lemons, ACM SIGARCH Computer Architecture News, 45:2, (361-374), Online publication date: 14-Sep-2017.
  213. ACM
    Doychev G and Köpf B (2017). Rigorous analysis of software countermeasures against cache attacks, ACM SIGPLAN Notices, 52:6, (406-421), Online publication date: 14-Sep-2017.
  214. Modiri V, Javadi H and Anzani M (2017). A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design, Wireless Personal Communications: An International Journal, 96:2, (2821-2841), Online publication date: 1-Sep-2017.
  215. Zhang P, Zhang X and Yu J (2017). A Parallel Hash Function with Variable Initial Values, Wireless Personal Communications: An International Journal, 96:2, (2289-2303), Online publication date: 1-Sep-2017.
  216. Gao L, Zhang L and Ma M (2017). Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm, Wireless Personal Communications: An International Journal, 96:1, (683-696), Online publication date: 1-Sep-2017.
  217. Jo H and Park H (2017). Fast prime number generation algorithms on smart mobile devices, Cluster Computing, 20:3, (2167-2175), Online publication date: 1-Sep-2017.
  218. ACM
    Picek S Evolutionary computation and cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1066-1093)
  219. Tiloca M, De Guglielmo D, Dini G, Anastasi G and Das S (2017). JAMMY: A Distributed and Dynamic Solution to Selective Jamming Attack in TDMA WSNs, IEEE Transactions on Dependable and Secure Computing, 14:4, (392-405), Online publication date: 1-Jul-2017.
  220. Rabieh K, Mahmoud M, Akkaya K and Tonyali S (2017). Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters, IEEE Transactions on Dependable and Secure Computing, 14:4, (420-432), Online publication date: 1-Jul-2017.
  221. Grissa M, Hamdaoui B and Yavuza A (2017). Location Privacy in Cognitive Radio Networks: A Survey, IEEE Communications Surveys & Tutorials, 19:3, (1726-1760), Online publication date: 1-Jul-2017.
  222. Koppermann P, De Santis F, Heyszl J and Sigl G (2017). Low-latency X25519 hardware implementation, Microprocessors & Microsystems, 52:C, (491-497), Online publication date: 1-Jul-2017.
  223. Yang E and Wu X Information-theoretically secure key generation and management 2017 IEEE International Symposium on Information Theory (ISIT), (1529-1533)
  224. ACM
    Deng Z, Feldman A, Kurtz S and Chong F Lemonade from Lemons Proceedings of the 44th Annual International Symposium on Computer Architecture, (361-374)
  225. ACM
    Rakshit J and Mohanram K ASSURE Proceedings of the 54th Annual Design Automation Conference 2017, (1-6)
  226. ACM
    Oh S, Yoo H, Jeong D, Bui D and Shin I Mobile Plus Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, (332-344)
  227. ACM
    Doychev G and Köpf B Rigorous analysis of software countermeasures against cache attacks Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, (406-421)
  228. Harsha P (2017). A Novel Micro-Architecture Using a Simplified Logistic Map for Embedded Security, IEEE Embedded Systems Letters, 9:2, (41-44), Online publication date: 1-Jun-2017.
  229. Ahmad M, Khurana S, Singh S and Alsharari H (2017). A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps, 3D Research, 8:2, (1-15), Online publication date: 1-Jun-2017.
  230. Asghar M, Fleury M and Makki S (2017). Interoperable conditional access with video selective encryption for portable devices, Multimedia Tools and Applications, 76:11, (13139-13152), Online publication date: 1-Jun-2017.
  231. Hosseinzadeh Namin P, Muscedere R and Ahmadi M (2017). Digit-Level Serial-In Parallel-Out Multiplier Using Redundant Representation for a Class of Finite Fields, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 25:5, (1632-1643), Online publication date: 1-May-2017.
  232. Hu T, Liu Y, Gong L, Guo S and Yuan H (2017). Chaotic image cryptosystem using DNA deletion and DNA insertion, Signal Processing, 134:C, (234-243), Online publication date: 1-May-2017.
  233. Moldovyan N, Levina A and Taranov S Symmetric Encryption for Error Correction Proceedings of the 20th Conference of Open Innovations Association FRUCT, (290-295)
  234. Moldovyan N, Berezin A, Kornienko A and Moldovyan A Deniable Encryption Protocols Based on Probabilistic Public-Key Encryption Proceedings of the 20th Conference of Open Innovations Association FRUCT, (284-289)
  235. Korzhik V, Fedyanin I and Cuong N Detection of Stegosystems Using Block Ciphers for Encryption of the Embedded Messages Proceedings of the 20th Conference of Open Innovations Association FRUCT, (181-186)
  236. ACM
    Lu J Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, (789-799)
  237. Park Y and Park Y (2017). A Selective Group Authentication Scheme for IoT-Based Medical Information System, Journal of Medical Systems, 41:4, (1-8), Online publication date: 1-Apr-2017.
  238. Singh A and Fhom H (2017). Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection, International Journal of Information Security, 16:2, (195-211), Online publication date: 1-Apr-2017.
  239. Benhamouda F, Bourse F and Lipmaa H CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions Proceedings, Part II, of the 20th IACR International Conference on Public-Key Cryptography --- PKC 2017 - Volume 10175, (36-66)
  240. Swami S and Mohanram K COVERT Proceedings of the Conference on Design, Automation & Test in Europe, (906-909)
  241. Qu Y, Han J, Cockburn B, Pedrycz W, Zhang Y and Zhao W A true random number generator based on parallel STT-MTJs Proceedings of the Conference on Design, Automation & Test in Europe, (606-609)
  242. Garg H and Xiao H New residue arithmetic based Barrett algorithms: Modular polynomial computations 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (1178-1182)
  243. ACM
    Altawy R and Youssef A (2016). Security, Privacy, and Safety Aspects of Civilian Drones, ACM Transactions on Cyber-Physical Systems, 1:2, (1-25), Online publication date: 28-Feb-2017.
  244. Busom N, Petrlic R, Seb F, Sorge C and Valls M (2017). A privacy-preserving reputation system with user rewards, Journal of Network and Computer Applications, 80:C, (58-66), Online publication date: 15-Feb-2017.
  245. Qian J, Qiu F, Wu F, Ruan N, Chen G and Tang S (2017). Privacy-Preserving Selective Aggregation of Online User Behavior Data, IEEE Transactions on Computers, 66:2, (326-338), Online publication date: 1-Feb-2017.
  246. Poettering B and Stebila D (2017). Double-authentication-preventing signatures, International Journal of Information Security, 16:1, (1-22), Online publication date: 1-Feb-2017.
  247. ACM
    Hunter D, Parry J, Radke K and Fidge C Authenticated encryption for time-sensitive critical infrastructure Proceedings of the Australasian Computer Science Week Multiconference, (1-10)
  248. ACM
    Pereñíguez-García F and Abellán J Secure communications in wireless network-on-chips Proceedings of the 2nd International Workshop on Advanced Interconnect Solutions and Technologies for Emerging Computing Systems, (27-32)
  249. Arafin M, Gao M and Qu G VOLtA: Voltage over-scaling based lightweight authentication for IoT applications 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), (336-341)
  250. Londhey A and Das M Efficient Image Authentication Scheme Using Genetic Algorithms 13th International Conference on Distributed Computing and Internet Technology - Volume 10109, (172-180)
  251. Sárközy A (2017). On pseudorandomness of families of binary sequences, Discrete Applied Mathematics, 216:P3, (670-676), Online publication date: 10-Jan-2017.
  252. Qiu L, Li J and Paolotti D (2017). Covering the Monitoring Network, Complexity, 2017, Online publication date: 1-Jan-2017.
  253. Wang L, Du W, Zhang Z and Zhang X (2017). A PTAS for minimum weighted connected vertex cover $$P_3$$P3 problem in 3-dimensional wireless sensor networks, Journal of Combinatorial Optimization, 33:1, (106-122), Online publication date: 1-Jan-2017.
  254. Dravie B, Guillot P and Millérioux G (2017). Security proof of the canonical form of self-synchronizing stream ciphers, Designs, Codes and Cryptography, 82:1-2, (377-388), Online publication date: 1-Jan-2017.
  255. ACM
    Shallue A (2016). Tabulating Pseudoprimes and Tabulating Liars, ACM Transactions on Algorithms, 13:1, (1-14), Online publication date: 21-Dec-2016.
  256. Bash B, Goeckel D and Towsley D (2016). Covert Communication Gains From Adversary’s Ignorance of Transmission Time, IEEE Transactions on Wireless Communications, 15:12, (8394-8405), Online publication date: 1-Dec-2016.
  257. Yildiz K, Buldu A and Saritas H (2016). Elliptic curve coding technique application for digital signature, Security and Communication Networks, 9:17, (4242-4254), Online publication date: 25-Nov-2016.
  258. Santoso K, Lee S, Hwang W and Kwon K (2016). Sector-based DNA information hiding method, Security and Communication Networks, 9:17, (4210-4226), Online publication date: 25-Nov-2016.
  259. Maitra T, Obaidat M, Islam S, Giri D and Amin R (2016). Security analysis and design of an efficient ECC-based two-factor password authentication scheme, Security and Communication Networks, 9:17, (4166-4181), Online publication date: 25-Nov-2016.
  260. ACM
    Lampert B, Wahby R, Leonard S and Levis P Robust, low-cost, auditable random number generation for embedded system security Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, (16-27)
  261. Yao Y, Zhang W and Yu N (2016). Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams, Signal Processing, 128:C, (531-545), Online publication date: 1-Nov-2016.
  262. Čiegis R, StarikoviăźIus V, Tumanova N and Ragulskis M (2016). Application of distributed parallel computing for dynamic visual cryptography, The Journal of Supercomputing, 72:11, (4204-4220), Online publication date: 1-Nov-2016.
  263. Shin S and Jung K (2016). Reversible secret image sharing scheme in encrypted images, Multimedia Tools and Applications, 75:21, (13931-13949), Online publication date: 1-Nov-2016.
  264. Hong D, Kim D, Kwon D and Kim J (2016). Improved preimage attacks on hash modes of 8-round AES-256, Multimedia Tools and Applications, 75:22, (14525-14539), Online publication date: 1-Nov-2016.
  265. ACM
    Samotyja J and Lemke-Rust K Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, (27-35)
  266. Lüy E, Karatas Z and Ergin H (2016). Comment on "An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)", Journal of Information Security and Applications, 30:C, (1-2), Online publication date: 1-Oct-2016.
  267. Oren Y and Wool A (2016). Side-channel cryptographic attacks using pseudo-boolean optimization, Constraints, 21:4, (616-645), Online publication date: 1-Oct-2016.
  268. Biham E, Carmeli Y and Shamir A (2016). Bug Attacks, Journal of Cryptology, 29:4, (775-805), Online publication date: 1-Oct-2016.
  269. Andreeva E, Bouillaguet C, Dunkelman O, Fouque P, Hoch J, Kelsey J, Shamir A and Zimmer S (2016). New Second-Preimage Attacks on Hash Functions, Journal of Cryptology, 29:4, (657-696), Online publication date: 1-Oct-2016.
  270. Balaji S and Rajaram M (2016). SIPTAN, Wireless Personal Communications: An International Journal, 90:2, (679-699), Online publication date: 1-Sep-2016.
  271. Otpuschennikov I, Semenov A, Gribanova I, Zaikin O and Kochemazov S Encoding cryptographic functions to SAT using TRANSALG system Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1594-1595)
  272. Martínez-Herrera A, Mancillas-López C and Mex-Perera C (2016). GCM implementations of Camellia-128 and SMS4 by optimizing the polynomial multiplier, Microprocessors & Microsystems, 45:PA, (129-140), Online publication date: 1-Aug-2016.
  273. Ekodeck S and Ndoundam R (2016). PDF steganography based on Chinese Remainder Theorem, Journal of Information Security and Applications, 29:C, (1-15), Online publication date: 1-Aug-2016.
  274. Zhang H (2016). Insecurity of a certificateless aggregate signature scheme, Security and Communication Networks, 9:11, (1547-1552), Online publication date: 25-Jul-2016.
  275. ACM
    Khalid A, Paul G, Chattopadhyay A, Abediostad F, Din S, Hassan M, Biswas B and Ravi P (2016). RunStream, ACM Transactions on Embedded Computing Systems, 15:3, (1-27), Online publication date: 21-Jul-2016.
  276. ACM
    Picek S Evolutionary Computation and Cryptology Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, (883-909)
  277. ACM
    Sinnhofer A, Oppermann F, Potzmader K, Orthacker C, Steger C and Kreiner C Patterns to establish a secure communication channel Proceedings of the 21st European Conference on Pattern Languages of Programs, (1-21)
  278. Akram R, Markantonakis K and Sauveron D (2016). Recovering from a lost digital wallet, Pervasive and Mobile Computing, 29:C, (113-129), Online publication date: 1-Jul-2016.
  279. Coron J, Naccache D, Tibouchi M and Weinmann R (2016). Practical Cryptanalysis of ISO 9796-2 and EMV Signatures, Journal of Cryptology, 29:3, (632-656), Online publication date: 1-Jul-2016.
  280. ACM
    Carrara B and Adams C A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, (115-126)
  281. ACM
    Swami S, Rakshit J and Mohanram K SECRET Proceedings of the 53rd Annual Design Automation Conference, (1-6)
  282. Cardell S and Fster-Sabater A (2016). Recovering the MSS-sequence via CA, Procedia Computer Science, 80:C, (599-606), Online publication date: 1-Jun-2016.
  283. Yang J and Lin P (2016). A mobile payment mechanism with anonymity for cloud computing, Journal of Systems and Software, 116:C, (69-74), Online publication date: 1-Jun-2016.
  284. ACM
    Kang S, Aung K and Veeravalli B Towards Secure and Fast Mapping of Genomic Sequences on Public Clouds Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, (59-66)
  285. Murugan B, Nanjappa Gounder A and Manohar S (2016). A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata, Security and Communication Networks, 9:7, (634-651), Online publication date: 10-May-2016.
  286. Deebak B, Muthaiah R, Thenmozhi K and Swaminathan P (2016). Analyzing three-party authentication and key agreement protocol for real time IP multimedia server---client systems, Multimedia Tools and Applications, 75:10, (5795-5817), Online publication date: 1-May-2016.
  287. Komar M, Edelev S and Koucheryavy Y Handheld wireless authentication key and secure documents storage for the Internet of Everything Proceedings of the 18th Conference of Open Innovations Association FRUCT, (120-130)
  288. Deng J, Xu C, Wu H and Chen J (2016). Analysis and improvement of a fair remote retrieval protocol for private medical records, Concurrency and Computation: Practice & Experience, 28:6, (1918-1929), Online publication date: 25-Apr-2016.
  289. Subramanya Rao S Three Dimensional Montgomery Ladder, Differential Point Tripling on Montgomery Curves and Point Quintupling on Weierstrass' and Edwards Curves Proceedings of the 8th International Conference on Progress in Cryptology --- AFRICACRYPT 2016 - Volume 9646, (84-106)
  290. Lindell Y (2016). Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries, Journal of Cryptology, 29:2, (456-490), Online publication date: 1-Apr-2016.
  291. ACM
    Abo-alian A, Badr N and Tolba M Authentication as a Service for Cloud Computing Proceedings of the International Conference on Internet of things and Cloud Computing, (1-7)
  292. ACM
    Ramesh D, Mishra R and Nayak B Cha-Cha 20 Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-6)
  293. ACM
    Bhardwaj R Multimedia Security through LSB Matching Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  294. Mohan M and Devi M (2016). Exponential Simplification Using Euler's and Fermat's Theorem, Procedia Computer Science, 78:C, (714-721), Online publication date: 1-Mar-2016.
  295. Chen Z and Shen K OrderMergeDedup Proceedings of the 14th Usenix Conference on File and Storage Technologies, (291-299)
  296. ACM
    Al Mahri H, Simpson L, Bartlett H, Dawson E and Wong K Forgery attacks on ++AE authenticated encryption mode Proceedings of the Australasian Computer Science Week Multiconference, (1-9)
  297. Bianchi T, Bioglio V and Magli E (2016). Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing, IEEE Transactions on Information Forensics and Security, 11:2, (313-327), Online publication date: 1-Feb-2016.
  298. Mehta G, Dutta M and Kim P A Secure Encryption Method for Biometric Templates Based on Chaotic Theory Transactions on Computational Science XXVII - Volume 9570, (120-140)
  299. ACM
    Nadi S and Krüger S Variability Modeling of Cryptographic Components Proceedings of the 10th International Workshop on Variability Modelling of Software-Intensive Systems, (105-112)
  300. Chang C, Cheng T and Hsueh W (2016). A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards, International Journal of Communication Systems, 29:2, (290-306), Online publication date: 25-Jan-2016.
  301. ACM
    Azarderakhsh R and Karabina K Efficient Algorithms and Architectures for Double Point Multiplication on Elliptic Curves Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, (25-30)
  302. Agrawal S, Das M, Mathuria A and Srivastava S Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network Proceedings of the 11th International Conference on Information Systems Security - Volume 9478, (419-440)
  303. ACM
    Scheir M, Balasch J, Rial A, Preneel B and Verbauwhede I (2015). Anonymous Split E-Cash—Toward Mobile Anonymous Payments, ACM Transactions on Embedded Computing Systems, 14:4, (1-25), Online publication date: 8-Dec-2015.
  304. Koziel B, Azarderakhsh R and Mozaffari-Kermani M Low-Resource and Fast Binary Edwards Curves Cryptography Proceedings of the 16th International Conference on Progress in Cryptology -- INDOCRYPT 2015 - Volume 9462, (347-369)
  305. Renugadevi N and Mala C (2015). Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks, Security and Communication Networks, 8:18, (4289-4307), Online publication date: 1-Dec-2015.
  306. Soundra Pandian K and Ray K (2015). Non-singular sequence folding-based pseudorandom key generation algorithm for cryptographic processor, Security and Communication Networks, 8:18, (4019-4027), Online publication date: 1-Dec-2015.
  307. Seo H, Liu Z, Choi J and Kim H (2015). Optimized Karatsuba squaring on 8-bit AVR processors, Security and Communication Networks, 8:18, (3546-3554), Online publication date: 1-Dec-2015.
  308. Arafin M and Qu G RRAM Based Lightweight User Authentication Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, (139-145)
  309. ACM
    Zhao X, Liu Q, Zheng H and Zhao B Towards Graph Watermarks Proceedings of the 2015 ACM on Conference on Online Social Networks, (101-112)
  310. ACM
    Dwivedi S Computing Modular Exponentiation for Fixed-Exponent Proceedings of the 8th Annual ACM India Conference, (89-94)
  311. Singla A, Mudgerikar A, Papapanagiotou I and Yavuz A HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks MILCOM 2015 - 2015 IEEE Military Communications Conference, (1298-1304)
  312. ACM
    Naveed M, Kamara S and Wright C Inference Attacks on Property-Preserving Encrypted Databases Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, (644-655)
  313. Moreno C, Hasan M and Fischmeister S Exp-HE Proceedings of the 12th International Conference on Embedded Software, (157-166)
  314. Hwang J, Choi D, Cho H and Song B (2015). New efficient batch verification for an identity-based signature scheme, Security and Communication Networks, 8:15, (2524-2535), Online publication date: 1-Oct-2015.
  315. Maene P and Verbauwhede I Single-Cycle Implementations of Block Ciphers Revised Selected Papers of the 4th International Workshop on Lightweight Cryptography for Security and Privacy - Volume 9542, (131-147)
  316. Aiash M (2015). A formal analysis of authentication protocols for mobile devices in next generation networks, Concurrency and Computation: Practice & Experience, 27:12, (2938-2953), Online publication date: 25-Aug-2015.
  317. Nakahara J Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher Proceedings of the 4th International Conference on Progress in Cryptology -- LATINCRYPT 2015 - Volume 9230, (170-186)
  318. Xu G, Chen X, Dou Z, Yang Y and Li Z (2015). A novel protocol for multiparty quantum key management, Quantum Information Processing, 14:8, (2959-2980), Online publication date: 1-Aug-2015.
  319. Zezula P (2015). Similarity Searching for the Big Data, Mobile Networks and Applications, 20:4, (487-496), Online publication date: 1-Aug-2015.
  320. Jung-Bin Kim , Jaesung Lim and Cioffi J (2015). Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays, IEEE Transactions on Wireless Communications, 14:7, (3866-3876), Online publication date: 1-Jul-2015.
  321. Tabatabaei S, Ur-Rehman O, Zivic N and Ruland C (2015). Secure and Robust Two-Phase Image Authentication, IEEE Transactions on Multimedia, 17:7, (945-956), Online publication date: 1-Jul-2015.
  322. Kaminaga M, Yoshikawa H and Suzuki T (2015). Double Counting in $2^{t}$ -ary RSA Precomputation Reveals the Secret Exponent, IEEE Transactions on Information Forensics and Security, 10:7, (1394-1401), Online publication date: 1-Jul-2015.
  323. Linke Guo , Chi Zhang and Yuguang Fang (2015). A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks, IEEE Transactions on Dependable and Secure Computing, 12:4, (413-427), Online publication date: 1-Jul-2015.
  324. Kepley S and Steinwandt R (2015). Quantum circuits for $${\mathbb {F}}_{2^{n}}$$F2n-multiplication with subquadratic gate count, Quantum Information Processing, 14:7, (2373-2386), Online publication date: 1-Jul-2015.
  325. Baranowski R, Kochte M and Wunderlich H (2015). Fine-Grained Access Management in Reconfigurable Scan Networks, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34:6, (937-946), Online publication date: 1-Jun-2015.
  326. Yu P, Verma G and Sadler B (2015). Wireless physical layer authentication via fingerprint embedding, IEEE Communications Magazine, 53:6, (48-53), Online publication date: 1-Jun-2015.
  327. ACM
    Chen Q, Hu H and Xu J Authenticated Online Data Integration Services Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (167-181)
  328. ACM
    Sciancalepore S, Capossele A, Piro G, Boggia G and Bianchi G Key Management Protocol with Implicit Certificates for IoT systems Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, (37-42)
  329. Roy S, Junfeng Fan and Verbauwhede I (2015). Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23:5, (810-818), Online publication date: 1-May-2015.
  330. ACM
    Hao F, Yi X, Chen L and Shahandashti S The Fairy-Ring Dance Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, (27-34)
  331. Murillo-Escobar M, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez R and Acosta Del Campo O (2015). A RGB image encryption algorithm based on total plain image characteristics and chaos, Signal Processing, 109:C, (119-131), Online publication date: 1-Apr-2015.
  332. Ogiela L (2015). Advanced techniques for knowledge management and access to strategic information, International Journal of Information Management: The Journal for Information Professionals, 35:2, (154-159), Online publication date: 1-Apr-2015.
  333. Wang L, Zhang X, Zhang Z and Broersma H (2015). A PTAS for the minimum weight connected vertex cover P 3 problem on unit disk graphs, Theoretical Computer Science, 571:C, (58-66), Online publication date: 16-Mar-2015.
  334. Li D, Aung Z, Williams J and Sanchez A (2015). Efficient and fault-diagnosable authentication architecture for AMI in smart grid, Security and Communication Networks, 8:4, (598-616), Online publication date: 10-Mar-2015.
  335. ACM
    Vliegen J, Mentens N and Verbauwhede I (2014). Secure, Remote, Dynamic Reconfiguration of FPGAs, ACM Transactions on Reconfigurable Technology and Systems, 7:4, (1-19), Online publication date: 23-Jan-2015.
  336. ACM
    Martins P and Sousa L Stretching the limits of Programmable Embedded Devices for Public-key Cryptography Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, (19-24)
  337. Taeho Jung , Xiang-Yang Li and Meng Wan (2015). Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel, IEEE Transactions on Dependable and Secure Computing, 12:1, (45-57), Online publication date: 1-Jan-2015.
  338. Ghosal A and DasBit S (2015). A lightweight security scheme for query processing in clustered wireless sensor networks, Computers and Electrical Engineering, 41:C, (240-255), Online publication date: 1-Jan-2015.
  339. Dini G and Lopriore L (2015). Key propagation in wireless sensor networks, Computers and Electrical Engineering, 41:C, (426-433), Online publication date: 1-Jan-2015.
  340. ACM
    Papadopoulos S, Cormode G, Deligiannakis A and Garofalakis M (2014). Lightweight Query Authentication on Streams, ACM Transactions on Database Systems, 39:4, (1-45), Online publication date: 30-Dec-2015.
  341. Zhang Y, Chen X, Li J and Li H (2014). Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 75:PA, (192-211), Online publication date: 24-Dec-2014.
  342. Noura H, Martin S, Al Agha K and Chahine K (2014). ERSS-RLNC, Computer Networks: The International Journal of Computer and Telecommunications Networking, 75:PA, (99-112), Online publication date: 24-Dec-2014.
  343. Błaśkiewicz P, Klonowski M, Kutyłowski M and Syga P Lightweight Protocol for Trusted Spontaneous Communication Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473, (228-242)
  344. Colburn M and Keliher L Linear Cryptanalysis of the PP-1 and PP-2 Block Ciphers Progress in Cryptology -- INDOCRYPT 2014, (107-123)
  345. Yu H and Bai D Boomerang Attack on Step-Reduced SHA-512 Information Security and Cryptology, (329-342)
  346. ACM
    Kim H, Han D, Hong S and Ha J (2014). Message blinding method requiring no multiplicative inversion for RSA, ACM Transactions on Embedded Computing Systems, 13:4, (1-10), Online publication date: 5-Dec-2014.
  347. Millérioux G and Daafouz J (2014). On persistent excitations for the identification of switched linear dynamical systems over finite fields, Automatica (Journal of IFAC), 50:12, (3246-3252), Online publication date: 1-Dec-2014.
  348. Khan W and Gondal M (2014). Key-Dependent Nonlinear Component for Block Cipher Encryption Algorithm, 3D Research, 5:4, (1-8), Online publication date: 1-Dec-2014.
  349. Khan M and Shah T (2014). A Literature Review on Image Encryption Techniques, 3D Research, 5:4, (1-25), Online publication date: 1-Dec-2014.
  350. Aiash M and Loo J (2014). Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR, International Journal of Communication Systems, 27:12, (3600-3618), Online publication date: 1-Dec-2014.
  351. ACM
    Basin D and Cremers C (2014). Know Your Enemy, ACM Transactions on Information and System Security, 17:2, (1-31), Online publication date: 17-Nov-2014.
  352. ACM
    Sagar V and Kumar K A Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN) Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies, (1-5)
  353. Florêncio D, Herley C and Van Oorschot P An administrator's guide to internet password research Proceedings of the 28th USENIX conference on Large Installation System Administration, (35-52)
  354. Zhang J, Su G, Liu Y, Wei L, Yuan F, Bai G and Xu Q On trojan side channel design and identification Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, (278-285)
  355. Kortelainen T and Kortelainen J New Second Preimage Attack Variants against the MD-Structure Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813, (98-110)
  356. Abidin A, Matsuura K and Mitrokotsa A Security of a Privacy-Preserving Biometric Authentication Protocol Revisited Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813, (290-304)
  357. Bloem R, Hofferek G, Könighofer B, Könighofer R, Außerlechner S and Spörk R Synthesis of Synchronization using Uninterpreted Functions Proceedings of the 14th Conference on Formal Methods in Computer-Aided Design, (35-42)
  358. Zenger C, Ambekar A, Winzer F, Pöppelmann T, Schotten H and Paar C Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms Cryptography and Information Security in the Balkans, (103-120)
  359. Hayajneh T, Vasilakos A, Almashaqbeh G, Mohd B, Imran M, Shakir M and Qaraqe K Public-key authentication for cloud-based WBANs Proceedings of the 9th International Conference on Body Area Networks, (286-292)
  360. Bauer A, Jaulmes E, Lomné V, Prouff E and Roche T Side-Channel Attack against RSA Key Generation Algorithms Proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems --- CHES 2014 - Volume 8731, (223-241)
  361. ACM
    Tiloca M Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication Proceedings of the 7th International Conference on Security of Information and Networks, (466-472)
  362. Huang R, Rhee K and Uchida S (2014). A parallel image encryption method based on compressive sensing, Multimedia Tools and Applications, 72:1, (71-93), Online publication date: 1-Sep-2014.
  363. Demmler D, Schneider T and Zohner M Ad-hoc secure two-party computation on mobile devices using hardware tokens Proceedings of the 23rd USENIX conference on Security Symposium, (893-908)
  364. Isaac J and Zeadally S (2014). Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model, Computing, 96:7, (587-611), Online publication date: 1-Jul-2014.
  365. ACM
    Wong W, Kao B, Cheung D, Li R and Yiu S Secure query processing with data interoperability in a cloud database environment Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, (1395-1406)
  366. ACM
    Santoso K, Kwon K, Lee S and Kwon S High capacity data hiding method in DNA with mutation handling Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, (56-63)
  367. ACM
    Van Herrewege A and Verbauwhede I Software Only, Extremely Compact, Keccak-based Secure PRNG on ARM Cortex-M Proceedings of the 51st Annual Design Automation Conference, (1-6)
  368. Hao R, Li B, Ma B and Li X Improved Preimage Attacks against Reduced HAS-160 Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (524-536)
  369. ACM
    Yoon E and Yoo K A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks Proceedings of the 29th Annual ACM Symposium on Applied Computing, (699-705)
  370. ACM
    Tao J, Ma J, Keranen M, Mayo J, Shene C and Wang C RSAvisual Proceedings of the 45th ACM technical symposium on Computer science education, (635-640)
  371. Tounsi W, Cuppens-Boulahia N, Garcia-Alfaro J, Chevalier Y and Cuppens F (2014). KEDGEN2, Journal of Network and Computer Applications, 39:C, (152-166), Online publication date: 1-Mar-2014.
  372. Hsu C and Lin Y (2014). Improved migration for mobile computing in distributed networks, Computer Standards & Interfaces, 36:3, (577-584), Online publication date: 1-Mar-2014.
  373. ACM
    Doss R (2014). Return value adapter pattern, ACM SIGSOFT Software Engineering Notes, 39:1, (1-4), Online publication date: 11-Feb-2014.
  374. Seneviratne J, Parampalli U and Kulik L An authorised pseudonym system for privacy preserving location proof architectures Proceedings of the Twelfth Australasian Information Security Conference - Volume 149, (47-56)
  375. Alhamdan A, Bartlett H, Dawson E, Simpson L and Wong K Weak key-IV pairs in the A5/1 stream cipher Proceedings of the Twelfth Australasian Information Security Conference - Volume 149, (23-36)
  376. Ferreira K, Riesen R, Bridges P, Arnold D and Brightwell R (2014). Accelerating incremental checkpointing for extreme-scale computing, Future Generation Computer Systems, 30:C, (66-77), Online publication date: 1-Jan-2014.
  377. Boriga R, Dăscălescu A and Diaconu A (2014). A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme, Advances in Multimedia, 2014, (6-6), Online publication date: 1-Jan-2014.
  378. ACM
    Anthes G (2014). French team invents faster code-breaking algorithm, Communications of the ACM, 57:1, (21-23), Online publication date: 1-Jan-2014.
  379. Fortino G, Russo W and Vaccaro M (2014). An agent-based approach for the design and analysis of content delivery networks, Journal of Network and Computer Applications, 37, (127-145), Online publication date: 1-Jan-2014.
  380. Fouque P, Tibouchi M and Zapalowicz J Recovering Private Keys Generated with Weak PRNGs Proceedings of the 14th IMA International Conference on Cryptography and Coding - Volume 8308, (158-172)
  381. Seo H, Liu Z, Choi J and Kim H Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors Proceedings of the 14th International Conference on Progress in Cryptology — INDOCRYPT 2013 - Volume 8250, (227-243)
  382. Yau W and Phan R (2013). Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems, Journal of Medical Systems, 37:6, (1-9), Online publication date: 1-Dec-2013.
  383. Hutter M and Schmidt J The Temperature Side Channel and Heating Fault Attacks Smart Card Research and Advanced Applications, (219-235)
  384. ACM
    Hableel E, Byon Y and Beak J Public key infrastructure for UAE Proceedings of the 6th International Conference on Security of Information and Networks, (336-340)
  385. ACM
    Ermiş O, Bahtiyar Ş, Anarım E and Çağlayan M An improved fault-tolerant conference-key agreement protocol with forward secrecy Proceedings of the 6th International Conference on Security of Information and Networks, (306-310)
  386. ACM
    Everts M, Hoepman J and Siljee J UbiKiMa Proceedings of the 2013 ACM workshop on Digital identity management, (19-24)
  387. ACM
    Fan X and Gong G Securing ZigBee smart energy profile 1.x with OpenECC library Proceedings of the first ACM workshop on Smart energy grid security, (17-22)
  388. ACM
    Henry R and Goldberg I Thinking inside the BLAC box Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, (71-82)
  389. ACM
    Asharov G, Lindell Y, Schneider T and Zohner M More efficient oblivious transfer and extensions for faster secure computation Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (535-548)
  390. ACM
    Akinyele J, Green M and Hohenberger S Using SMT solvers to automate design tasks for encryption and signature schemes Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (399-410)
  391. ACM
    Yao A and Zhao Y OAKE Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (1113-1128)
  392. ACM
    Baldimtsi F and Lysyanskaya A Anonymous credentials light Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (1087-1098)
  393. Sree Vivek S, Sharmila Deva Selvi S, Renganathan Venkatesan L and Pandu Rangan C Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round Proceedings of the 7th International Conference on Provable Security - Volume 8209, (38-58)
  394. ACM
    Rolt J, Natale G, Flottes M and Rouzeyre B (2013). A novel differential scan attack on advanced DFT structures, ACM Transactions on Design Automation of Electronic Systems, 18:4, (1-22), Online publication date: 1-Oct-2013.
  395. Wu T and Lin H (2013). Non-Interactive Authenticated Key Agreement over the Mobile Communication Network, Mobile Networks and Applications, 18:5, (594-599), Online publication date: 1-Oct-2013.
  396. Awasthi A and Srivastava K (2013). A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce, Journal of Medical Systems, 37:5, (1-4), Online publication date: 1-Oct-2013.
  397. Cheon J, Kim T and Song Y A Group Action on $${\mathbb Z}_p^{\times }$$ and the Generalized DLP with Auxiliary Inputs Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282, (121-135)
  398. Sasaki Y and Wang L Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282, (493-512)
  399. ACM
    Misra S, Tourani R and Majd N Secure content delivery in information-centric networks Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, (73-78)
  400. Qiu M, Zhang L, Ming Z, Chen Z, Qin X and Yang L (2013). Security-aware optimization for ubiquitous computing systems with SEAT graph approach, Journal of Computer and System Sciences, 79:5, (518-529), Online publication date: 1-Aug-2013.
  401. Mu N and Liao X An approach for designing neural cryptography Proceedings of the 10th international conference on Advances in Neural Networks - Volume Part I, (99-108)
  402. ACM
    Bach E and Sorenson J Approximately counting semismooth integers Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (23-30)
  403. ACM
    Papadopoulos S, Cormode G, Deligiannakis A and Garofalakis M Lightweight authentication of linear algebraic queries on data streams Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, (881-892)
  404. ACM
    Moreno C, Fischmeister S and Hasan M Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems, (77-88)
  405. ACM
    Moreno C, Fischmeister S and Hasan M Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems, (77-88)
  406. ACM
    Yi X, Paulet R, Bertino E and Xu G Private data warehouse queries Proceedings of the 18th ACM symposium on Access control models and technologies, (25-36)
  407. Xiong H, Chen Y, Guan Z and Chen Z (2013). Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys, Information Sciences: an International Journal, 235, (329-340), Online publication date: 1-Jun-2013.
  408. Wang Y and Li R (2013). FPGA based unified architecture for public key and private key cryptosystems, Frontiers of Computer Science: Selected Publications from Chinese Universities, 7:3, (307-316), Online publication date: 1-Jun-2013.
  409. ACM
    Moreno C, Fischmeister S and Hasan M (2013). Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis, ACM SIGPLAN Notices, 48:5, (77-88), Online publication date: 23-May-2013.
  410. ACM
    Ding X, Pang H and Lai J Verifiable and private top-k monitoring Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, (553-558)
  411. Volos C, Kyprianidis I and Stouboulos I (2013). Image encryption process based on chaotic synchronization phenomena, Signal Processing, 93:5, (1328-1340), Online publication date: 1-May-2013.
  412. Chen C, Wang T and Tian J (2013). Improving timing attack on RSA-CRT via error detection and correction strategy, Information Sciences: an International Journal, 232, (464-474), Online publication date: 1-May-2013.
  413. Simplicio M, de Oliveira B, Margi C, Barreto P, Carvalho T and Näslund M (2013). Survey and comparison of message authentication solutions on wireless sensor networks, Ad Hoc Networks, 11:3, (1221-1236), Online publication date: 1-May-2013.
  414. Huang Q, Wong D and Susilo W (2013). The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles, Information Sciences: an International Journal, 228, (222-238), Online publication date: 1-Apr-2013.
  415. Clavier C and Feix B Updated recommendations for blinded exponentiation vs. single trace analysis Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design, (80-98)
  416. Xiong H, Chen Z and Li F (2013). New identity-based three-party authenticated key agreement protocol with provable security, Journal of Network and Computer Applications, 36:2, (927-932), Online publication date: 1-Mar-2013.
  417. Xue W, Pung H and Sen S (2013). Managing context data for diverse operating spaces, Pervasive and Mobile Computing, 9:1, (57-75), Online publication date: 1-Feb-2013.
  418. Chow S, Au M and Susilo W (2013). Server-aided signatures verification secure against collusion attack, Information Security Tech. Report, 17:3, (46-57), Online publication date: 1-Feb-2013.
  419. Wang X, Zhang W, Guo W and Zhang J (2013). Secure chaotic system with application to chaotic ciphers, Information Sciences: an International Journal, 221, (555-570), Online publication date: 1-Feb-2013.
  420. Karimi H, Morteza Hosseini S and Vafaei Jahan M (2013). On the combination of self-organized systems to generate pseudo-random numbers, Information Sciences: an International Journal, 221, (371-388), Online publication date: 1-Feb-2013.
  421. Datta A, Derek A, Mitchell J and Pavlovic D (2013). Secure Protocol Composition, Electronic Notes in Theoretical Computer Science (ENTCS), 83, (201-226), Online publication date: 1-Jan-2013.
  422. Bautista-Ramos C, Guillén-Galván C and Rangel-Huerta A (2013). From orthogonal projections to a generalized quantum search, Quantum Information Processing, 12:1, (1-20), Online publication date: 1-Jan-2013.
  423. Chen H (2013). Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy, Security and Communication Networks, 6:1, (100-107), Online publication date: 1-Jan-2013.
  424. Peyrin T, Sasaki Y and Wang L Generic related-key attacks for HMAC Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security, (580-597)
  425. Sasaki Y, Wang L, Wu S and Wu W Investigating fundamental security requirements on whirlpool Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security, (562-579)
  426. Nikooghadam M and Zakerolhosseini A (2012). Secure Communication of Medical Information Using Mobile Agents, Journal of Medical Systems, 36:6, (3839-3850), Online publication date: 1-Dec-2012.
  427. Koyama T, Sasaki Y and Kunihiro N Multi-differential cryptanalysis on reduced DM-PRESENT-80 Proceedings of the 15th international conference on Information Security and Cryptology, (352-367)
  428. Canard S, Ferreira L and Robshaw M Improved (and practical) public-key authentication for UHF RFID tags Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, (46-61)
  429. Meister D, Kaiser J, Brinkmann A, Cortes T, Kuhn M and Kunkel J A study on data deduplication in HPC storage systems Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, (1-11)
  430. Wang P and Zhang F (2012). Improved Pollard rho method for computing discrete logarithms over finite extension fields, Journal of Computational and Applied Mathematics, 236:17, (4336-4343), Online publication date: 1-Nov-2012.
  431. Huang X, Chu C, Sun H, Zhou J and Deng R (2012). Enhanced authentication for commercial video services, Security and Communication Networks, 5:11, (1248-1259), Online publication date: 1-Nov-2012.
  432. ACM
    Praveen K, Poornachandran P and Ajai A Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (637-641)
  433. ACM
    Chinniah P, Muthusamy N and Ramalingam A A special purpose integer factorization algorithm Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology, (175-181)
  434. ACM
    De Cristofaro E, Faber S, Gasti P and Tsudik G Genodroid Proceedings of the 2012 ACM workshop on Privacy in the electronic society, (97-108)
  435. ACM
    Backes M, Kate A and Mohammadi E Ace Proceedings of the 2012 ACM workshop on Privacy in the electronic society, (55-64)
  436. Kotla R, Rodeheffer T, Roy I, Stuedi P and Wester B Pasture Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation, (321-334)
  437. Kircanski A and Youssef A On the sosemanuk related Key-IV sets Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America, (271-287)
  438. Rebeiro C, Roy S and Mukhopadhyay D Pushing the limits of high-speed GF(2m) elliptic curve scalar multiplication on FPGAs Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems, (494-511)
  439. Ayday E and Fekri F (2012). A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks, Ad Hoc Networks, 10:7, (1278-1290), Online publication date: 1-Sep-2012.
  440. Yavuz A and Ning P (2012). Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks, Ad Hoc Networks, 10:7, (1204-1220), Online publication date: 1-Sep-2012.
  441. Knellwolf S and Khovratovich D New Preimage Attacks against Reduced SHA-1 Proceedings of the 32nd Annual Cryptology Conference on Advances in Cryptology --- CRYPTO 2012 - Volume 7417, (367-383)
  442. Mérai L (2012). Remarks on Pseudorandom Binary Sequences Over Elliptic Curves, Fundamenta Informaticae, 114:3-4, (301-308), Online publication date: 1-Aug-2012.
  443. ACM
    Killourhy K and Maxion R Free vs. transcribed text for keystroke-dynamics evaluations Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results, (1-8)
  444. Omar S, Ouni R and Bouanani S Hashing with elliptic curve L-functions Proceedings of the 4th international conference on Arithmetic of Finite Fields, (196-207)
  445. Nix R, Kantarcioglu M and Han K Approximate privacy-preserving data mining on vertically partitioned data Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy, (129-144)
  446. Wang J, Li X, Chen K and Zhang W Attack based on direct sum decomposition against the nonlinear filter generator Proceedings of the 5th international conference on Cryptology in Africa, (53-66)
  447. Choy J, Yap H, Khoo K, Guo J, Peyrin T, Poschmann A and Tan C SPN-hash Proceedings of the 5th international conference on Cryptology in Africa, (270-286)
  448. Fleischmann E, Forler C and Lucks S The collision security of MDC-4 Proceedings of the 5th international conference on Cryptology in Africa, (252-269)
  449. Sarr A and Elbaz---Vincent P A complementary analysis of the (s)YZ and DIKE protocols Proceedings of the 5th international conference on Cryptology in Africa, (203-220)
  450. Fleischmann E, Forler C, Lucks S and Wenzel J Weimar-DM Proceedings of the 17th Australasian conference on Information Security and Privacy, (152-165)
  451. Hinterwälder G, Paar C and Burleson W Privacy preserving payments on computational RFID devices with application in intelligent transportation systems Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues, (109-122)
  452. ACM
    Yavuz A, Ning P and Reiter M (2012). BAF and FI-BAF, ACM Transactions on Information and System Security, 15:2, (1-28), Online publication date: 1-Jul-2012.
  453. ACM
    Namin A, Wu H and Ahmadi M (2012). An Efficient Finite Field Multiplier Using Redundant Representation, ACM Transactions on Embedded Computing Systems, 11:2, (1-14), Online publication date: 1-Jul-2012.
  454. Wang P and Zhang F (2012). Computing elliptic curve discrete logarithms with the negation map, Information Sciences: an International Journal, 195, (277-286), Online publication date: 1-Jul-2012.
  455. Álvarez Mariño R, Hernández Álvarez F and Hernández Encinas L (2012). A crypto-biometric scheme based on iris-templates with fuzzy extractors, Information Sciences: an International Journal, 195, (91-102), Online publication date: 1-Jul-2012.
  456. Di Martino F and Sessa S (2012). Fragile watermarking tamper detection with images compressed by fuzzy transform, Information Sciences: an International Journal, 195, (62-90), Online publication date: 1-Jul-2012.
  457. Muñiz M and Steinwandt R (2012). Security of message authentication codes in the presence of key-dependent messages, Designs, Codes and Cryptography, 64:1-2, (161-169), Online publication date: 1-Jul-2012.
  458. Marquardt P, Svaba P and Trung T (2012). Pseudorandom number generators based on random covers for finite groups, Designs, Codes and Cryptography, 64:1-2, (209-220), Online publication date: 1-Jul-2012.
  459. Gionta J, Ning P and Zhang X iHTTP Proceedings of the 10th international conference on Applied Cryptography and Network Security, (381-399)
  460. Hao F and Clarke D Security analysis of a multi-factor authenticated key exchange protocol Proceedings of the 10th international conference on Applied Cryptography and Network Security, (1-11)
  461. ACM
    Fahl S, Harbach M, Muders T and Smith M TrustSplit Proceedings of the 23rd ACM conference on Hypertext and social media, (145-154)
  462. Großschädl J, Page D and Tillich S Efficient java implementation of elliptic curve cryptography for J2ME-Enabled mobile devices Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems, (189-207)
  463. De Cristofaro E and Tsudik G Experimenting with fast private set intersection Proceedings of the 5th international conference on Trust and Trustworthy Computing, (55-73)
  464. Su M On the d-ary generalized legendre-sidelnikov sequence Proceedings of the 7th international conference on Sequences and Their Applications, (233-244)
  465. Gao X and Huang Z (2012). Characteristic set algorithms for equation solving in finite fields, Journal of Symbolic Computation, 47:6, (655-679), Online publication date: 1-Jun-2012.
  466. Mantas G, Lymberopoulos D and Komninos N (2012). PKI Security in Large-Scale Healthcare Networks, Journal of Medical Systems, 36:3, (1107-1116), Online publication date: 1-Jun-2012.
  467. Vuillaume C, Endo T and Wooderson P RSA key generation Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (105-119)
  468. Da Rolt J, Das A, Di Natale G, Flottes M, Rouzeyre B and Verbauwhede I A new scan attack on RSA in presence of industrial countermeasures Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (89-104)
  469. Krüger A The schindler-itoh-attack in case of partial information leakage Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design, (199-214)
  470. Eldefrawy M, Khan M, Alghathbar K, Kim T and Elkamchouchi H (2012). Mobile one-time passwords: two-factor authentication using mobile phones, Security and Communication Networks, 5:5, (508-516), Online publication date: 1-May-2012.
  471. ACM
    Bhaskar R, Jaiswal R and Telang S Congestion lower bounds for secure in-network aggregation Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, (197-204)
  472. Sasaki Y Cryptanalyses on a merkle-damgård based MAC -- almost universal forgery and distinguishing-h attacks Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, (411-427)
  473. Álvarez R, Martínez F, Vicent J and Zamora A Cryptographic applications of 3x3 block upper triangular matrices Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II, (97-104)
  474. Li J, Isobe T and Shibutani K Converting meet-in-the-middle preimage attack into pseudo collision attack Proceedings of the 19th international conference on Fast Software Encryption, (264-286)
  475. Wei L, Peyrin T, Sokołowski P, Ling S, Pieprzyk J and Wang H On the (in)security of IDEA in various hashing modes Proceedings of the 19th international conference on Fast Software Encryption, (163-179)
  476. Perin G, Torres L, Benoit P and Maurine P Amplitude demodulation-based EM analysis of different RSA implementations Proceedings of the Conference on Design, Automation and Test in Europe, (1167-1172)
  477. ACM
    Ayday E, Delgosha F and Fekri F (2012). Data authenticity and availability in multihop wireless sensor networks, ACM Transactions on Sensor Networks, 8:2, (1-26), Online publication date: 1-Mar-2012.
  478. Kanso A, Yahyaoui H and Almulla M (2012). Keyed hash function based on a chaotic map, Information Sciences: an International Journal, 186:1, (249-264), Online publication date: 1-Mar-2012.
  479. ACM
    Tao J, Ma J, Keranen M, Mayo J and Shene C ECvisual Proceedings of the 43rd ACM technical symposium on Computer Science Education, (571-576)
  480. ACM
    Jeong H, Kim S and Won D On the security of an novel protocol for downloadable CAS Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, (1-5)
  481. ACM
    Luo J, Bowers K, Oprea A and Xu L (2012). Efficient software implementations of large finite fields GF(2) for secure storage applications, ACM Transactions on Storage, 8:1, (1-27), Online publication date: 1-Feb-2012.
  482. Roh D and Hahn S (2012). The square root Diffie---Hellman problem, Designs, Codes and Cryptography, 62:2, (179-187), Online publication date: 1-Feb-2012.
  483. Radke K, Boyd C, Nieto J and Brereton M Towards a secure human-and-computer mutual authentication protocol Proceedings of the Tenth Australasian Information Security Conference - Volume 125, (39-46)
  484. Berzati A, Canovas-Dumas C and Goubin L Secret key leakage from public key perturbation of DLP-Based cryptosystems Cryptography and Security, (233-247)
  485. e Silva Júnior É, Indrusiak L, Finamore W and Glesner M (2012). A programmable look-up table-based interpolator with nonuniform sampling scheme, International Journal of Reconfigurable Computing, 2012, (6-6), Online publication date: 1-Jan-2012.
  486. ACM
    Cleemput J, Coppens B and De Sutter B (2012). Compiler mitigations for time attacks on modern x86 processors, ACM Transactions on Architecture and Code Optimization, 8:4, (1-20), Online publication date: 1-Jan-2012.
  487. Omar M, Challal Y and Bouabdallah A (2012). Review, Journal of Network and Computer Applications, 35:1, (268-286), Online publication date: 1-Jan-2012.
  488. Clavier C, Feix B, Gagnerot G, Roussellet M and Verneuil V Square always exponentiation Proceedings of the 12th international conference on Cryptology in India, (40-57)
  489. Tan S, Heng S, Phan R and Goi B A variant of schnorr identity-based identification scheme with tight reduction Proceedings of the Third international conference on Future Generation Information Technology, (361-370)
  490. Zou J, Wu W, Wu S, Su B and Dong L Preimage attacks on step-reduced SM3 hash function Proceedings of the 14th international conference on Information Security and Cryptology, (375-390)
  491. Lu Y, Vaudenay S, Meier W, Ding L and Jiang J Synthetic linear analysis Proceedings of the 14th international conference on Information Security and Cryptology, (248-260)
  492. Krämer J, Nedospasov D and Seifert J Weaknesses in current RSA signature schemes Proceedings of the 14th international conference on Information Security and Cryptology, (155-168)
  493. Sasaki Y and Aoki K Improved integral analysis on tweaked lesamnta Proceedings of the 14th international conference on Information Security and Cryptology, (1-17)
  494. Ioannou L and Mosca M A new spin on quantum cryptography Proceedings of the 4th international conference on Post-Quantum Cryptography, (255-274)
  495. ACM
    Zheng P and Huang J Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain Proceedings of the 19th ACM international conference on Multimedia, (413-422)
  496. Koeberl P, Li J, Maes R, Rajan A, Vishik C and Wójcik M Evaluation of a PUF device authentication scheme on a discrete 0.13um SRAM Proceedings of the Third international conference on Trusted Systems, (271-288)
  497. ACM
    Dini G and Savino I (2011). LARK, ACM Transactions on Embedded Computing Systems, 10:4, (1-35), Online publication date: 1-Nov-2011.
  498. Sawada J, Sandon P, Paruthi V, Baumgartner J, Case M and Mony H Hybrid verification of a hardware modular reduction engine Proceedings of the International Conference on Formal Methods in Computer-Aided Design, (207-214)
  499. Xiong H, Wu Q and Chen Z Toward pairing-free certificateless authenticated key exchanges Proceedings of the 14th international conference on Information security, (79-94)
  500. Lupu R, Borcoci E and Rasheed T Identity-Based key derivation method for low delay inter-domain handover re-authentication service Proceedings of the 16th Nordic conference on Information Security Technology for Applications, (162-175)
  501. ACM
    Sonmez Turan M Evolutionary construction of de bruijn sequences Proceedings of the 4th ACM workshop on Security and artificial intelligence, (81-86)
  502. Mishra P, Gupta I and Pillai N Generalized avalanche test for stream cipher analysis Proceedings of the First international conference on Security aspects in information technology, (168-180)
  503. Weng L and Preneel B A secure perceptual hash algorithm for image content authentication Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security, (108-121)
  504. ACM
    Baldi P, Baronio R, De Cristofaro E, Gasti P and Tsudik G Countering GATTACA Proceedings of the 18th ACM conference on Computer and communications security, (691-702)
  505. ACM
    Henry R, Olumofin F and Goldberg I Practical PIR for electronic commerce Proceedings of the 18th ACM conference on Computer and communications security, (677-690)
  506. ACM
    Moradi A, Barenghi A, Kasper T and Paar C On the vulnerability of FPGA bitstream encryption against power analysis attacks Proceedings of the 18th ACM conference on Computer and communications security, (111-124)
  507. Žilka R, Maty$#225;$#353; V and Kyncl L Four authorization protocols for an electronic payment system Proceedings of the 7th international conference on Mathematical and Engineering Methods in Computer Science, (205-214)
  508. Natarajan S and Wolf T Encrypted Packet Forwarding in Virtualized Networks Proceedings of the 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems, (213-214)
  509. ACM
    Al-Hamdani W Elliptic curve for data protection Proceedings of the 2011 Information Security Curriculum Development Conference, (1-14)
  510. ACM
    Ahmad J, Li S, Amer I and Mattavelli M Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, (121-130)
  511. Van Damme G, Luyckx N and Wouters K A PKI-Based mobile banking demonstrator Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications, (147-158)
  512. Yang K, Zhang J, Zhang W and Qiao D A light-weight solution to preservation of access pattern privacy in un-trusted clouds Proceedings of the 16th European conference on Research in computer security, (528-547)
  513. Dudek P, Kurkowski M and Srebrny M Towards parallel direct SAT-based cryptanalysis Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part I, (266-275)
  514. Nasr D, Bahig H and Daoud S Visualizing secure Hash algorithm (SHA-1) on the web Proceedings of the 7th international conference on Active media technology, (101-112)
  515. Abrahamyan S and Kyureghyan M A recurrent method for constructing irreducible polynomials over finite fields Proceedings of the 13th international conference on Computer algebra in scientific computing, (1-9)
  516. Kamil A and Lowe G (2011). Analysing TLS in the strand spaces model, Journal of Computer Security, 19:5, (975-1025), Online publication date: 1-Sep-2011.
  517. Solak E, Rhouma R and Belghith S (2011). Breaking an orbit-based symmetric cryptosystem, Mathematical and Computer Modelling: An International Journal, 54:5-6, (1413-1419), Online publication date: 1-Sep-2011.
  518. Yum D, Kim D, Kim J, Lee P and Hong S Order-Preserving encryption for non-uniformly distributed plaintexts Proceedings of the 12th international conference on Information Security Applications, (84-97)
  519. Ohtahara C, Okada K, Sasaki Y and Shimoyama T Preimage attacks on Full-ARIRANG Proceedings of the 12th international conference on Information Security Applications, (40-54)
  520. Dinh H, Moore C and Russell A McEliece and niederreiter cryptosystems that resist quantum fourier sampling attacks Proceedings of the 31st annual conference on Advances in cryptology, (761-779)
  521. Benaloh J, Jones D, Lazarus E, Lindeman M and Stark P SOBA Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections, (13-13)
  522. Tang Q and Chen L (2011). Extended KCI attack against two-party key establishment protocols, Information Processing Letters, 111:15, (744-747), Online publication date: 1-Aug-2011.
  523. ACM
    Perković T, Li S, Mumtaz A, Khayam S, Javed Y and Čagalj M Breaking undercover Proceedings of the Seventh Symposium on Usable Privacy and Security, (1-15)
  524. Akram R, Markantonakis K and Mayes K Application-binding protocol in the user centric smart card ownership model Proceedings of the 16th Australasian conference on Information security and privacy, (208-225)
  525. El Mrabet N, Guillevic A and Ionica S Efficient multiplication in finite field extensions of degree 5 Proceedings of the 4th international conference on Progress in cryptology in Africa, (188-205)
  526. Hutter M, Joye M and Sierra Y Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation Proceedings of the 4th international conference on Progress in cryptology in Africa, (170-187)
  527. Sasaki Y Collisions of MMO-MD5 and their impact on original MD5 Proceedings of the 4th international conference on Progress in cryptology in Africa, (117-133)
  528. Nose P (2011). Security weaknesses of authenticated key agreement protocols, Information Processing Letters, 111:14, (687-696), Online publication date: 1-Jul-2011.
  529. Dutta R and Dowling T (2011). Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks, Ad Hoc Networks, 9:5, (767-787), Online publication date: 1-Jul-2011.
  530. Delgado-Mohatar O, Fúster-Sabater A and Sierra J (2011). A light-weight authentication scheme for wireless sensor networks, Ad Hoc Networks, 9:5, (727-735), Online publication date: 1-Jul-2011.
  531. Amariucai G, Bergman C and Guan Y An automatic, time-based, secure pairing protocol for passive RFID Proceedings of the 7th international conference on RFID Security and Privacy, (108-126)
  532. Pendl C, Pelnar M and Hutter M Elliptic curve cryptography on the WISP UHF RFID tag Proceedings of the 7th international conference on RFID Security and Privacy, (32-47)
  533. Diaz J, Arroyo D and Rodriguez F An approach for adapting moodle into a secure infrastructure Proceedings of the 4th international conference on Computational intelligence in security for information systems, (214-221)
  534. Peinado A and Ortiz A Cryptanalysis of multicast protocols with key refreshment based on the extended euclidean algorithm Proceedings of the 4th international conference on Computational intelligence in security for information systems, (177-182)
  535. Martínez V, Encinas L and Ávila C Java card implementation of the elliptic curve integrated encryption scheme using prime and binary finite fields Proceedings of the 4th international conference on Computational intelligence in security for information systems, (160-167)
  536. Díaz R, Encinas L and Masqué J A group signature scheme based on the integer factorization and the subgroup discrete logarithm problems Proceedings of the 4th international conference on Computational intelligence in security for information systems, (143-150)
  537. Díaz R, Encinas L and Masqué J A multisignature scheme based on the SDLP and on the IFP Proceedings of the 4th international conference on Computational intelligence in security for information systems, (135-142)
  538. Fúster-Sabater A Structural properties of cryptographic sequences Proceedings of the 4th international conference on Computational intelligence in security for information systems, (127-134)
  539. Nakano Y, Cid C, Fukushima K and Kiyomoto S Analysis of message injection in stream cipher-based hash functions Proceedings of the 9th international conference on Applied cryptography and network security, (498-513)
  540. Kölbl S and Mendel F Practical attacks on the maelstrom-0 compression function Proceedings of the 9th international conference on Applied cryptography and network security, (449-461)
  541. Kwok S, Ee Y, Chew G, Zheng K, Khoo K and Tan C A comparison of post-processing techniques for biased random number generators Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (175-190)
  542. Lee C, Fan C and Lu E (2011). Combined circuit architecture for computing normal basis and Montgomery multiplications over GF(2m), International Journal of Autonomous and Adaptive Communications Systems, 4:3, (291-306), Online publication date: 1-Jun-2011.
  543. Lai J, Kou W and Chen K (2011). Self-generated-certificate public key encryption without pairing and its application, Information Sciences: an International Journal, 181:11, (2422-2435), Online publication date: 1-Jun-2011.
  544. Ozdemir S and Xiao Y (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 55:8, (1735-1746), Online publication date: 1-Jun-2011.
  545. Pan J, Wang L and Ma C Analysis and improvement of an authenticated key exchange protocol Proceedings of the 7th international conference on Information security practice and experience, (417-431)
  546. Wang A, Li Z, Yang X and Yu Y A new security proof of practical cryptographic devices based on hardware, software and protocols Proceedings of the 7th international conference on Information security practice and experience, (386-400)
  547. Nakahara J New impossible differential and known-key distinguishers for the 3D cipher Proceedings of the 7th international conference on Information security practice and experience, (208-221)
  548. Ioannou L and Mosca M Unconditionally-Secure and Reusable Public-Key Authentication Revised Selected Papers of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography - Volume 6745, (121-142)
  549. Lindell Y Highly-efficient universally-composable commitments based on the DDH assumption Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology, (446-466)
  550. ACM
    Güneysu T, Heyse S and Paar C The future of high-speed cryptography Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, (461-466)
  551. ACM
    Chatterjee A and Sengupta I FPGA implementation of binary edwards curve usingternary representation Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, (73-78)
  552. ACM
    Burmester M and Munilla J (2011). Lightweight RFID authentication with forward and backward security, ACM Transactions on Information and System Security, 14:1, (1-26), Online publication date: 1-May-2011.
  553. Yoon E and Yoo K (2011). A secure broadcasting cryptosystem and its application to grid computing, Future Generation Computer Systems, 27:5, (620-626), Online publication date: 1-May-2011.
  554. Phan R (2011). Non-repudiable authentication and billing architecture for wireless mesh networks, Wireless Networks, 17:4, (1055-1061), Online publication date: 1-May-2011.
  555. Boja C, Pocatilu P and Zamfiroiu A Secure SMS communications for M-learning services Proceedings of the 5th European conference on European computing conference, (480-484)
  556. Pham H, Nguyen T, Dang V, Echizen I and Dong T A mutual and pseudo inverse matrix - based authentication mechanism for outsourcing service Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I, (119-128)
  557. Barbosa M, Moss A, Page D, Rodrigues N and Silva P Type checking cryptography implementations Proceedings of the 4th IPM international conference on Fundamentals of Software Engineering, (316-334)
  558. Pazo-Robles M and Fúster-Sabater A Cryptanalytic attack on the self-shrinking sequence generator Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II, (285-294)
  559. Avoine G, Bingöl M, Kardaş S, Lauradoux C and Martin B (2011). A framework for analyzing RFID distance bounding protocols, Journal of Computer Security, 19:2, (289-317), Online publication date: 1-Apr-2011.
  560. Avoine G, Bingöl M, Kardaş S, Lauradoux C and Martin B (2011). A framework for analyzing RFID distance bounding protocols, Journal of Computer Security, 19:2, (289-317), Online publication date: 1-Apr-2011.
  561. ACM
    Anthes G (2011). The quest for randomness, Communications of the ACM, 54:4, (13-15), Online publication date: 1-Apr-2011.
  562. Ben MBarka M, Krief F and Ly O Modeling long-term signature validation for resolution of dispute Proceedings of the 2011 international conference on Theory of Security and Applications, (78-97)
  563. ACM
    Manulis M and Poettering B Practical affiliation-hiding authentication from improved polynomial interpolation Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (286-295)
  564. Halevi S and Krawczyk H One-pass HMQV and asymmetric key-wrapping Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography, (317-334)
  565. Coronado-Garcia L and Perez-Leguizamo C (2011). A mission-critical certification authority architecture for high reliability and response time, International Journal of Critical Computer-Based Systems, 2:1, (6-24), Online publication date: 1-Mar-2011.
  566. ACM
    Liu Y, Wu K and Karri R (2011). Scan-based attacks on linear feedback shift register based stream ciphers, ACM Transactions on Design Automation of Electronic Systems, 16:2, (1-15), Online publication date: 1-Mar-2011.
  567. Roman R, Alcaraz C, Lopez J and Sklavos N (2011). Key management systems for sensor networks in the context of the Internet of Things, Computers and Electrical Engineering, 37:2, (147-159), Online publication date: 1-Mar-2011.
  568. Chen F, Luo T and Zhang X CAFTL Proceedings of the 9th USENIX conference on File and stroage technologies, (6-6)
  569. Fujioka A and Suzuki K Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011, (121-141)
  570. Sasaki Y Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool Proceedings of the 18th international conference on Fast software encryption, (378-396)
  571. Knellwolf S and Meier W Cryptanalysis of the knapsack generator Proceedings of the 18th international conference on Fast software encryption, (188-198)
  572. ACM
    Kumar D, Sahay R, Hegde G and Jena D A novel simple secure internet voting protocol Proceedings of the 2011 International Conference on Communication, Computing & Security, (586-589)
  573. ACM
    Kar J and Majhi B A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique Proceedings of the 2011 International Conference on Communication, Computing & Security, (493-498)
  574. Youssef A (2011). Cryptanalysis of a quadratic knapsack cryptosystem, Computers & Mathematics with Applications, 61:4, (1261-1265), Online publication date: 1-Feb-2011.
  575. Nguyen L and Roscoe A (2011). Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey, Journal of Computer Security, 19:1, (139-201), Online publication date: 1-Jan-2011.
  576. Köpf B and Basin D (2011). Automatically deriving information-theoretic bounds for adaptive side-channel attacks, Journal of Computer Security, 19:1, (1-31), Online publication date: 1-Jan-2011.
  577. Bertino E, Ghinita G and Kamra A (2011). Access Control for Databases, Foundations and Trends in Databases, 3:1–2, (1-148), Online publication date: 1-Jan-2011.
  578. Saha D and Sur-Kolay S (2011). SoC, VLSI Design, 2011, (1-10), Online publication date: 1-Jan-2011.
  579. Bui F and Hatzinakos D (2011). Quality of service regulation in secure body area networks, EURASIP Journal on Wireless Communications and Networking, 2011, (1-14), Online publication date: 1-Jan-2011.
  580. Halder R and Cortesi A A persistent public watermarking of relational databases Proceedings of the 6th international conference on Information systems security, (216-230)
  581. Pan J, Wang L and Ma C Security enhancement and modular treatment towards authenticated key exchange Proceedings of the 12th international conference on Information and communications security, (203-217)
  582. Clavier C, Feix B, Gagnerot G, Roussellet M and Verneuil V Horizontal correlation analysis on exponentiation Proceedings of the 12th international conference on Information and communications security, (46-61)
  583. Huang J and Lai X Measuring random tests by conditional entropy and optimal execution order Proceedings of the Second international conference on Trusted Systems, (148-159)
  584. ACM
    Pöpper C, Basin D, Čapkun S and Cremers C Keeping data secret under full compromise using porter devices Proceedings of the 26th Annual Computer Security Applications Conference, (241-250)
  585. ACM
    Kate A, Zaverucha G and Goldberg I (2010). Pairing-Based Onion Routing with Improved Forward Secrecy, ACM Transactions on Information and System Security, 13:4, (1-32), Online publication date: 1-Dec-2010.
  586. Allam A and Abbas H (2010). On the improvement of neural cryptography using erroneous transmitted information with error prediction, IEEE Transactions on Neural Networks, 21:12, (1915-1924), Online publication date: 1-Dec-2010.
  587. Pareschi F, Setti G and Rovatti R (2010). Implementation and testing of high-speed CMOS true random number generators based on chaotic systems, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 57:12, (3124-3137), Online publication date: 1-Dec-2010.
  588. Iyama T, Kiyomoto S, Fukushima K, Tanaka T and Takagi T Efficient implementation of pairing on BREW mobile phones Proceedings of the 5th international conference on Advances in information and computer security, (326-336)
  589. Elsheh E and Hamza A Comments on matrix-based secret sharing scheme for images Proceedings of the 15th Iberoamerican congress conference on Progress in pattern recognition, image analysis, computer vision, and applications, (169-175)
  590. ACM
    Diesburg S and Wang A (2010). A survey of confidential data storage and deletion methods, ACM Computing Surveys, 43:1, (1-37), Online publication date: 1-Nov-2010.
  591. Saarinen M The PASSERINE public key encryption and authentication mechanism Proceedings of the 15th Nordic conference on Information Security Technology for Applications, (283-288)
  592. ACM
    Weng L and Preneel B A novel video hash algorithm Proceedings of the 18th ACM international conference on Multimedia, (739-742)
  593. Gong Z, Tang Q, Law Y and Chen H KALwEN+ Proceedings of the 6th international conference on Information security and cryptology, (268-283)
  594. Ohtahara C, Sasaki Y and Shimoyama T Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160 Proceedings of the 6th international conference on Information security and cryptology, (169-186)
  595. Kortelainen T, Kortelainen J and Halunen K Variants of multicollision attacks on iterated hash functions Proceedings of the 6th international conference on Information security and cryptology, (139-154)
  596. Fleischmann E, Forler C, Gorski M and Lucks S Collision resistant double-length hashing Proceedings of the 4th international conference on Provable security, (102-118)
  597. Nowak D and Zhang Y A calculus for game-based security proofs Proceedings of the 4th international conference on Provable security, (35-52)
  598. ACM
    van der Leest V, Schrijen G, Handschuh H and Tuyls P Hardware intrinsic security from D flip-flops Proceedings of the fifth ACM workshop on Scalable trusted computing, (53-62)
  599. ACM
    Wurster G and van Oorschot P A control point for reducing root abuse of file-system privileges Proceedings of the 17th ACM conference on Computer and communications security, (224-236)
  600. Li L and Liu R (2010). Securing cluster-based ad hoc networks with distributed authorities, IEEE Transactions on Wireless Communications, 9:10, (3072-3081), Online publication date: 1-Oct-2010.
  601. Mathur S, Reznik A, Ye C, Mukherjee R, Rahman A, Shah Y, Trappe W and Mandayam N (2010). Exploiting the physical layer for enhanced security, IEEE Wireless Communications, 17:5, (63-70), Online publication date: 1-Oct-2010.
  602. Marin-Lopez R, Pereniguez F, Bernal F and Gomez A (2010). Secure three-party key distribution protocol for fast network access in EAP-based wireless networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:15, (2651-2673), Online publication date: 1-Oct-2010.
  603. Simplício M, Barreto P, Margi C and Carvalho T (2010). A survey on key management mechanisms for distributed Wireless Sensor Networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 54:15, (2591-2612), Online publication date: 1-Oct-2010.
  604. ACM
    Nelson S and Kravets R For members only Proceedings of the 5th ACM workshop on Challenged networks, (5-12)
  605. Drogkaris P and Gritzalis S Attaching multiple personal identifiers in X.509 digital certificates Proceedings of the 7th European conference on Public key infrastructures, services and applications, (171-177)
  606. Wolkerstorfer J Secret-sharing hardware improves the privacy of network monitoring Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security, (51-63)
  607. Basin D and Cremers C Modeling and analyzing security in the presence of compromising adversaries Proceedings of the 15th European conference on Research in computer security, (340-356)
  608. ACM
    Oehler M, Phatak D and Krautheim J Visualizing your key for secure phone calls and language independence Proceedings of the Seventh International Symposium on Visualization for Cyber Security, (64-69)
  609. Przydatek B and Wikström D Group message authentication Proceedings of the 7th international conference on Security and cryptography for networks, (399-417)
  610. Sarr A, Elbaz-Vincent P and Bajard J A new security model for authenticated key agreement Proceedings of the 7th international conference on Security and cryptography for networks, (219-234)
  611. Preneel B Cryptography for network security Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security, (36-54)
  612. ACM
    Mesquita D, Perin G, Herrmann F and Martins J An efficient implementation of montgomery powering ladder in reconfigurable hardware Proceedings of the 23rd symposium on Integrated circuits and system design, (121-126)
  613. Papadimitratos P, Luo J and Hubaux J (2010). A randomized countermeasure against parasitic adversaries in wireless sensor networks, IEEE Journal on Selected Areas in Communications, 28:7, (1036-1045), Online publication date: 1-Sep-2010.
  614. Zhu F, Mutka M, Bivalkar A, Demir A, Lu Y and Chidambarm C (2010). Toward secure and private service discovery anywhere anytime, Frontiers of Computer Science in China, 4:3, (311-323), Online publication date: 1-Sep-2010.
  615. Yoon E, Yoo K, Yeo S and Lee C (2010). Robust Deniable Authentication Protocol, Wireless Personal Communications: An International Journal, 55:1, (81-90), Online publication date: 1-Sep-2010.
  616. ACM
    Kounavis M, Kang X, Grewal K, Eszenyi M, Gueron S and Durham D Encrypting the internet Proceedings of the ACM SIGCOMM 2010 conference, (135-146)
  617. Varchola M and Drutarovsky M New high entropy element for FPGA based true random number generators Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (351-365)
  618. Aciiçmez O, Brumley B and Grabher P New results on instruction cache attacks Proceedings of the 12th international conference on Cryptographic hardware and embedded systems, (110-124)
  619. ACM
    Kounavis M, Kang X, Grewal K, Eszenyi M, Gueron S and Durham D (2010). Encrypting the internet, ACM SIGCOMM Computer Communication Review, 40:4, (135-146), Online publication date: 16-Aug-2010.
  620. Lamberger M and Rijmen V Optimal covering codes for finding near-collisions Proceedings of the 17th international conference on Selected areas in cryptography, (187-197)
  621. Mouha N, Velichkov V, De Cannière C and Preneel B The differential analysis of S-functions Proceedings of the 17th international conference on Selected areas in cryptography, (36-56)
  622. Chen J, Shieh M and Lin W (2010). A high-performance unified-field reconfigurable cryptographic processor, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:8, (1145-1158), Online publication date: 1-Aug-2010.
  623. Rizomiliotis P (2010). On the resistance of Boolean functions against algebraic attacks using univariate polynomial representation, IEEE Transactions on Information Theory, 56:8, (4014-4024), Online publication date: 1-Aug-2010.
  624. ACM
    Tai C, Yu P and Chen M k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (473-482)
  625. Soini M, Kukkurainen J and Sydänheimo L Security and performance trade-off in KILAVI wireless sensor network Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I, (306-313)
  626. Henry R, Henry K and Goldberg I Making a nymbler nymble using VERBS Proceedings of the 10th international conference on Privacy enhancing technologies, (111-129)
  627. Chow S, Ma C and Weng J Zero-knowledge argument for simultaneous discrete logarithms Proceedings of the 16th annual international conference on Computing and combinatorics, (520-529)
  628. Li-Ping S, Zheng Q, Hong-Jiang G, Bo L and Huan L (2010). A multi-scale triangular mapping and its applications in variation scale scrambling, International Journal of Computer Applications in Technology, 38:1/2/3, (74-85), Online publication date: 1-Jul-2010.
  629. Chang C and Cui A (2010). Synthesis-for-testability watermarking for field authenticatioil of VLSI intellectual property, IEEE Transactions on Circuits and Systems Part I: Regular Papers, 57:7, (1618-1630), Online publication date: 1-Jul-2010.
  630. Knežević M, Vercauteren F and Verbauwhede I Speeding up bipartite modular multiplication Proceedings of the Third international conference on Arithmetic of finite fields, (166-179)
  631. Ostafe A Pseudorandom vector sequences derived from triangular polynomial systems with constant multipliers Proceedings of the Third international conference on Arithmetic of finite fields, (62-72)
  632. Bernardo D and Hoang D Security analysis of the proposed practical security mechanisms for high speed data transfer protocol Proceedings of the 2010 international conference on Advances in computer science and information technology, (100-114)
  633. ACM
    Drosatos G and Efraimidis P A privacy-preserving protocol for finding the nearest doctor in an emergency Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, (1-8)
  634. Asghar H, Pieprzyk J and Wang H A new human identification protocol and coppersmith's baby-step giant-step algorithm Proceedings of the 8th international conference on Applied cryptography and network security, (349-366)
  635. Gennaro R, Krawczyk H and Rabin T Okamoto-Tanaka revisited Proceedings of the 8th international conference on Applied cryptography and network security, (309-328)
  636. Raeder T, Blanton M, Chawla N and Frikken K Privacy-Preserving network aggregation Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (198-207)
  637. Ratan R Key independent decryption of graphically encrypted images Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics, (88-97)
  638. ACM
    Georgiev I An approach for node identification and key management in sensor grids Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies, (229-234)
  639. Upmanyu M, Namboodiri A, Srinathan K and Jawahar C (2010). Blind authentication, IEEE Transactions on Information Forensics and Security, 5:2, (255-268), Online publication date: 1-Jun-2010.
  640. Cheneau T, Boudguiga A and Laurent M (2010). Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU, Computers and Security, 29:4, (419-431), Online publication date: 1-Jun-2010.
  641. Rossudowski A, Venter H, Eloff J and Kourie D (2010). A security privacy aware architecture and protocol for a single smart card used for multiple services, Computers and Security, 29:4, (393-409), Online publication date: 1-Jun-2010.
  642. Häsel M and Iacono L Security in opensocial-instrumented social networking services Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security, (40-52)
  643. Roschke S, Ibraimi L, Cheng F and Meinel C Secure communication using identity based encryption Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security, (256-267)
  644. Heyse S Low-reiter Proceedings of the Third international conference on Post-Quantum Cryptography, (165-181)
  645. Alioto M, Poli M and Rocchi S (2010). A general power model of differential power analysis attacks to static logic circuits, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:5, (711-724), Online publication date: 1-May-2010.
  646. Maiorana E, Campisi P, Fierrez J, Ortega-Garcia J and Neri A (2010). Cancelable templates for sequence-based biometrics with application to on-line signature recognition, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 40:3, (525-538), Online publication date: 1-May-2010.
  647. Kim S and Cheon J (2010). Parameterized splitting systems for the discrete logarithm, IEEE Transactions on Information Theory, 56:5, (2528-2535), Online publication date: 1-May-2010.
  648. Chen T and Wu C (2010). Compression-unimpaired batch-image encryption combining vector quantization and index compression, Information Sciences: an International Journal, 180:9, (1690-1701), Online publication date: 1-May-2010.
  649. ACM
    Bulusu S, Arazi B, Arel I, Davis A and Bitar G A data security protocol for the Trusted Truck® system Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  650. Courrège J, Feix B and Roussellet M Simple power analysis on exponentiation revisited Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application, (65-79)
  651. Joye M, Naccache D and Porte S The polynomial composition problem in (Z/nZ)[X] Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application, (1-12)
  652. ACM
    Shang N, Paci F and Bertino E Efficient and privacy-preserving enforcement of attribute-based access control Proceedings of the 9th Symposium on Identity and Trust on the Internet, (63-68)
  653. ACM
    Croft J, Patwari N and Kasera S Robust uncorrelated bit extraction methodologies for wireless sensors Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, (70-81)
  654. Novotný M Design and analysis of a generalized canvas protocol Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices, (106-121)
  655. Strenzke F A smart card implementation of the mceliece PKC Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices, (47-59)
  656. Delgado-Mohatar O, Sierra J, Brankovic L and Fúster-Sabater A An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices, (332-339)
  657. Maiorana E (2010). Biometric cryptosystem using function based on-line signature recognition, Expert Systems with Applications: An International Journal, 37:4, (3454-3461), Online publication date: 1-Apr-2010.
  658. Centenaro M and Focardi R Match it or die Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security, (130-145)
  659. ACM
    Dube P, Zhang L, Daly D and Bivens A (2010). Performance of large low-associativity caches, ACM SIGMETRICS Performance Evaluation Review, 37:4, (11-18), Online publication date: 27-Mar-2010.
  660. Chi H and Cao Y Generating parallel random sequences via parameterizing EICGs for heterogeneous computing environments Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV, (409-417)
  661. Fuster-Sabater A, Delgado-Mohatar O and Brankovic L On the linearity of cryptographic sequence generators Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II, (586-596)
  662. Zhang P, Jiang Y, Lin C, Fan Y and Shen X P-coding Proceedings of the 29th conference on Information communications, (2249-2257)
  663. Kulseng L, Yu Z, Wei Y and Guan Y Lightweight mutual authentication and ownership transfer for RFID systems Proceedings of the 29th conference on Information communications, (251-255)
  664. Pellegrini A, Bertacco V and Austin T Fault-based attack of RSA authentication Proceedings of the Conference on Design, Automation and Test in Europe, (855-860)
  665. Drakakis K, Requena V and McGuire G (2010). On the nonlinearity of exponential welch costas functions, IEEE Transactions on Information Theory, 56:3, (1230-1238), Online publication date: 1-Mar-2010.
  666. Zhu G, Huang J, Kwong S and Yang J (2010). Fragility analysis of adaptive quantization-based image hashing, IEEE Transactions on Information Forensics and Security, 5:1, (133-147), Online publication date: 1-Mar-2010.
  667. Bui F, Martin K, Lu H, Plataniotis K and Hatzinakos D (2010). Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (BE) applications, IEEE Transactions on Information Forensics and Security, 5:1, (118-132), Online publication date: 1-Mar-2010.
  668. Wang G (2010). An abuse-free fair contract-signing protocol based on the RSA signature, IEEE Transactions on Information Forensics and Security, 5:1, (158-168), Online publication date: 1-Mar-2010.
  669. Maitra S and Sarkar S Efficient CRT-RSA decryption for small encryption exponents Proceedings of the 2010 international conference on Topics in Cryptology, (26-40)
  670. Vishwanath B, Naidu H, Thanushkodi K, Pandey M and Vasanth G The novel application of artificial neural networks for a reliable secure wireless multicast routing in mobile ad-hock networks Proceedings of the 12th international conference on Networking, VLSI and signal processing, (54-62)
  671. Boja C, Batagan L, Doinea M and Zamfiroiu A Secure Bluetooth services in an m-learning environment Proceedings of the 9th WSEAS international conference on Software engineering, parallel and distributed systems, (144-150)
  672. Reyhanitabar M, Susilo W and Mu Y Enhanced security notions for dedicated-key hash functions Proceedings of the 17th international conference on Fast software encryption, (192-211)
  673. Wang L and Sasaki Y Finding preimages of tiger up to 23 steps Proceedings of the 17th international conference on Fast software encryption, (116-133)
  674. Rønjom S and Cid C Nonlinear equivalence of stream ciphers Proceedings of the 17th international conference on Fast software encryption, (40-54)
  675. Fechner B and Osterloh A (2010). A meta-level true random number generator, International Journal of Critical Computer-Based Systems, 1:1/2/3, (267-279), Online publication date: 1-Feb-2010.
  676. ACM
    Hefeeda M and Mokhtarian K (2010). Authentication schemes for multimedia streams, ACM Transactions on Multimedia Computing, Communications, and Applications, 6:1, (1-24), Online publication date: 1-Feb-2010.
  677. Garcia J An algorithm to fill out a bloc with pseudorandom binary data Proceedings of the 4th WSEAS international conference on Computer engineering and applications, (127-130)
  678. Rabadi N Anonymous group implicit certificate scheme Proceedings of the 7th IEEE conference on Consumer communications and networking conference, (329-330)
  679. Bhattacherjee S and Das A Parallelization of the Lanczos algorithm on multi-core platforms Proceedings of the 11th international conference on Distributed computing and networking, (231-241)
  680. Cachin C State machine replication with byzantine faults Replication, (169-184)
  681. Furukawa J, Mori K and Sako K An implementation of a mix-net based network voting scheme and its use in a private organization Towards Trustworthy Elections, (141-154)
  682. Hao F and Ryan P J-PAKE Transactions on computational science XI, (192-206)
  683. Harrison O and Waldron J GPU accelerated cryptography as an OS service Transactions on computational science XI, (104-130)
  684. Elbaz R, Torres L, Sassatelli G, Guillemin P, Bardouillet M and Martinez A Block-level added redundancy explicit authentication for parallelized encryption and integrity checking of processor-memory transactions Transactions on computational science X, (231-260)
  685. Klapper A Pseudorandom sequences and stream ciphers Algorithms and theory of computation handbook, (17-17)
  686. Halunen K, Kortelainen J and Kortelainen T Combinatorial multicollision attacks on generalized iterated hash functions Proceedings of the Eighth Australasian Conference on Information Security - Volume 105, (86-93)
  687. Salvail L, Peev M, Diamanti E, Alléaume R, Lütkenhaus N and Länger T (2010). Security of trusted repeater quantum key distribution networks, Journal of Computer Security, 18:1, (61-87), Online publication date: 1-Jan-2010.
  688. Franke H, Xenidis J, Basso C, Bass B, Woodward S, Brown J and Johnson C (2010). Introduction to the wire-speed processor and architecture, IBM Journal of Research and Development, 54:1, (27-37), Online publication date: 1-Jan-2010.
  689. Yang G, Huang Q, Wong D and Deng X (2010). Universal authentication protocols for anonymous wireless communications, IEEE Transactions on Wireless Communications, 9:1, (168-174), Online publication date: 1-Jan-2010.
  690. Venkatasubramanian K, Banerjee A and Gupta S (2010). PSKA, IEEE Transactions on Information Technology in Biomedicine, 14:1, (60-68), Online publication date: 1-Jan-2010.
  691. Youssef A (2010). Cryptanalysis of Boolean permutation-based key escrow scheme, Computers and Electrical Engineering, 36:1, (56-60), Online publication date: 1-Jan-2010.
  692. Omari A, Al-Kasasbeh B and Omari A Dynamic cryptography algorithm for real-time applications DCA-RTA Proceedings of the 3rd International Conference on Applied Mathematics, Simulation, Modelling, Circuits, Systems and Signals, (61-67)
  693. Petit J Analysis of ECDSA authentication processing in VANETs Proceedings of the 3rd international conference on New technologies, mobility and security, (388-392)
  694. Akram R, Markantonakis K and Mayes K Application Management Framework in User Centric Smart Card Ownership Model Information Security Applications, (20-35)
  695. Hanley N, Tunstall M and Marnane W Unknown Plaintext Template Attacks Information Security Applications, (148-162)
  696. ACM
    Khan S and Hayat A A trustworthy identity management architecture for e-government processes in Pakistan Proceedings of the 7th International Conference on Frontiers of Information Technology, (1-6)
  697. Ratan R Key Independent Retrieval of Chaotic Encrypted Images Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence, (483-488)
  698. Liu L and Yuan C Broadcast Encryption-Based P2P DRM without Central License Server Proceedings of the 10th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing, (451-458)
  699. Stefan D Hardware framework for the rabbit stream cipher Proceedings of the 5th international conference on Information security and cryptology, (230-247)
  700. Yin R, Yuan J, Yang Q, Shan X and Wang X Gemstone Proceedings of the 5th international conference on Information security and cryptology, (198-214)
  701. Mouha N, Sekar G, Aumasson J, Peyrin T, Thomsen S, Turan M and Preneel B Cryptanalysis of the ESSENCE family of hash functions Proceedings of the 5th international conference on Information security and cryptology, (15-34)
  702. ACM
    Qureshi M, Karidis J, Franceschini M, Srinivasan V, Lastras L and Abali B Enhancing lifetime and security of PCM-based main memory with start-gap wear leveling Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, (14-23)
  703. Overeinder B, Oey M, Timmer R, Schouwen R, Rozendaal E and Brazier F Design of a Secure and Decentralized Location Service for Agent Platforms Agents and Peer-to-Peer Computing, (97-109)
  704. Hong D, Koo B and Sasaki Y Improved preimage attack for 68-step HAS-160 Proceedings of the 12th international conference on Information security and cryptology, (332-348)
  705. Hong D, Koo B, Kim W and Kwon D Preimage attacks on reduced steps of ARIRANG and PKC98-hash Proceedings of the 12th international conference on Information security and cryptology, (315-331)
  706. Shoufan A, Strenzke F, Molter H and Stöttinger M A timing attack against patterson algorithm in the McEliece PKC Proceedings of the 12th international conference on Information security and cryptology, (161-175)
  707. Poschmann A, Robshaw M, Vater F and Paar C Lightweight cryptography and RFID Proceedings of the 12th international conference on Information security and cryptology, (129-145)
  708. Lamberger M, Mendel F, Rechberger C, Rijmen V and Schläffer M Rebound Distinguishers Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (126-143)
  709. Aoki K, Guo J, Matusiewicz K, Sasaki Y and Wang L Preimages for Step-Reduced SHA-2 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (578-597)
  710. Salameh J (2009). JEA K-128, WSEAS Transactions on Computers, 8:12, (1875-1884), Online publication date: 1-Dec-2009.
  711. Ding X, Tsudik G and Xu S (2009). Leak-free mediated group signatures, Journal of Computer Security, 17:4, (489-514), Online publication date: 1-Dec-2009.
  712. Zhu G, Huang J, Kwong S and Yang J (2009). A study on the randomness measure of image hashing, IEEE Transactions on Information Forensics and Security, 4:4, (928-932), Online publication date: 1-Dec-2009.
  713. Thomas T, Emmanuel S, Subramanyam A and Kankanhalli M (2009). Joint watermarking scheme for multiparty multilevel DRM architecture, IEEE Transactions on Information Forensics and Security, 4:4, (758-767), Online publication date: 1-Dec-2009.
  714. Saxena N and Yi J (2009). Noninteractive self-certification for long-lived mobile ad hoc networks, IEEE Transactions on Information Forensics and Security, 4:4, (946-955), Online publication date: 1-Dec-2009.
  715. Wu D, Zhou X and Niu X (2009). A novel image hash algorithm resistant to print-scan, Signal Processing, 89:12, (2415-2424), Online publication date: 1-Dec-2009.
  716. Encinas L, Masqué J and Dios A (2009). Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range, Information Sciences: an International Journal, 179:24, (4219-4226), Online publication date: 1-Dec-2009.
  717. Natgunanathan I and Xiang Y A novel pseudonoise sequence for time-spread echo based audio watermarking Proceedings of the 28th IEEE conference on Global telecommunications, (135-140)
  718. Dahmen E and Krauß C Short Hash-Based Signatures for Wireless Sensor Networks Proceedings of the 8th International Conference on Cryptology and Network Security, (463-476)
  719. Joye M On Cryptographic Schemes Based on Discrete Logarithms and Factoring Proceedings of the 8th International Conference on Cryptology and Network Security, (41-52)
  720. Tartary C Ensuring Authentication of Digital Information Using Cryptographic Accumulators Proceedings of the 8th International Conference on Cryptology and Network Security, (315-333)
  721. Boyen X HPAKE Proceedings of the 8th International Conference on Cryptology and Network Security, (279-298)
  722. Iqbal J and Masood F Real time hardware crypto cards based on DSP Proceedings of the 3rd international conference on Intelligent information technology application, (395-398)
  723. ACM
    Hua Y, Jiang H, Zhu Y, Feng D and Tian L SmartStore Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis, (1-12)
  724. Ustaoglu B Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols Provable Security, (183-197)
  725. ACM
    Goodloe A and Gunter C Completeness of discovery protocols Proceedings of the 2nd ACM workshop on Assurable and usable security configuration, (29-36)
  726. Hassan A, Hasan Y, Al-Hamadi A, Wahab M and Michaelis B A novel public key self-embedding fragile watermarking technique for image authentication Proceedings of the 16th IEEE international conference on Image processing, (1253-1256)
  727. ACM
    Waddey M, Poncelet P and Ben Yahia S A novel approach for privacy mining of generic basic association rules Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases, (45-52)
  728. Zhou Y, Panetta K and Agaian S Image encryption algorithms based on generalized P-gray code bit plane decomposition Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (400-404)
  729. Zhou Y, Panetta K and Agaian S Image encryption using discrete parametric cosine transform Proceedings of the 43rd Asilomar conference on Signals, systems and computers, (395-399)
  730. ACM
    Katz J, Ostrovsky R and Yung M (2009). Efficient and secure authenticated key exchange using weak passwords, Journal of the ACM, 57:1, (1-39), Online publication date: 1-Nov-2009.
  731. Pasalic E (2009). Probabilistic versus deterministic algebraic cryptanalysis, IEEE Transactions on Information Theory, 55:11, (5233-5240), Online publication date: 1-Nov-2009.
  732. Kolokotronis N, Limniotis K and Kalouptsidis N (2009). Best affine and quadratic approximations of particular classes of Boolean functions, IEEE Transactions on Information Theory, 55:11, (5211-5222), Online publication date: 1-Nov-2009.
  733. Domingo-Ferrer J, Bras-Amorós M, Wu Q and Manjón J (2009). User-private information retrieval based on a peer-to-peer community, Data & Knowledge Engineering, 68:11, (1237-1252), Online publication date: 1-Nov-2009.
  734. Dong F, Shatz S and Xu H (2009). Survey, Computer Science Review, 3:4, (245-258), Online publication date: 1-Nov-2009.
  735. Gualberto T and Zorzo S Incorporating flexible, configurable and scalable security to the education collaborative environments Proceedings of the 39th IEEE international conference on Frontiers in education conference, (266-271)
  736. ACM
    Liu L and Yuan C Trace and revoke systems with short ciphertexts Proceedings of the 2nd international conference on Security of information and networks, (61-66)
  737. Seys S and Preneel B (2009). ARM: anonymous routing protocol for mobile ad hoc networks, International Journal of Wireless and Mobile Computing, 3:3, (145-155), Online publication date: 1-Oct-2009.
  738. ACM
    Sang Y and Shen H (2009). Efficient and secure protocols for privacy-preserving set operations, ACM Transactions on Information and System Security, 13:1, (1-35), Online publication date: 1-Oct-2009.
  739. Etzion T, Kalouptsidis N, Kolokotronis N, Limniotis K and Paterson K (2009). Properties of the error linear complexity spectrum, IEEE Transactions on Information Theory, 55:10, (4681-4686), Online publication date: 1-Oct-2009.
  740. Ronglei H, Yaping C, Fenglin X, Zhanzhen W and Ran L A password-authenticated key agreement scheme for ad hoc networks Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (2943-2947)
  741. Matanovic G, Matanovic K and Mikuc M Enforcing access restrictions on terminal maintenance tasks using smart cards Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks, (249-253)
  742. Garcia-Alfaro J, Barbeau M and Kranakis E Security threat mitigation trends in low-cost RFID systems Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security, (193-207)
  743. Muhaya F, Usama M and Khan M Modified AES using chaotic key generator for satellite imagery encryption Proceedings of the 5th international conference on Emerging intelligent computing technology and applications, (1014-1024)
  744. Pinel F and Bouvry P Weakness analysis of a key stream generator based on cellular automata Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part II, (547-552)
  745. Lim H Key management for large-scale distributed storage systems Proceedings of the 6th European conference on Public key infrastructures, services and applications, (99-113)
  746. Nakahara J, Sekar G, Freitas D, Chiann C, Souza R and Preneel B A New Approach to Χ2 Cryptanalysis of Block Ciphers Proceedings of the 12th International Conference on Information Security, (1-16)
  747. Sasaki Y Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL Proceedings of the 12th International Conference on Information Security, (79-94)
  748. Yang J and Chang C (2009). An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, Journal of Systems and Software, 82:9, (1497-1502), Online publication date: 1-Sep-2009.
  749. Chang C, Chang S and Lee J (2009). An on-line electronic check system with mutual authentication, Computers and Electrical Engineering, 35:5, (757-763), Online publication date: 1-Sep-2009.
  750. Prouff E and Mcevoy R First-Order Side-Channel Attacks on the Permutation Tables Countermeasure Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (81-96)
  751. Eisenbarth T, Güneysu T, Heyse S and Paar C MicroEliece Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (49-64)
  752. Finke T, Gebhardt M and Schindler W A New Side-Channel Attack on RSA Prime Generation Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (141-155)
  753. Tews H and Jacobs B Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, (95-111)
  754. Naranjo J, López-Ramos J and Casado L Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, (128-142)
  755. Song S and Jaja J (2009). Techniques to audit and certify the long-term integrity of digital archives, International Journal on Digital Libraries, 10:2-3, (123-131), Online publication date: 1-Aug-2009.
  756. Deepthi P, Sathidevi P and Lakshmi V (2009). A new hardware efficient stream cipher based on hash functions, International Journal of Communication Networks and Distributed Systems, 3:4, (340-361), Online publication date: 1-Aug-2009.
  757. Youssef A (2009). Cryptanalysis of a knapsack-based probabilistic encryption scheme, Information Sciences: an International Journal, 179:18, (3116-3121), Online publication date: 1-Aug-2009.
  758. Paterson K and Srinivasan S (2009). On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups, Designs, Codes and Cryptography, 52:2, (219-241), Online publication date: 1-Aug-2009.
  759. Wu C Fast Parallel Montgomery Binary Exponentiation Algorithm Using Canonical- Signed-Digit Recoding Technique Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, (428-438)
  760. ACM
    Potkonjak M, Nahapetian A, Nelson M and Massey T Hardware Trojan horse detection using gate-level characterization Proceedings of the 46th Annual Design Automation Conference, (688-693)
  761. Khoo K, Wong F and Lim C On a Construction of Short Digests for Authenticating Ad Hoc Networks Proceedings of the International Conference on Computational Science and Its Applications: Part II, (863-876)
  762. ACM
    Shahzad W, Siddiqui A and Khan F Cryptanalysis of four-rounded DES using binary particleswarm optimization Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers, (2161-2166)
  763. Yang B, Zhou C, Busch C and Niu X Transparent and perceptually enhanced JPEG image encryption Proceedings of the 16th international conference on Digital Signal Processing, (1295-1300)
  764. Volos C, Kyprianidis I and Stouboulos I Image encryption process based on a chaotic true random bit generator Proceedings of the 16th international conference on Digital Signal Processing, (1091-1094)
  765. Lu H, Martin K, Bui F, Plataniotis K and Hatzinakos D Face recognition with biometric encryption for privacy-enhancing self-exclusion Proceedings of the 16th international conference on Digital Signal Processing, (625-632)
  766. Pasalic E (2009). On guess and determine cryptanalysis of LFSR-based stream ciphers, IEEE Transactions on Information Theory, 55:7, (3398-3406), Online publication date: 1-Jul-2009.
  767. Tarmissi K and Ben Hamza A (2009). Information-theoretic hashing of 3D objects using spectral graph theory, Expert Systems with Applications: An International Journal, 36:5, (9409-9414), Online publication date: 1-Jul-2009.
  768. ACM
    Yang Y, Papadias D, Papadopoulos S and Kalnis P Authenticated join processing in outsourced databases Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (5-18)
  769. Thomas T, Emmanuel S, Das A and Kankanhalli M A CRT based watermark for multiparty multilevel DRM architecture Proceedings of the 2009 IEEE international conference on Multimedia and Expo, (1010-1013)
  770. ACM
    Garera S and Vasconcelos J (2009). Challenges in teaching a graduate course in applied cryptography, ACM SIGCSE Bulletin, 41:2, (103-107), Online publication date: 25-Jun-2009.
  771. ACM
    Bergmann S (2009). Degenerate keys for RSA encryption, ACM SIGCSE Bulletin, 41:2, (95-98), Online publication date: 25-Jun-2009.
  772. Chan A A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (259-266)
  773. Boztaş S, Puglisi S and Turpin A Testing Stream Ciphers by Finding the Longest Substring of a Given Density Proceedings of the 14th Australasian Conference on Information Security and Privacy, (122-133)
  774. Wikström D A Commitment-Consistent Proof of a Shuffle Proceedings of the 14th Australasian Conference on Information Security and Privacy, (407-421)
  775. Sasaki Y and Aoki K Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions Proceedings of the 14th Australasian Conference on Information Security and Privacy, (214-231)
  776. Harrison O and Waldron J Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology, (350-367)
  777. ACM
    Siniagina N, Aleksandrov B and Kochevski P Distributed secret on the basis of the linear correcting codes Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, (1-5)
  778. Zhao K, Chu X, Wang M and Jiang Y Speeding up homomorpic hashing using GPUs Proceedings of the 2009 IEEE international conference on Communications, (856-860)
  779. Mahmoud M and Shen X Anonymous and authenticated routing in multi-hop cellular networks Proceedings of the 2009 IEEE international conference on Communications, (839-844)
  780. Rizomiliotis P, Bogris A and Syvridis D Message origin authentication and integrity protection in chaos-based optical communication Proceedings of the 2009 IEEE international conference on Communications, (814-818)
  781. Allam A and Abbas H Improved security of neural cryptography using don't-trust-my-partner and error prediction Proceedings of the 2009 international joint conference on Neural Networks, (1900-1906)
  782. ACM
    Fortino G, Garro A, Mascillaro S, Russo W and Vaccaro M Distributed architectures for surrogate clustering in CDNs Proceedings of the 4th edition of the UPGRADE-CN workshop on Use of P2P, GRID and agents for the development of content networks, (3-10)
  783. ACM
    Muñoz A, González M and Gallardo J PRNG based on new HCI devices entropy sources Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, (1-7)
  784. ACM
    Locher T, Meier R, Wattenhofer R and Schmid S Robust live media streaming in swarms Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video, (121-126)
  785. ACM
    Thomas T, Emmanuel S, Das A and Kankanhalli M Secure multimedia content delivery with multiparty multilevel DRM architecture Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video, (85-90)
  786. Yang Y, Papadopoulos S, Papadias D and Kollios G (2009). Authenticated indexing for outsourced spatial databases, The VLDB Journal — The International Journal on Very Large Data Bases, 18:3, (631-648), Online publication date: 1-Jun-2009.
  787. Xiao D, Liao X and Wang Y (2009). Parallel keyed hash function construction based on chaotic neural network, Neurocomputing, 72:10-12, (2288-2296), Online publication date: 1-Jun-2009.
  788. Wu T and Lin H (2009). Efficient self-certified proxy CAE scheme and its variants, Journal of Systems and Software, 82:6, (974-980), Online publication date: 1-Jun-2009.
  789. Osorio-Hernández L, Mezura-Montes E, Cruz-Cortés N and Rodríguez-Henríquez F A genetic algorithm with repair and local search mechanisms able to find minimal length addition chains for small exponents Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (1422-1429)
  790. ACM
    Campobello G, Leonardi A and Palazzo S A novel reliable and energy-saving forwarding technique for wireless sensor networks Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, (269-278)
  791. Chun J, Hwang J and Lee D (2009). A note on leakage-resilient authenticated key exchange, IEEE Transactions on Wireless Communications, 8:5, (2274-2279), Online publication date: 1-May-2009.
  792. Zhou J, Au O and Wong P (2009). Adaptive chosen-ciphertext attack on secure arithmetic coding, IEEE Transactions on Signal Processing, 57:5, (1825-1838), Online publication date: 1-May-2009.
  793. Joung Y and Yang C (2009). Email licensing, Journal of Network and Computer Applications, 32:3, (538-549), Online publication date: 1-May-2009.
  794. Carroll T and Grosu D (2009). A secure and anonymous voter-controlled election scheme, Journal of Network and Computer Applications, 32:3, (599-606), Online publication date: 1-May-2009.
  795. Álvarez R, Tortosa L, Vicent J and Zamora A (2009). Analysis and design of a secure key exchange scheme, Information Sciences: an International Journal, 179:12, (2014-2021), Online publication date: 1-May-2009.
  796. Deepthi P and Sathidevi P (2009). Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions, Computers and Security, 28:3-4, (229-241), Online publication date: 1-May-2009.
  797. Rivain M Securing RSA against Fault Analysis by Double Addition Chain Exponentiation Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (459-480)
  798. Yoshino M, Okeya K and Vuillaume C Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (340-356)
  799. Gao C, Wei B, Xie D and Tang C Divisible On-Line/Off-Line Signatures Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology, (148-163)
  800. Sasaki Y and Aoki K Finding Preimages in Full MD5 Faster Than Exhaustive Search Proceedings of the 28th Annual International Conference on Advances in Cryptology - EUROCRYPT 2009 - Volume 5479, (134-152)
  801. Knudsen L, Mendel F, Rechberger C and Thomsen S Cryptanalysis of MDC-2 Proceedings of the 28th Annual International Conference on Advances in Cryptology - EUROCRYPT 2009 - Volume 5479, (106-120)
  802. Henzen L, Carbognani F, Felber N and Fichtner W Hardware evaluation of the stream cipher-based hash functions RadioGatún and irRUPT Proceedings of the Conference on Design, Automation and Test in Europe, (646-651)
  803. Ibraimi L, Tang Q, Hartel P and Jonker W Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes Proceedings of the 5th International Conference on Information Security Practice and Experience, (1-12)
  804. Liang Y, Poor H and Shamai (Shitz) S (2009). Information Theoretic Security, Foundations and Trends in Communications and Information Theory, 5:4–5, (355-580), Online publication date: 1-Apr-2009.
  805. Haidar A and Abdallah A (2009). Formal Modelling of PKI Based Authentication, Electronic Notes in Theoretical Computer Science (ENTCS), 235, (55-70), Online publication date: 1-Apr-2009.
  806. Yu P, Baras J and Sadler B Power allocation tradeoffs in multicarrier authentication systems Proceedings of the 32nd international conference on Sarnoff symposium, (83-87)
  807. Dutta R and Dowling T Secure and Efficient Group Key Agreements for Cluster Based Networks Transactions on Computational Science IV, (87-116)
  808. ACM
    Ugus O, Westhoff D and Bohli J A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme Proceedings of the second ACM conference on Wireless network security, (29-40)
  809. Junod P, Karlov A and Lenstra A Improving the Boneh-Franklin Traitor Tracing Scheme Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, (88-104)
  810. ACM
    Kobara K, Shin S and Strefler M Partnership in key exchange protocols Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (161-170)
  811. He W, Huang Y, Sathyam R, Nahrstedt K and Lee W (2009). SMOCK, IEEE Transactions on Information Forensics and Security, 4:1, (140-150), Online publication date: 1-Mar-2009.
  812. Chen W and Wang M (2009). A fuzzy c-means clustering-based fragile watermarking scheme for image authentication, Expert Systems with Applications: An International Journal, 36:2, (1300-1307), Online publication date: 1-Mar-2009.
  813. Deepthi P, John D and Sathidevi P (2009). Design and analysis of a highly secure stream cipher based on linear feedback shift register, Computers and Electrical Engineering, 35:2, (235-243), Online publication date: 1-Mar-2009.
  814. Munilla J and Peinado A (2009). Security flaw of Hölbl et al.'s protocol, Computer Communications, 32:4, (736-739), Online publication date: 1-Mar-2009.
  815. Martínez S, Valls M, Roig C, Miret J and Giné F (2009). A secure elliptic curve-based RFID protocol, Journal of Computer Science and Technology, 24:2, (309-318), Online publication date: 1-Mar-2009.
  816. Panario D and Thomson D (2009). Efficient pth root computations in finite fields of characteristic p, Designs, Codes and Cryptography, 50:3, (351-358), Online publication date: 1-Mar-2009.
  817. Hasan R, Sion R and Winslett M The case of the fake Picasso Proccedings of the 7th conference on File and storage technologies, (1-14)
  818. Lee S and Jae W Design of effective anti-malware system for mobile industrial devices based on windows CE Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3, (1762-1765)
  819. Lee S, Choi J and Park N FMIPv6 based secure binding update authentication in wireless vehicular networks Proceedings of the 4th international conference on Wireless pervasive computing, (180-184)
  820. Anuar N, Kuen L, Zakaria O, Gani A and Wahab A (2009). Usability and performance of secure mobile messaging, WSEAS Transactions on Information Science and Applications, 6:2, (179-189), Online publication date: 1-Feb-2009.
  821. Buhan I, Boom B, Doumen J, Hartel P and Veldhuis R (2009). Secure pairing with biometrics, International Journal of Security and Networks, 4:1/2, (27-42), Online publication date: 1-Feb-2009.
  822. ACM
    Moss A and Page D Program interpolation Proceedings of the 2009 ACM SIGPLAN workshop on Partial evaluation and program manipulation, (31-40)
  823. Yoon E and Yoo K (2009). Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting, Informatica, 20:1, (139-150), Online publication date: 1-Jan-2009.
  824. Kazlauskas K and Kazlauskas J (2009). Key-Dependent S-Box Generation in AES Block Cipher System, Informatica, 20:1, (23-34), Online publication date: 1-Jan-2009.
  825. Rahouma K and Nasr K Design of the host guard firewall for network protection Proceedings of the 7th WSEAS international conference on Information security and privacy, (61-72)
  826. Omari A, Al-Kasasbeh B, Al-Qutaish R and Muhairat M A new cryptographic algorithm for the real time applications Proceedings of the 7th WSEAS international conference on Information security and privacy, (33-38)
  827. Song J, Yang F, Wang M and Zhang H Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence, (795-802)
  828. Wang K, Wu M, Xia P and Shen S An Incentive-Based Secure Charging Scheme for Integrating Networks Computer Supported Cooperative Work in Design IV, (432-442)
  829. Verma N, Mishra P and Pandey G Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators Proceedings of the 4th International Conference on Information Systems Security, (154-155)
  830. Aumasson J Faster Multicollisions Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology, (67-77)
  831. Khovratovich D Two Attacks on RadioGatún Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology, (53-66)
  832. Tang Q Type-Based Proxy Re-encryption and Its Construction Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology, (130-144)
  833. Yasuda K How to Fill Up Merkle-Damgård Hash Functions Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (272-289)
  834. Sasaki Y and Aoki K Preimage Attacks on 3, 4, and 5-Pass HAVAL Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (253-271)
  835. Yang X, Wetherall D and Anderson T (2008). TVA, IEEE/ACM Transactions on Networking, 16:6, (1267-1280), Online publication date: 1-Dec-2008.
  836. Christopoulou M, Garefalakis T, Panario D and Thomson D (2008). The trace of an optimal normal element and low complexity normal bases, Designs, Codes and Cryptography, 49:1-3, (199-215), Online publication date: 1-Dec-2008.
  837. Karras D and Zorkadis V Towards a reliable evaluation framework for message authentication in web-based transactions based on an improved computational intelligence and dynamical systems methodology Proceedings of the 15th international conference on Advances in neuro-information processing - Volume Part I, (595-602)
  838. Yoshida T and Okada K Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security, (83-99)
  839. ACM
    Jorns O and Quirchmayr G A middleware for location-based mobile applications with privacy protection Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, (111-116)
  840. Lee I, Lee J, Arbaugh W and Kim D Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks Information Networking. Towards Ubiquitous Networking and Services, (649-658)
  841. Hamid M and Hong C A Secure Message Percolation Scheme for Wireless Sensor Network Information Networking. Towards Ubiquitous Networking and Services, (554-563)
  842. ACM
    Troncoso C, De Cock D and Preneel B Improving secure long-term archival of digitally signed documents Proceedings of the 4th ACM international workshop on Storage security and survivability, (27-36)
  843. ACM
    Wilcox-O'Hearn Z and Warner B Tahoe Proceedings of the 4th ACM international workshop on Storage security and survivability, (21-26)
  844. ACM
    Grzonkowski S, Zaremba W, Zaremba M and McDaniel B Extending web applications with a lightweight zero knowledge proof authentication Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology, (65-70)
  845. Choy J, Khoo K and Loe C Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Information and Communications Security, (157-173)
  846. Shirase M, Han D, Hibino Y, Kim H and Takagi T (2008). A More Compact Representation of XTR Cryptosystem, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:10, (2843-2850), Online publication date: 1-Oct-2008.
  847. Miyaji A (2008). Generalized Scalar Multiplication Secure against SPA, DPA, and RPA, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:10, (2833-2842), Online publication date: 1-Oct-2008.
  848. Demchenko Y, Wan A, Cristea M and de Laat C Authorisation infrastructure for on-demand network resource provisioning Proceedings of the 2008 9th IEEE/ACM International Conference on Grid Computing, (95-103)
  849. ACM
    Schaathun H A key-recovery attack on authentication watermarking by li and yuan Proceedings of the 10th ACM workshop on Multimedia and security, (221-226)
  850. Gueron S and Kounavis M Vortex Proceedings of the 11th international conference on Information Security, (331-340)
  851. ACM
    Mathur S, Trappe W, Mandayam N, Ye C and Reznik A Radio-telepathy Proceedings of the 14th ACM international conference on Mobile computing and networking, (128-139)
  852. ACM
    Chen C, Lee C and Lu E Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m) Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-6)
  853. Singelée D, Latré B, Braem B, Peeters M, Soete M, Cleyn P, Preneel B, Moerman I and Blondia C A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks, (94-107)
  854. Fan C and Liang Y (2008). Anonymous Fair Transaction Protocols Based on Electronic Cash, International Journal of Electronic Commerce, 13:1, (131-151), Online publication date: 1-Sep-2008.
  855. Lee C and Chiou C (2008). New Bit-Parallel Systolic Architectures for Computing Multiplication, Multiplicative Inversion and Division in GF(2m) Under Polynomial Basis and Normal Basis Representations, Journal of Signal Processing Systems, 52:3, (313-324), Online publication date: 1-Sep-2008.
  856. Ravnshøj C Generators for the l-Torsion Subgroup of Jacobians of Genus Two Curves Proceedings of the 2nd international conference on Pairing-Based Cryptography, (225-242)
  857. Fatemi M, Jebril I and Salleh R An FPGA based co-processor for elliptic curve cryptography Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks, (73-77)
  858. Garg S, Bhaskar R and Lokam S Improved Bounds on Security Reductions for Discrete Log Based Signatures Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, (93-107)
  859. Jetchev D and Venkatesan R Bits Security of the Elliptic Curve Diffie---Hellman Secret Keys Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, (75-92)
  860. Rogaway P and Steinberger J Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, (433-450)
  861. Biham E, Carmeli Y and Shamir A Bug Attacks Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, (221-240)
  862. Homma N, Miyamoto A, Aoki T, Satoh A and Shamir A Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems, (15-29)
  863. Bogdanov A, Leander G, Paar C, Poschmann A, Robshaw M and Seurin Y Hash Functions and RFID Tags Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems, (283-299)
  864. Anuar N, Kuen L, Zakaria O, Gani A and Wahab A (2008). GSM mobile SMS/MMS using public key infrastructure, WSEAS Transactions on Computers, 7:8, (1219-1229), Online publication date: 1-Aug-2008.
  865. Kayem_ca A, Akl S and Martin P (2008). On replacing cryptographic keys in hierarchical key management systems, Journal of Computer Security, 16:3, (289-309), Online publication date: 1-Aug-2008.
  866. Elbirt A (2008). Accelerated AES implementations via generalized instruction set extensions, Journal of Computer Security, 16:3, (265-288), Online publication date: 1-Aug-2008.
  867. Margaronis P, Antonidakis E, Marinakis K and Katsoylakis K Key management for cipher system (LAM) Proceedings of the 12th WSEAS international conference on Computers, (649-652)
  868. ACM
    Bergmann K, Scheidler R and Jacob C Cryptanalysis using genetic algorithms Proceedings of the 10th annual conference on Genetic and evolutionary computation, (1099-1100)
  869. El-Fotouh M and Diepold K The Analysis of Windows Vista Disk Encryption Algorithm Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security, (113-126)
  870. Shrimpton T and Stam M Building a Collision-Resistant Compression Function from Non-compressing Primitives Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II, (643-654)
  871. Sasaki Y and Aoki K Preimage Attacks on Step-Reduced MD5 Proceedings of the 13th Australasian conference on Information Security and Privacy, (282-296)
  872. Billet O, Robshaw M, Seurin Y and Yin Y Looking Back at a New Hash Function Proceedings of the 13th Australasian conference on Information Security and Privacy, (239-253)
  873. Su S, Cai Y and Shen C The Banknote Anti-forgery System Based on Digital Signature Algorithms Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (44-49)
  874. Chen Y, Lin I, Lei C and Liao Y Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems, (99-111)
  875. Shpilrain V Cryptanalysis of Stickel's key exchange scheme Proceedings of the 3rd international conference on Computer science: theory and applications, (283-288)
  876. Osin D and Shpilrain V Public key encryption and encryption emulation attacks Proceedings of the 3rd international conference on Computer science: theory and applications, (252-260)
  877. Burmester M and De Medeiros B The security of EPC Gen2 compliant RFID protocols Proceedings of the 6th international conference on Applied cryptography and network security, (490-506)
  878. Damgård I, Knudsen L and Thomsen S DAKOTA Proceedings of the 6th international conference on Applied cryptography and network security, (144-155)
  879. ACM
    Güneysu T, Paar C and Pelzl J (2008). Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem, ACM Transactions on Reconfigurable Technology and Systems, 1:2, (1-21), Online publication date: 1-Jun-2008.
  880. Amiel F and Feix B On the BRIP algorithms security for RSA Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks, (136-149)
  881. ACM
    Kapoor V, Abraham V and Singh R (2008). Elliptic curve cryptography, Ubiquity, 2008:May, (1-8), Online publication date: 1-May-2008.
  882. Matsuda T, Attrapadung N, Hanaoka G, Matsuura K and Imai H (2008). A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions, IEICE - Transactions on Information and Systems, E91-D:5, (1466-1476), Online publication date: 1-May-2008.
  883. Shin S, Kobara K and Imai H (2008). RSA-Based Password-Authenticated Key Exchange, Revisited, IEICE - Transactions on Information and Systems, E91-D:5, (1424-1438), Online publication date: 1-May-2008.
  884. Yoshitomi M, Takagi T, Kiyomoto S and Tanaka T (2008). Efficient Implementation of the Pairing on Mobilephones Using BREW, IEICE - Transactions on Information and Systems, E91-D:5, (1330-1337), Online publication date: 1-May-2008.
  885. Fournaris A and Koufopavlou O (2008). Versatile multiplier architectures in GF(2k) fields using the Montgomery multiplication algorithm, Integration, the VLSI Journal, 41:3, (371-384), Online publication date: 1-May-2008.
  886. Liu A and Ning P TinyECC Proceedings of the 7th international conference on Information processing in sensor networks, (245-256)
  887. Cappaert J, Preneel B, Anckaert B, Madou M and De Bosschere K Towards tamper resistant code encryption Proceedings of the 4th international conference on Information security practice and experience, (86-100)
  888. Meier J Do not model the attacker Proceedings of the 16th International conference on Security protocols, (25-35)
  889. Wu C and Liu T Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS) Proceedings of the 2008 Spring simulation multiconference, (844-851)
  890. Andreeva E, Bouillaguet C, Fouque P, Hoch J, Kelsey J, Shamir A and Zimmer S Second preimage attacks on dithered hash functions Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, (270-288)
  891. Wang L, Ohta K and Kunihiro N New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, (237-253)
  892. Bertoni G, Daemen J, Peeters M and Van Assche G On the indifferentiability of the sponge construction Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, (181-197)
  893. Cash D, Kiltz E and Shoup V The twin Diffie-Hellman problem and applications Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, (127-145)
  894. Aciiçmez O and Schindler W A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology, (256-273)
  895. Del Rey A A secret sharing scheme for digital images based on two-dimensional linear cellular automata Proceedings of the 12th international conference on Combinatorial image analysis, (318-329)
  896. ACM
    Forget A and Biddle R Memorability of persuasive passwords CHI '08 Extended Abstracts on Human Factors in Computing Systems, (3759-3764)
  897. Gastaldo P, Parodi G and Zunino R (2008). Enhanced montgomery multiplication on DSP architectures for embedded public-key cryptosystems, EURASIP Journal on Embedded Systems, 2008, (1-9), Online publication date: 1-Apr-2008.
  898. ACM
    Mukherjee S, Bhattacharya S and Chaudhury A (2008). Triple layer data security, Ubiquity, 2008:April, (1-1), Online publication date: 1-Apr-2008.
  899. ACM
    Song B and Mitchell C RFID authentication protocol for low-cost tags Proceedings of the first ACM conference on Wireless network security, (140-147)
  900. ACM
    Driessen B, Poschmann A and Paar C Comparison of innovative signature algorithms for WSNs Proceedings of the first ACM conference on Wireless network security, (30-35)
  901. Evdokimov S, Fabian B and Günther O Multipolarity for the object naming service Proceedings of the 1st international conference on The internet of things, (1-18)
  902. Yoon E and Yoo K A new key agreement protocol based on chaotic maps Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications, (897-906)
  903. Xiao D, Liao X and Deng S (2008). Using time-stamp to improve the security of a chaotic maps-based key agreement protocol, Information Sciences: an International Journal, 178:6, (1598-1602), Online publication date: 20-Mar-2008.
  904. Didla S, Ault A and Bagchi S Optimizing AES for embedded devices and wireless sensor networks Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities, (1-10)
  905. ACM
    Haber S, Hatano Y, Honda Y, Horne W, Miyazaki K, Sander T, Tezoku S and Yao D Efficient signature schemes supporting redaction, pseudonymization, and data deidentification Proceedings of the 2008 ACM symposium on Information, computer and communications security, (353-362)
  906. ACM
    Burmester M, de Medeiros B and Motta R Robust, anonymous RFID authentication with constant key-lookup Proceedings of the 2008 ACM symposium on Information, computer and communications security, (283-291)
  907. ACM
    Bresson E and Manulis M Securing group key exchange against strong corruptions Proceedings of the 2008 ACM symposium on Information, computer and communications security, (249-260)
  908. ACM
    McAndrew A Teaching cryptography with open-source software Proceedings of the 39th SIGCSE technical symposium on Computer science education, (325-329)
  909. ACM
    Fan J, Batina L, Sakiyama K and Verbauwhede I FPGA design for algebraic tori-based public-key cryptography Proceedings of the conference on Design, automation and test in Europe, (1292-1297)
  910. ACM
    Chen X, Dick R and Choudhary A Operating system controlled processor-memory bus encryption Proceedings of the conference on Design, automation and test in Europe, (1154-1159)
  911. Kim S and Cheon J A parameterized splitting system and its application to the discrete logarithm problem with low hamming weight product exponents Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography, (328-343)
  912. ACM
    Wilton S, Ho C, Quinton B, Leong P and Luk W (2008). A Synthesizable Datapath-Oriented Embedded FPGA Fabric for Silicon Debug Applications, ACM Transactions on Reconfigurable Technology and Systems, 1:1, (1-25), Online publication date: 1-Mar-2008.
  913. Qin B, Li M and Kong F (2008). Cryptanalysis of a type of CRT-based RSA algorithms, Journal of Computer Science and Technology, 23:2, (214-221), Online publication date: 1-Mar-2008.
  914. ACM
    McAndrew A (2008). Teaching cryptography with open-source software, ACM SIGCSE Bulletin, 40:1, (325-329), Online publication date: 29-Feb-2008.
  915. Klimm A, Sander O, Becker J and Subileau S A hardware/software codesign of a co-processor for real-time hyperelliptic curve cryptography on a Spartan3 FPGA Proceedings of the 21st international conference on Architecture of computing systems, (188-201)
  916. Jakubowska G and Penczek W (2007). Modelling and Checking Timed Authentication of Security Protocols, Fundamenta Informaticae, 79:3-4, (363-378), Online publication date: 1-Feb-2008.
  917. Chevalier Y and Rusinowitch M (2008). Hierarchical combination of intruder theories, Information and Computation, 206:2-4, (352-377), Online publication date: 1-Feb-2008.
  918. Bahig H (2008). On a generalization of addition chains, Discrete Mathematics, 308:4, (611-616), Online publication date: 1-Feb-2008.
  919. ACM
    Lu T and Hsu L Hierarchical watermarking technique of distortion control mechanism Proceedings of the 2nd international conference on Ubiquitous information management and communication, (339-346)
  920. Charbouillot S, Pérez A and Fronte D (2008). A programmable hardware cellular automaton, VLSI Design, 2008:2, (1-7), Online publication date: 15-Jan-2008.
  921. Wu Y and Pang H (2008). A light weight buyer-seller watermarking protocol, Advances in Multimedia, 2008:2, (1-7), Online publication date: 1-Jan-2008.
  922. Wang Y, Wong D and Wang H (2008). Employ a mobile agent for making a payment, Mobile Information Systems, 4:1, (51-68), Online publication date: 1-Jan-2008.
  923. Menard D, Serizel R, Rocher R and Sentieys O (2008). Accuracy constraint determination in fixed-point system design, EURASIP Journal on Embedded Systems, 2008, (1-12), Online publication date: 1-Jan-2008.
  924. ACM
    Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C and Rubens H (2008). ODSBR, ACM Transactions on Information and System Security, 10:4, (1-35), Online publication date: 1-Jan-2008.
  925. ACM
    Oorschot P and Thorpe J (2008). On predictive models and user-drawn graphical passwords, ACM Transactions on Information and System Security, 10:4, (1-33), Online publication date: 1-Jan-2008.
  926. ACM
    Bouganim L, Ngoc F and Pucheral P (2008). Dynamic access-control policies on XML encrypted data, ACM Transactions on Information and System Security, 10:4, (1-37), Online publication date: 1-Jan-2008.
  927. Teranishi I, Oyama T and Ogata W (2008). General Conversion for Obtaining Strongly Existentially Unforgeable Signatures, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (94-106), Online publication date: 1-Jan-2008.
  928. Hirose S (2008). Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (74-82), Online publication date: 1-Jan-2008.
  929. Uddin M, Nohara Y, Ikeda D and Yasuura H (2008). A Multi-Application Smart Card System with Authentic Post-Issuance Program Modification, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (229-235), Online publication date: 1-Jan-2008.
  930. Yoshino M, Okeya K and Vuillaume C (2008). Montgomery Multiplication with Twice the Bit-Length of Multipliers, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (203-210), Online publication date: 1-Jan-2008.
  931. Moss A, Page D and Smart N Toward acceleration of RSA using 3D graphics hardware Proceedings of the 11th IMA international conference on Cryptography and coding, (364-383)
  932. Bentahar K and Smart N Efficient 15,360-bit RSA using woop-optimised montgomery arithmetic Proceedings of the 11th IMA international conference on Cryptography and coding, (346-363)
  933. Rizomiliotis P Remarks on the new attack on the filter generator and the role of high order complexity Proceedings of the 11th IMA international conference on Cryptography and coding, (204-219)
  934. Aciiçmez O, Gueron S and Seifert J New branch prediction vulnerabilities in openSSL and necessary software countermeasures Proceedings of the 11th IMA international conference on Cryptography and coding, (185-203)
  935. Mitchell C Cryptanalysis of the EPBC authenticated encryption mode Proceedings of the 11th IMA international conference on Cryptography and coding, (118-128)
  936. Kolokotronis N, Limniotis K and Kalouptsidis N Efficient computation of the best quadratic approximations of cubic boolean functions Proceedings of the 11th IMA international conference on Cryptography and coding, (73-91)
  937. Mitchell C Cryptanalysis of the EPBC Authenticated Encryption Mode Cryptography and Coding, (118-128)
  938. Moss A, Page D and Smart N Toward Acceleration of RSA Using 3D Graphics Hardware Cryptography and Coding, (364-383)
  939. Bentahar K and Smart N Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic Cryptography and Coding, (346-363)
  940. Acıiçmez O, Gueron S and Seifert J New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures Cryptography and Coding, (185-203)
  941. Yoon E and Yoo K Token-based authenticated key establishment protocols for three-party communication Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing, (758-769)
  942. Clavier C An improved SCARE cryptanalysis against a secret A3/A8 GSM algorithm Proceedings of the 3rd international conference on Information systems security, (143-155)
  943. Clavier C An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm Information Systems Security, (143-155)
  944. Aguirre J, Álvarez R, Tortosa L and Zamora A Fast pseudorandom generator based on packed matrices Proceedings of the 6th WSEAS international conference on Information security and privacy, (98-101)
  945. Climent J, Ferrández F and Tomás V Construction of a convolutional code based symmetric cryptosystem Proceedings of the 6th WSEAS international conference on Information security and privacy, (48-51)
  946. Simhalu S and Takeda K Browser based agile e-voting system Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security, (62-69)
  947. Burman S, Mukhopadhyay D and Veezhinathan K LFSR based stream ciphers are vulnerable to power attacks Proceedings of the cryptology 8th international conference on Progress in cryptology, (384-392)
  948. Zhang M Computationally-efficient password authenticated key exchange based on quadratic residues Proceedings of the cryptology 8th international conference on Progress in cryptology, (312-321)
  949. Gopalakrishnan K, Thériault N and Yao C Solving discrete logarithms from partial knowledge of the key Proceedings of the cryptology 8th international conference on Progress in cryptology, (224-237)
  950. Peyrin T Cryptanalysis of GRINDAHL Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security, (551-567)
  951. Boyen X Miniature CCA2 PK encryption Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security, (485-501)
  952. Hirose S, Park J and Yun A A simple variant of the Merkle-Damgård scheme with a permutation Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security, (113-129)
  953. Choo K (2007). An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker, Informatica, 18:4, (547-568), Online publication date: 1-Dec-2007.
  954. Wierzbicki A and Kaszuba T (2007). Practical trust management without reputation in peer-to-peer games, Multiagent and Grid Systems, 3:4, (411-428), Online publication date: 1-Dec-2007.
  955. Bugliesi M, Focardi R and Maffei M (2007). Dynamic types for authentication, Journal of Computer Security, 15:6, (563-617), Online publication date: 1-Dec-2007.
  956. Langheinrich M and Marti R RFID privacy using spatially distributed shared secrets Proceedings of the 4th international conference on Ubiquitous computing systems, (1-16)
  957. ACM
    Aciiçmez O Yet another MicroArchitectural Attack: Proceedings of the 2007 ACM workshop on Computer security architecture, (11-18)
  958. ACM
    Nair S, Djordjevic I, Crispo B and Dimitrakos T Secure web service federation management using tpm virtualisation Proceedings of the 2007 ACM workshop on Secure web services, (73-82)
  959. Matsuda T, Attrapadung N, Hanaoka G, Matsuura K and Imai H A CDH-based strongly unforgeable signature without collision resistant hash function Proceedings of the 1st international conference on Provable security, (68-84)
  960. Tartary C, Wang H and Pieprzyk J An hybrid approach for efficient multicast stream authentication over unsecured channels Proceedings of the 1st international conference on Provable security, (17-34)
  961. Zhu F, Zhu W, Mutka M and Ni L (2007). Private and Secure Service Discovery via Progressive and Probabilistic Exposure, IEEE Transactions on Parallel and Distributed Systems, 18:11, (1565-1577), Online publication date: 1-Nov-2007.
  962. Bresson E, Manulis M and Schwenk J On security models and compilers for group key exchange protocols Proceedings of the Security 2nd international conference on Advances in information and computer security, (292-307)
  963. ACM
    Troncoso C, Danezis G, Kosta E and Preneel B Pripayd Proceedings of the 2007 ACM workshop on Privacy in electronic society, (99-107)
  964. ACM
    Kerschbaum F Distance-preserving pseudonymization for timestamps and spatial data Proceedings of the 2007 ACM workshop on Privacy in electronic society, (68-71)
  965. ACM
    Jakubowski M and Venkatesan R Randomized radon transforms for biometric authentication via fingerprint hashing Proceedings of the 2007 ACM workshop on Digital Rights Management, (90-94)
  966. ACM
    Kirkels B, Maas M and Roelse P A security architecture for pay-per-view business models in conditional access systems Proceedings of the 2007 ACM workshop on Digital Rights Management, (1-9)
  967. ACM
    Köpf B and Basin D An information-theoretic model for adaptive side-channel attacks Proceedings of the 14th ACM conference on Computer and communications security, (286-296)
  968. Nakahara J and Pavão I Impossible-differential attacks on large-block Rijndael Proceedings of the 10th international conference on Information Security, (104-117)
  969. Lee J, Tehranipoor M, Patel C and Plusquellic J (2007). Securing Designs against Scan-Based Side-Channel Attacks, IEEE Transactions on Dependable and Secure Computing, 4:4, (325-336), Online publication date: 1-Oct-2007.
  970. Kuwakado H and Morii M (2007). Indifferentiability of Single-Block-Length and Rate-1 Compression Functions, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:10, (2301-2308), Online publication date: 1-Oct-2007.
  971. Zhang Y and Fang Y (2007). A secure authentication and billing architecture for wireless mesh networks, Wireless Networks, 13:5, (663-678), Online publication date: 1-Oct-2007.
  972. Adelsbach A and Greveler U Insider attacks enabling data broadcasting on crypto-enforced unicast links Proceedings of the 12th European conference on Research in Computer Security, (469-484)
  973. Di Pietro R and Molva R Information confinement, privacy, and security in RFID systems Proceedings of the 12th European conference on Research in Computer Security, (187-202)
  974. Nedjah N and de Macedo Mourelle L Evolutionary design of resilient substitution boxes Proceedings of the 7th international conference on Evolvable systems: from biology to hardware, (403-414)
  975. Li X, Ma J and Moon S Security analysis of the authentication modules of Chinese WLAN standard and its implementation plan Proceedings of the 2007 IFIP international conference on Network and parallel computing, (306-314)
  976. Keller J and Wiese H Period lengths of chaotic pseudo-random number generators Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security, (7-11)
  977. Bogdanov A, Knudsen L, Leander G, Paar C, Poschmann A, Robshaw M, Seurin Y and Vikkelsoe C PRESENT Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (450-466)
  978. Dejean G and Kirovski D RF-DNA Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (346-363)
  979. Harrison O and Waldron J AES Encryption Implementation and Analysis on Commodity Graphics Processing Units Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (209-226)
  980. Yoshida H, Watanabe D, Okeya K, Kitahara J, Wu H, Küçük Ö and Preneel B MAME Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (148-165)
  981. Joye M Highly Regular Right-to-Left Algorithms for Scalar Multiplication Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems, (135-147)
  982. ACM
    Conti M, Di Pietro R, Mancini L and Mei A A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, (80-89)
  983. Bonifati A and Cuzzocrea A XlPPX Proceedings of the 8th international conference on E-commerce and web technologies, (21-34)
  984. Sakamoto C, De Marco G, Yaegashi R, Tadauchi M and Barolli L SKEMON Proceedings of the 1st international conference on Network-based information systems, (108-117)
  985. ACM
    Maddi S and Srinivas M A unified and reconfigurable Montgomery Multiplier architecture without four-to-two CSA Proceedings of the 20th annual conference on Integrated circuits and systems design, (147-152)
  986. Alho T, Hämäläinen P, Hännikäinen M and Hämäläinen T (2007). Compact modular exponentiation accelerator for modern FPGA devices, Computers and Electrical Engineering, 33:5-6, (383-391), Online publication date: 1-Sep-2007.
  987. Sakiyama K, Batina L, Preneel B and Verbauwhede I (2007). HW/SW co-design for public-key cryptosystems on the 8051 micro-controller, Computers and Electrical Engineering, 33:5-6, (324-332), Online publication date: 1-Sep-2007.
  988. Fournaris A and Koufopavlou O (2007). Applying systolic multiplication-inversion architectures based on modified extended Euclidean algorithm for GF(2k) in elliptic curve cryptography, Computers and Electrical Engineering, 33:5-6, (333-348), Online publication date: 1-Sep-2007.
  989. Mitchell C, Piper F and Wild P (2007). ID-based cryptography using symmetric primitives, Designs, Codes and Cryptography, 44:1-3, (249-262), Online publication date: 1-Sep-2007.
  990. Erat M, Danişman K, Ergün S, Kanak A and Kayaoglu M An embedded fingerprint authentication system integrated with a hardware-based truly random number generator Proceedings of the 12th international conference on Computer analysis of images and patterns, (366-373)
  991. Izquierdo A, Torres J, Sierra J and Carbonell M Using adaptative encryption for ubiquitous environments Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II, (540-548)
  992. Goi B, Phan R and Chuah H Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I, (951-960)
  993. Dai H and Yeh C Content-based image watermarking via public-key cryptosystems Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I, (937-950)
  994. Yoon E, Lee W and Yoo K Improving the single-assumption authenticated Diffie-Hellman key agreement protocols Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I, (926-936)
  995. Ting G, Goi B and Heng S A fragile watermarking scheme protecting originator's rights for multimedia service Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I, (644-654)
  996. Canetti R, Rivest R, Sudan M, Trevisan L, Vadhan S and Wee H Amplifying collision resistance Proceedings of the 27th annual international cryptology conference on Advances in cryptology, (264-283)
  997. Gouget A and Sibert H Revisiting correlation-immunity in filter generators Proceedings of the 14th international conference on Selected areas in cryptography, (378-395)
  998. Baignères T, Stern J and Vaudenay S Linear cryptanalysis of non binary ciphers Proceedings of the 14th international conference on Selected areas in cryptography, (184-211)
  999. Khazaei S, Fischer S and Meier W Reduced complexity attacks on the alternating step generator Proceedings of the 14th international conference on Selected areas in cryptography, (1-16)
  1000. ACM
    Hoeper K and Chen L Where EAP security claims fail The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops, (1-7)
  1001. ACM
    Zhang C, Sun X, Lin X and Ho P A keyless facility access control system with wireless enabled personal devices The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops, (1-7)
  1002. Zovi D An encrypted payload protocol and target-side scripting engine Proceedings of the first USENIX workshop on Offensive Technologies, (1-8)
  1003. Jakubowska G and Penczek W (2007). Modelling and Checking Timed Authentication of Security Protocols, Fundamenta Informaticae, 79:3-4, (363-378), Online publication date: 1-Aug-2007.
  1004. Jo J, Seo J and Lee H Biometric digital signature key generation and cryptography communication based on fingerprint Proceedings of the 1st annual international conference on Frontiers in algorithmics, (38-49)
  1005. Kong J, Hong X and Gerla M (2007). An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, 6:8, (888-902), Online publication date: 1-Aug-2007.
  1006. Komninos N, Vergados D and Douligeris C (2007). Authentication in a layered security approach for mobile ad hoc networks, Computers and Security, 26:5, (373-380), Online publication date: 1-Aug-2007.
  1007. Margaronis P, Kostantinos L, Stefanos G and Emmanouil A Digital design of a cryptographic card (LAM) embedded smart card reader Proceedings of the 11th WSEAS International Conference on Computers, (571-576)
  1008. Lee H and Kwon T Biometric digital key mechanisms for telebiometric authentication based on biometric certificate Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity, (428-437)
  1009. Kim J, Kim Y, Lee H and Lee D A practical inter-sensor broadcast authentication scheme Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity, (399-405)
  1010. Bresson E and Manulis M Malicious participants in group key exchange Proceedings of the 4th international conference on Autonomic and Trusted Computing, (395-409)
  1011. Adida B and Wikström D Offline/online mixing Proceedings of the 34th international conference on Automata, Languages and Programming, (484-495)
  1012. Chaki S, Schallhart C and Veith H Verification across intellectual property boundaries Proceedings of the 19th international conference on Computer aided verification, (82-94)
  1013. Whelan C and Scott M The importance of the final exponentiation in pairings when considering fault attacks Proceedings of the First international conference on Pairing-Based Cryptography, (225-246)
  1014. Devegili A, Scott M and Dahab R Implementing cryptographic pairings over barreto-naehrig curves Proceedings of the First international conference on Pairing-Based Cryptography, (197-207)
  1015. Scott M Implementing cryptographic pairings Proceedings of the First international conference on Pairing-Based Cryptography, (177-196)
  1016. Singelée D and Preneel B Distance bounding in noisy environments Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, (101-115)
  1017. Uhsadel L, Poschmann A and Paar C Enabling full-size public-key algorithms on 8-bit sensor nodes Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, (73-86)
  1018. Hoepman J Private handshakes Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, (31-42)
  1019. Kirovski D, Sinclair M and Wilson D The Martini Synch Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, (16-30)
  1020. Tartary C and Wang H Combining prediction hashing and MDS codes for efficient multicast stream authentication Proceedings of the 12th Australasian conference on Information security and privacy, (293-307)
  1021. Yoshino M, Okeya K and Vuillaume C Double-size bipartite modular multiplication Proceedings of the 12th Australasian conference on Information security and privacy, (230-244)
  1022. Billet O, Robshaw M and Peyrin T On building hash functions from multivariate quadratic equations Proceedings of the 12th Australasian conference on Information security and privacy, (82-95)
  1023. Babbage S, Cid C, Pramstaller N and Raddum H An analysis of the Hermes8 stream ciphers Proceedings of the 12th Australasian conference on Information security and privacy, (1-10)
  1024. ACM
    Bresson E, Chevassut O and Pointcheval D (2007). Provably secure authenticated group Diffie-Hellman key exchange, ACM Transactions on Information and System Security, 10:3, (10-es), Online publication date: 1-Jul-2007.
  1025. Tseng Y (2007). A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy, Journal of Systems and Software, 80:7, (1091-1101), Online publication date: 1-Jul-2007.
  1026. Martina J, de Souza T and Custodio R OpenHSM Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (220-235)
  1027. Narasimha M and Tsudik G Privacy-preserving revocation checking with modified CRLs Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (18-33)
  1028. Øverlier L and Syverson P Improving efficiency and simplicity of Tor circuit establishment and hidden services Proceedings of the 7th international conference on Privacy enhancing technologies, (134-152)
  1029. Kate A, Zaverucha G and Goldberg I Pairing-based onion routing Proceedings of the 7th international conference on Privacy enhancing technologies, (95-112)
  1030. Calixto M Physical Basis of Quantum Computation and Cryptography Proceedings of the 2nd international work-conference on The Interplay Between Natural and Artificial Computation, Part I: Bio-inspired Modeling of Cognitive Tasks, (21-30)
  1031. Kotla R, Alvisi L and Dahlin M SafeStore 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, (1-14)
  1032. ACM
    Tashev T The period of the LFSR based generalized shrinking-multiplexing generator Proceedings of the 2007 international conference on Computer systems and technologies, (1-6)
  1033. ACM
    Tashev T, Bedzhev B and Tasheva Z The generalized shrinking-multiplexing generator Proceedings of the 2007 international conference on Computer systems and technologies, (1-6)
  1034. ACM
    Stoyanov B, Bedzhev B, Tashev T and Vasileva S Application and statistic testing of the 5-adic summation-shrinking generator Proceedings of the 2007 international conference on Computer systems and technologies, (1-4)
  1035. ACM
    Tolia N, Satyanarayanan M and Wolbach A Improving mobile database access over wide-area networks without degrading consistency Proceedings of the 5th international conference on Mobile systems, applications and services, (71-84)
  1036. Bakhshi B and Sadeghiyan B A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA Proceedings of the 5th international conference on Applied Cryptography and Network Security, (129-140)
  1037. Shirase M, Han D, Hibino Y, Kim H and Takagi T Compressed XTR Proceedings of the 5th international conference on Applied Cryptography and Network Security, (420-431)
  1038. Gong G Randomness and representation of span n sequences Proceedings of the 2007 international conference on Sequences, subsequences, and consequences, (192-203)
  1039. Margaronis P, Kostantinos L, Stefanos G, Emmanouil A and Iraklis R Digital design of a key synchronization system on a FPGA for a network use Proceedings of the 6th conference on Microelectronics, nanoelectronics, optoelectronics, (19-25)
  1040. Margaronis P, Kostantinos L, Stefanos G, Emmanouil A and Ilias C Design and implementation of a cipher system (LAM) on a FPGA based on PCI architecture Proceedings of the 6th conference on Microelectronics, nanoelectronics, optoelectronics, (12-18)
  1041. Shi-Hui P, Yong-Zhe Z and Hong-Wei Z Construct public key encryption scheme using ergodic matrices over GF(2) Proceedings of the 4th international conference on Theory and applications of models of computation, (181-188)
  1042. Song S and JaJa J New techniques for ensuring the long term integrity of digital archives Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains, (57-65)
  1043. Kaya S, Savas E, Levi A and Erçetin Ö Privacy-aware multi-context RFID infrastructure using public key cryptography Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet, (263-274)
  1044. Boscher A, Naciri R and Prouff E CRT RSA algorithm protected against fault attacks Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems, (229-243)
  1045. Yoon E, Lee W and Yoo K Secure remote user authentication scheme using bilinear pairings Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems, (102-114)
  1046. ACM
    Tolia N and Satyanarayanan M Consistency-preserving caching of dynamic database content Proceedings of the 16th international conference on World Wide Web, (311-320)
  1047. Baek Y and Vasyltsov I How to prevent DPA and fault attack in a unified way for ECC scalar multiplication Proceedings of the 3rd international conference on Information security practice and experience, (225-237)
  1048. ACM
    Shi W and Lee H Accelerating memory decryption and authentication with frequent value prediction Proceedings of the 4th international conference on Computing frontiers, (35-46)
  1049. Diguet J, Evain S, Vaslin R, Gogniat G and Juin E NOC-centric Security of Reconfigurable SoC Proceedings of the First International Symposium on Networks-on-Chip, (223-232)
  1050. Ayday E, Delgosha F and Fekri F Location-Aware Security Services for Wireless Sensor Networks Using Network Coding Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (1226-1234)
  1051. Yitao Duan and Canny J Scalable Secure Bidirectional Group Communication Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, (875-883)
  1052. Shih D, Lin B and Huang S (2007). MoRVAM, Expert Systems with Applications: An International Journal, 32:4, (1113-1123), Online publication date: 1-May-2007.
  1053. Phan R (2007). Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks, Computer Standards & Interfaces, 29:4, (444-448), Online publication date: 1-May-2007.
  1054. Katos V and Doherty B (2007). Exploring confusion in product ciphers through regression analysis, Information Sciences: an International Journal, 177:8, (1789-1795), Online publication date: 20-Apr-2007.
  1055. Jakubowska G and Penczek W Is your security protocol on time? Proceedings of the 2007 international conference on Fundamentals of software engineering, (65-80)
  1056. Ge H and Tate S A direct anonymous attestation scheme for embedded devices Proceedings of the 10th international conference on Practice and theory in public-key cryptography, (16-30)
  1057. Alho T, Hämäläinen P, Hännikäinen M and Hämäläinen T Compact hardware design of Whirlpool hashing core Proceedings of the conference on Design, automation and test in Europe, (1247-1252)
  1058. ACM
    Merwe J, Dawoud D and McDonald S (2007). A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, 39:1, (1-es), Online publication date: 12-Apr-2007.
  1059. Nedjah N and Mourelle L (2007). Designing substitution boxes for secure ciphers, International Journal of Innovative Computing and Applications, 1:1, (86-91), Online publication date: 1-Apr-2007.
  1060. Youssef A (2007). Generalized hyper-bent functions over GF(p), Discrete Applied Mathematics, 155:8, (1066-1070), Online publication date: 1-Apr-2007.
  1061. Seurin Y and Peyrin T Security analysis of constructions combining FIL random oracles Proceedings of the 14th international conference on Fast Software Encryption, (119-136)
  1062. ACM
    Aciiçmez O, Koç Ç and Seifert J On the power of simple branch prediction analysis Proceedings of the 2nd ACM symposium on Information, computer and communications security, (312-320)
  1063. ACM
    Li Y and Ding X Protecting RFID communications in supply chains Proceedings of the 2nd ACM symposium on Information, computer and communications security, (234-241)
  1064. ACM
    Kubiak P, Kutyłowski M and Zagórski F Kleptographic attacks on a cascade of mix servers Proceedings of the 2nd ACM symposium on Information, computer and communications security, (57-62)
  1065. Misic J, Khan M and Amini F Performance of Key Distribution in 802.15.4 Beacon Enabled Cluster Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (4354-4359)
  1066. Insun Lee , Jihoon Lee and Daeyoung Kim Efficient Distributed Authentication Method with Local Proxy for Wireless Mesh Networks Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3553-3557)
  1067. Yongdong Wu , Lakshminarayanan A and Zhigang Zhao A Trust Answer to Distance Query Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (2703-2708)
  1068. Khabbazian M, Gulliver T and Bhargava V (2007). Double Point Compression with Applications to Speeding Up Random Point Multiplication, IEEE Transactions on Computers, 56:3, (305-313), Online publication date: 1-Mar-2007.
  1069. ACM
    Siponen M and Oinas-Kukkonen H (2007). A review of information security issues and respective research contributions, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38:1, (60-80), Online publication date: 28-Feb-2007.
  1070. Adida B and Wikström D How to shuffle in public Proceedings of the 4th conference on Theory of cryptography, (555-574)
  1071. ACM
    Gueneysu T, Paar C and Pelzl J Attacking elliptic curve cryptosystems with special-purpose hardware Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays, (207-215)
  1072. ACM
    Wilton S, Ho C, Leong P, Luk W and Quinton B A synthesizable datapath-oriented embedded FPGA fabric Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays, (33-41)
  1073. Rechberger C and Rijmen V On authentication with HMAC and non-random properties Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, (119-133)
  1074. Glabb R, Imbert L, Jullien G, Tisserand A and Veyrat-Charvillon N (2007). Multi-mode operator for SHA-2 hash functions, Journal of Systems Architecture: the EUROMICRO Journal, 53:2-3, (127-138), Online publication date: 1-Feb-2007.
  1075. Bernard F (2007). Scalable hardware implementing high-radix Montgomery multiplication algorithm, Journal of Systems Architecture: the EUROMICRO Journal, 53:2-3, (117-126), Online publication date: 1-Feb-2007.
  1076. Önen M and Molva R Secure data aggregation with multiple encryption Proceedings of the 4th European conference on Wireless sensor networks, (117-132)
  1077. Chung J and Hasan M (2007). Low-Weight Polynomial Form Integers for Efficient Modular Multiplication, IEEE Transactions on Computers, 56:1, (44-57), Online publication date: 1-Jan-2007.
  1078. Hars L and Petruska G (2007). Pseudorandom recursions, EURASIP Journal on Embedded Systems, 2007:1, (5-5), Online publication date: 1-Jan-2007.
  1079. Hars L (2007). Applications of fast truncated multiplication in cryptography, EURASIP Journal on Embedded Systems, 2007:1, (3-3), Online publication date: 1-Jan-2007.
  1080. Luh W, Kundur D and Zourntos T (2007). A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems, EURASIP Journal on Advances in Signal Processing, 2007:1, (218-218), Online publication date: 1-Jan-2007.
  1081. Ramasamy H, Agbaria A and Sanders W (2007). A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution, IEEE Transactions on Dependable and Secure Computing, 4:1, (1-17), Online publication date: 1-Jan-2007.
  1082. Pang Y, Andrew T and David N (2007). Two-factor cancelable biometrics authenticator, Journal of Computer Science and Technology, 22:1, (54-59), Online publication date: 1-Jan-2007.
  1083. Lee C, Chen Y, Chiou C and Lin J (2007). Unified parallel systolic multiplier over GF(2m), Journal of Computer Science and Technology, 22:1, (28-38), Online publication date: 1-Jan-2007.
  1084. Pathan A, Dai T and Hong C A key management scheme with encoding and improved security for wireless sensor networks Proceedings of the Third international conference on Distributed Computing and Internet Technology, (102-115)
  1085. Saha M and RoyChowdhury D Design of key establishment protocol using one-way functions to avert insider-replay attack Proceedings of the Second international conference on Information Systems Security, (194-204)
  1086. Wu H and Cheung Y Public Authentication of 3D Mesh Models Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (940-948)
  1087. An X, Jutla D and Cercone N A Bayesian Network Approach to Detecting Privacy Intrusion Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, (73-76)
  1088. Pisarchik A and Flores-Carmona N Computer algorithms for direct encryption and decryption of digital images for secure communication Proceedings of the 6th WSEAS international conference on Applied computer science, (29-34)
  1089. Mendel F, Preneel B, Rijmen V, Yoshida H and Watanabe D Update on tiger Proceedings of the 7th international conference on Cryptology in India, (63-79)
  1090. Buchmann J, García L, Dahmen E, Döring M and Klintsevich E CMSS Proceedings of the 7th international conference on Cryptology in India, (349-363)
  1091. Teranishi I, Oyama T and Ogata W General conversion for obtaining strongly existentially unforgeable signatures Proceedings of the 7th international conference on Cryptology in India, (191-205)
  1092. Menezes A and Ustaoglu B On the importance of public-key validation in the MQV and HMQV key agreement protocols Proceedings of the 7th international conference on Cryptology in India, (133-147)
  1093. Shi W and Lee H Authentication Control Point and Its Implications For Secure Processor Design Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, (103-112)
  1094. ACM
    Großschädl J TinySA Proceedings of the 2006 ACM CoNEXT conference, (1-2)
  1095. ACM
    Parno B, Luk M, Gaustad E and Perrig A Secure sensor network routing Proceedings of the 2006 ACM CoNEXT conference, (1-13)
  1096. Zhang B and Feng D New guess-and-determine attack on the self-shrinking generator Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security, (54-68)
  1097. Peyrin T, Gilbert H, Muller F and Robshaw M Combining compression functions and block cipher-based hash functions Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security, (315-331)
  1098. Teoh A, Goh A and Ngo D (2006). Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs, IEEE Transactions on Pattern Analysis and Machine Intelligence, 28:12, (1892-1901), Online publication date: 1-Dec-2006.
  1099. Munilla J and Peinado A (2006). Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol, Computer Communications, 30:1, (52-54), Online publication date: 1-Dec-2006.
  1100. Zhang X, Pieprzyk J and Zheng Y On algebraic immunity and annihilators Proceedings of the 9th international conference on Information Security and Cryptology, (65-80)
  1101. Shpilrain V Hashing with polynomials Proceedings of the 9th international conference on Information Security and Cryptology, (22-28)
  1102. Muller F and Peyrin T Cryptanalysis of t-function-based hash functions Proceedings of the 9th international conference on Information Security and Cryptology, (267-285)
  1103. Geiselmann W, Januszewski F, Köpfer H, Pelzl J and Steinwandt R A simpler sieving device Proceedings of the 9th international conference on Information Security and Cryptology, (118-135)
  1104. Yi J Energy-efficient and non-interactive self-certification in MANETs Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems, (533-547)
  1105. Dolev S and Kopeetsky M Secure communication for RFIDs proactive information security within computational security Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems, (290-303)
  1106. ACM
    Isshiki T, Mori K, Sako K, Teranishi I and Yonezawa S Using group signatures for identity management and its implementation Proceedings of the second ACM workshop on Digital identity management, (73-78)
  1107. Phan R and Siddiqi M (2006). A Framework for Describing Block Cipher Cryptanalysis, IEEE Transactions on Computers, 55:11, (1402-1409), Online publication date: 1-Nov-2006.
  1108. Bonifati A and Cuzzocrea A (2006). Storing and retrieving XPath fragments in structured P2P networks, Data & Knowledge Engineering, 59:2, (247-269), Online publication date: 1-Nov-2006.
  1109. Erguler I and Anarim E A lookup table model for time-memory trade-off attacks on binary additive stream ciphers Proceedings of the 21st international conference on Computer and Information Sciences, (918-923)
  1110. Yavuz A, Alagoz F and Anarim E HIMUTSIS Proceedings of the 21st international conference on Computer and Information Sciences, (434-444)
  1111. Hernández-Goya C and Fúster-Sabater A Deterministic analysis of balancedness in symmetric cryptography Proceedings of the 21st international conference on Computer and Information Sciences, (1011-1020)
  1112. Lei F, Chen W and Chen K A non-committing encryption scheme based on quadratic residue Proceedings of the 21st international conference on Computer and Information Sciences, (972-980)
  1113. ACM
    Luk M, Perrig A and Whillock B Seven cardinal properties of sensor network broadcast authentication Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, (147-156)
  1114. ACM
    Chung H and Neuman C Modelling the relative strength of security protocols Proceedings of the 2nd ACM workshop on Quality of protection, (45-48)
  1115. ACM
    Langweg H Framework for malware resistance metrics Proceedings of the 2nd ACM workshop on Quality of protection, (39-44)
  1116. Yoon E and Yoo K Improving the dynamic ID-Based remote mutual authentication scheme Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (499-507)
  1117. Wierzbicki A Trust enforcement in peer-to-peer massive multi-player online games Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II, (1163-1180)
  1118. Platte J, Díaz R and Naroska E A new encryption and hashing scheme for the security architecture for microprocessors Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (120-129)
  1119. Yoon E and Yoo K An optimizing authenticated key exchange protocol for self-organizing sensor networks Proceedings of the Third international conference on Ubiquitous Computing Systems, (537-546)
  1120. Hong D, Sung J, Hong S, Lim J, Lee S, Koo B, Lee C, Chang D, Lee J, Jeong K, Kim H, Kim J and Chee S HIGHT Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems, (46-59)
  1121. Brier E, Chevallier-Mames B, Ciet M and Clavier C Why one should also secure RSA public key elements Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems, (324-338)
  1122. Joye M and Paillier P Fast generation of prime numbers on portable devices Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems, (160-173)
  1123. Scott M, Costigan N and Abdulwahab W Implementing cryptographic pairings on smartcards Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems, (134-147)
  1124. Breveglieri L, Koren I, Maistri P and Ravasio M Incorporating error detection in an RSA architecture Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography, (71-79)
  1125. Yen S, Kim D and Moon S Cryptanalysis of two protocols for RSA with CRT based on fault infection Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography, (53-61)
  1126. Amiel F, Clavier C and Tunstall M Fault analysis of DPA-Resistant algorithms Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography, (223-236)
  1127. De Gregorio A Cryptographic key reliable lifetimes Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography, (144-158)
  1128. Lee M and Choi Y An easily testable and reconfigurable pipeline for symmetric block ciphers Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography, (121-130)
  1129. Gueron S and Seifert J Is it wise to publish your public RSA keys? Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography, (1-12)
  1130. Westhoff D, Girao J and Acharya M (2006). Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks, IEEE Transactions on Mobile Computing, 5:10, (1417-1431), Online publication date: 1-Oct-2006.
  1131. ACM
    Li Z, Xu W, Miller R and Trappe W Securing wireless systems via lower layer enforcements Proceedings of the 5th ACM workshop on Wireless security, (33-42)
  1132. ACM
    Singelée D and Preneel B Location privacy in wireless personal area networks Proceedings of the 5th ACM workshop on Wireless security, (11-18)
  1133. Seo J, Kim Y, Park E, Lee S, Shon T and Moon J Design and implementation of a patch management system to remove security vulnerability in multi-platforms Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery, (716-724)
  1134. del Rey A A protocol to provide assurance of images integrity using memory cellular automata Proceedings of the 7th international conference on Cellular Automata for Research and Industry, (627-635)
  1135. Jeon J and Yoo K Authentication based on singular cellular automata Proceedings of the 7th international conference on Cellular Automata for Research and Industry, (605-610)
  1136. Kurkowski M and Srebrny M (2006). A Quantifier-free First-order Knowledge Logic of Authentication, Fundamenta Informaticae, 72:1-3, (263-282), Online publication date: 15-Sep-2006.
  1137. Alioto M, Poli M, Rocchi S and Vignoli V Techniques to enhance the resistance of precharged busses to differential power analysis Proceedings of the 16th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation, (624-633)
  1138. Alioto M, Poli M, Rocchi S and Vignoli V Power modeling of precharged address bus and application to multi-bit DPA attacks to DES algorithm Proceedings of the 16th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation, (593-602)
  1139. Elbaz R, Torres L, Sassatelli G, Guillemin P, Bardouillet M and Martinez A A comparison of two approaches providing data encryption and authentication on a processor memory bus Proceedings of the 16th international conference on Integrated Circuit and System Design: power and Timing Modeling, Optimization and Simulation, (267-279)
  1140. Erat M, Danışman K, Ergün S and Kanak A A hardware-implemented truly random key generator for secure biometric authentication systems Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security, (128-135)
  1141. Li H, Aghili S, Agrawal D and El Abbadi A FLUX Proceedings of the 4th international conference on Database and XML Technologies, (61-76)
  1142. Daemen J and Van Assche G Distinguishing stream ciphers with convolutional filters Proceedings of the 5th international conference on Security and Cryptography for Networks, (257-270)
  1143. Kunz-Jacques S and Pointcheval D A new key exchange protocol based on MQV assuming public computations Proceedings of the 5th international conference on Security and Cryptography for Networks, (186-200)
  1144. Kunz-Jacques S and Pointcheval D About the security of MTI/C0 and MQV Proceedings of the 5th international conference on Security and Cryptography for Networks, (156-172)
  1145. ACM
    Sussman M, Crutchfield W and Papakipos M Pseudorandom number generation on the GPU Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, (87-94)
  1146. Deng R and Zhou Y (2006). Improvement to Montgomery Modular Inverse Algorithm, IEEE Transactions on Computers, 55:9, (1207-1210), Online publication date: 1-Sep-2006.
  1147. Bajard J, Imbert L and Negre C (2006). Arithmetic Operations in Finite Fields of Medium Prime Characteristic Using the Lagrange Representation, IEEE Transactions on Computers, 55:9, (1167-1177), Online publication date: 1-Sep-2006.
  1148. Sun H and Yeh H (2006). Password-based authentication and key distribution protocols with perfect forward secrecy, Journal of Computer and System Sciences, 72:6, (1002-1011), Online publication date: 1-Sep-2006.
  1149. Phan R, Goi B and Wong K (2006). Cryptanalysis of some improved password-authenticated key exchange schemes, Computer Communications, 29:15, (2822-2829), Online publication date: 1-Sep-2006.
  1150. Shao M, Wang G and Zhou J (2006). Some common attacks against certified email protocols and the countermeasures, Computer Communications, 29:15, (2759-2769), Online publication date: 1-Sep-2006.
  1151. Manzanares A, Sierra Camara J and Marquez J (2006). On the implementation of security policies with adaptative encryption, Computer Communications, 29:15, (2750-2758), Online publication date: 1-Sep-2006.
  1152. Aly H and Winterhof A (2006). On the k-error linear complexity over $$\mathbb{F}_p$$ of Legendre and Sidelnikov sequences, Designs, Codes and Cryptography, 40:3, (369-374), Online publication date: 1-Sep-2006.
  1153. Wolf C, Braeken A and Preneel B (2006). On the security of stepwise triangular systems, Designs, Codes and Cryptography, 40:3, (285-302), Online publication date: 1-Sep-2006.
  1154. Ryu J EAP using the split password-based authenticated key agreement Proceedings of the 7th international conference on Information security applications: PartI, (364-380)
  1155. Lee M, Min J, Kang S, Chung S, Kim H and Kim D Efficient implementation of pseudorandom functions for electronic seal protection protocols Proceedings of the 7th international conference on Information security applications: PartI, (173-186)
  1156. Juang W Efficient user authentication and key agreement in wireless sensor networks Proceedings of the 7th international conference on Information security applications: PartI, (15-29)
  1157. ACM
    Moratelli C, Cota Ï and Lubaszewski M A cryptography core tolerant to DFA fault attacks Proceedings of the 19th annual symposium on Integrated circuits and systems design, (190-195)
  1158. Saha I and Roy S A finite state modeling of AFDX frame management using spin Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology, (227-243)
  1159. Carlet C On the higher order nonlinearities of algebraic immune functions Proceedings of the 26th annual international conference on Advances in Cryptology, (584-601)
  1160. Wang M, Yen S, Wu C and Lin C Cryptanalysis on an Elgamal-like cryptosystem for encrypting large messages Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, (418-422)
  1161. Zhang B and Feng D Multi-pass fast correlation attack on stream ciphers Proceedings of the 13th international conference on Selected areas in cryptography, (234-248)
  1162. Yoshino M, Okeya K and Vuillaume C Unbridle the bit-length of a crypto-coprocessor with montgomery multiplication Proceedings of the 13th international conference on Selected areas in cryptography, (188-202)
  1163. Baignères T and Finiasz M Dial C for cipher Proceedings of the 13th international conference on Selected areas in cryptography, (76-95)
  1164. Mironov I and Zhang L Applications of SAT solvers to cryptanalysis of hash functions Proceedings of the 9th international conference on Theory and Applications of Satisfiability Testing, (102-115)
  1165. Yoon E and Yoo K Efficient mutual authentication scheme with smart card Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems, (813-818)
  1166. Grigoriev D and Ponomarenko I (2006). Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits, Applicable Algebra in Engineering, Communication and Computing, 17:3-4, (239-255), Online publication date: 1-Aug-2006.
  1167. Anshel I, Anshel M and Goldfeld D (2006). A Linear Time Matrix Key Agreement Protocol Over Small Finite Fields, Applicable Algebra in Engineering, Communication and Computing, 17:3-4, (195-203), Online publication date: 1-Aug-2006.
  1168. Lee S and Cho Y Efficient batch verification for RSA-Type digital signatures in a ubiquitous environment Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing, (336-344)
  1169. Mykletun E and Tsudik G Aggregation Queries in the Database-As-a-Service Model 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 4127, (89-103)
  1170. ACM
    Elbaz R, Torres L, Sassatelli G, Guillemin P, Bardouillet M and Martinez A A parallelized way to provide data encryption and integrity checking on a processor-memory bus Proceedings of the 43rd annual Design Automation Conference, (506-509)
  1171. Parsell S and Sorenson J Fast bounds on the distribution of smooth numbers Proceedings of the 7th international conference on Algorithmic Number Theory, (168-181)
  1172. Shihab K A cryptographic scheme based on neural networks Proceedings of the 10th WSEAS international conference on Communications, (7-12)
  1173. Zapico D, Sanjuan O and Joyanes L Confidentiality with mobile sessions for web servers based on objects serialization Proceedings of the 10th WSEAS international conference on Systems, (768-771)
  1174. Abarzúa R, Jirón I, Alfaro M and Soto I A new public key cryptography algorithm using chaotic systems and hyperelliptic curves Proceedings of the 10th WSEAS international conference on Systems, (764-767)
  1175. ACM
    Liu F, Rivera J and Cheng X Location-aware key establishment in wireless sensor networks Proceedings of the 2006 international conference on Wireless communications and mobile computing, (21-26)
  1176. Lee C, Kim J, Sung J, Hong S and Lee S Forgery and key recovery attacks on PMAC and mitchell's TMAC variant Proceedings of the 11th Australasian conference on Information Security and Privacy, (421-431)
  1177. Burmester M, Van Le T and de Medeiros B Towards provable security for ubiquitous applications Proceedings of the 11th Australasian conference on Information Security and Privacy, (295-312)
  1178. Hämäläinen P, Hännikäinen M, Hämäläinen T, Soininen R and Rautee R (2006). Design and implementation of real-time betting system with offline terminals, Electronic Commerce Research and Applications, 5:2, (170-188), Online publication date: 1-Jul-2006.
  1179. Dini G and Savino I An Efficient Key Revocation Protocol for Wireless Sensor Networks Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, (450-452)
  1180. Yoon E and Yoo K An improved lu-cao's remote user authentication scheme using smart card Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice, (45-53)
  1181. Zeng K Pseudonymous PKI for ubiquitous computing Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice, (207-222)
  1182. Yoon E and Yoo K Enhanced forward-secure user authentication scheme with smart cards Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice, (197-206)
  1183. Nedjah N and de Macedo Mourelle L A versatile pipelined hardware implementation for encryption and decryption using advanced encryption standard Proceedings of the 7th international conference on High performance computing for computational science, (249-259)
  1184. Saxena N Public key cryptography sans certificates in ad hoc networks Proceedings of the 4th international conference on Applied Cryptography and Network Security, (375-389)
  1185. Li X, Moon S and Ma J On the security of the authentication module of chinese WLAN standard implementation plan Proceedings of the 4th international conference on Applied Cryptography and Network Security, (340-348)
  1186. ACM
    Banerjee S and Mukhopadhyay D Symmetric key based authenticated querying in wireless sensor networks Proceedings of the first international conference on Integrated internet ad hoc and sensor networks, (22-es)
  1187. Cheon J Security analysis of the strong diffie-hellman problem Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (1-11)
  1188. Lin Q, Yin F and Liang H A fast decryption algorithm for BSS-Based image encryption Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III, (318-325)
  1189. Zhang Q and Li X On the generation of fast verifiable IPv6 addresses Proceedings of the 6th international conference on Computational Science - Volume Part IV, (176-179)
  1190. Encinas L, Masqué J and Dios A Maple implementation of the chor-rivest cryptosystem Proceedings of the 6th international conference on Computational Science - Volume Part II, (438-445)
  1191. Jeong Y, Lee B, Lee K and Lee S Efficient unilateral authentication mechanism for MIPv6 Proceedings of the 6th international conference on Computational Science - Volume Part I, (908-911)
  1192. Kountchev R, Todorov V, Kountcheva R and Milanova M Lossless compression of biometric image data Proceedings of the 5th WSEAS international conference on Signal processing, (185-190)
  1193. ACM
    Kirovski D and Jain K Off-line economies for digital media Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video, (1-6)
  1194. Omary F, Mouloudi A, Tragha A and Bellaachia A A new ciphering method associated with evolutionary algorithm Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (346-354)
  1195. Yoon E and Yoo K One-time password authentication scheme using smart cards providing user anonymity Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (303-311)
  1196. Lee H Lightweight wireless intrusion detection systems against DDoS attack Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (294-302)
  1197. Yoon E and Yoo K An improved popescu's authenticated key agreement protocol Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (276-283)
  1198. Algredo-Badillo I, Feregrino-Uribe C and Cumplido R Design and implementation of an FPGA-Based 1.452-gbps non-pipelined AES architecture Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III, (456-465)
  1199. Mukhopadhyay S and Sarkar P Application of LFSRs for parallel sequence generation in cryptologic algorithms Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III, (436-445)
  1200. Chan Y and Li J BGN authentication and its extension to convey message commitments Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III, (365-374)
  1201. Lee H Highly reliable synchronous stream cipher system for link encryption Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III, (269-278)
  1202. Hamid M, Rahman M and Hong C Energy conserving security mechanism for wireless sensor network Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II, (866-875)
  1203. Yoon E and Yoo K Various types of attacks and solutions regarding secure remote user access over insecure networks Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I, (1156-1165)
  1204. Bhargav-Spantzel A, Squicciarini A and Bertino E (2006). Establishing and protecting digital identity in federation systems, Journal of Computer Security, 14:3, (269-300), Online publication date: 1-May-2006.
  1205. Das M, Saxena A, Gulati V and Phatak D (2006). A novel remote user authentication scheme using bilinear pairings, Computers and Security, 25:3, (184-189), Online publication date: 1-May-2006.
  1206. Dijk M, Clarke D, Gassend B, Suh G and Devadas S (2006). Speeding up Exponentiation using an Untrusted Computational Resource, Designs, Codes and Cryptography, 39:2, (253-273), Online publication date: 1-May-2006.
  1207. Bini G (2006). A-Codes from Rational Functions over Galois Rings, Designs, Codes and Cryptography, 39:2, (207-214), Online publication date: 1-May-2006.
  1208. Boneh D, Shen E and Waters B Strongly unforgeable signatures based on computational diffie-hellman Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography, (229-240)
  1209. ACM
    Yu H, Jiang X and Vaidya J Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data Proceedings of the 2006 ACM symposium on Applied computing, (603-610)
  1210. Bakdi I Towards a secure and practical multifunctional smart card Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (16-31)
  1211. Fischer J and Prouff E Off-Line group signatures with smart cards Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (263-277)
  1212. Boscher A and Naciri R Optimal use of montgomery multiplication on smart cards Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (252-262)
  1213. Jin H Higher dependability and security for mobile applications Proceedings of the Third international conference on Security in Pervasive Computing, (89-103)
  1214. Mauw S, van Vessem I and Bos B Forward secure communication in wireless sensor networks Proceedings of the Third international conference on Security in Pervasive Computing, (32-42)
  1215. Narasimha M and Tsudik G Authentication of outsourced databases using signature aggregation and chaining Proceedings of the 11th international conference on Database Systems for Advanced Applications, (420-436)
  1216. Cheng Z, Chen L, Comley R and Tang Q Identity-based key agreement with unilateral identity privacy using pairings Proceedings of the Second international conference on Information Security Practice and Experience, (202-213)
  1217. Mathur C, Narayan K and Subbalakshmi K (2006). On the design of error-correcting ciphers, EURASIP Journal on Wireless Communications and Networking, 2006:2, (72-72), Online publication date: 2-Apr-2006.
  1218. Zhu F, Mutka M and Ni L (2006). A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols, IEEE Transactions on Mobile Computing, 5:4, (418-429), Online publication date: 1-Apr-2006.
  1219. Ben Salem N, Buttyan L, Hubaux J and Jakobsson M (2006). Node Cooperation in Hybrid Ad Hoc Networks, IEEE Transactions on Mobile Computing, 5:4, (365-376), Online publication date: 1-Apr-2006.
  1220. Sklavos N, Kitsos P, Papadopoulos K and Koufopavlou O (2006). Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security, The Journal of Supercomputing, 36:1, (33-50), Online publication date: 1-Apr-2006.
  1221. Isik S, Donmez M and Ersoy C (2006). Itinerant delivery of popular data via WIDE hot spots, Mobile Networks and Applications, 11:2, (297-307), Online publication date: 1-Apr-2006.
  1222. ACM
    Luo L, Safavi-Naini R, Baek J and Susilo W Self-organised group key management for ad hoc networks Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (138-147)
  1223. ACM
    Li Y and Deng R Publicly verifiable ownership protection for relational databases Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (78-89)
  1224. ACM
    Castelluccia C, Mykletun E and Tsudik G Improving secure server performance by re-balancing SSL/TLS handshakes Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (26-34)
  1225. Black J The ideal-cipher model, revisited Proceedings of the 13th international conference on Fast Software Encryption, (328-340)
  1226. Hirose S Some plausible constructions of double-block-length hash functions Proceedings of the 13th international conference on Fast Software Encryption, (210-225)
  1227. Youssef A and Gong G (2006). On linear complexity of sequences over GF(2), Theoretical Computer Science, 352:1, (288-292), Online publication date: 7-Mar-2006.
  1228. Zhao Z, Dong Z and Wang Y (2006). Security analysis of a password-based authentication protocol proposed to IEEE 1363, Theoretical Computer Science, 352:1, (280-287), Online publication date: 7-Mar-2006.
  1229. Großschädl J, Ienne P, Pozzi L, Tillich S and Verma A Combining algorithm exploration with instruction set design Proceedings of the conference on Design, automation and test in Europe: Proceedings, (218-223)
  1230. Dodis Y, Yampolskiy A and Yung M Threshold and proactive pseudo-random permutations Proceedings of the Third conference on Theory of Cryptography, (542-560)
  1231. Furukawa J and Sako K An efficient publicly verifiable mix-net for long inputs Proceedings of the 10th international conference on Financial Cryptography and Data Security, (111-125)
  1232. Mannan M and van Oorschot P A protocol for secure public instant messaging Proceedings of the 10th international conference on Financial Cryptography and Data Security, (20-35)
  1233. ACM
    Pramstaller N, Rechberger C and Rijmen V A compact FPGA implementation of the hash function whirlpool Proceedings of the 2006 ACM/SIGDA 14th international symposium on Field programmable gate arrays, (159-166)
  1234. Aguirre J, Álvarez R, Noguera J and Zamora A A secure remote database backup system Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases, (43-46)
  1235. Tuyls P and Batina L RFID-Tags for anti-counterfeiting Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology, (115-131)
  1236. Potlapally N, Ravi S, Raghunathan A and Jha N (2006). A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols, IEEE Transactions on Mobile Computing, 5:2, (128-143), Online publication date: 1-Feb-2006.
  1237. Fan C (2006). Ownership-attached unblinding of blind signatures for untraceable electronic cash, Information Sciences: an International Journal, 176:3, (263-284), Online publication date: 1-Feb-2006.
  1238. Kesdogan D and Palmer C (2006). Technical challenges of network anonymity, Computer Communications, 29:3, (306-324), Online publication date: 1-Feb-2006.
  1239. Stinson D (2006). Some Observations on the Theory of Cryptographic Hash Functions, Designs, Codes and Cryptography, 38:2, (259-277), Online publication date: 1-Feb-2006.
  1240. Yoon E and Yoo K An improved digital signature with message recovery using self-certified public keys without trustworthy system authority Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science, (548-555)
  1241. Zhang Q and Li X An IP address anonymization scheme with multiple access levels Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks, (793-802)
  1242. Han F, Hu J, Yu X, Feng Y and Zhou J A novel hybrid crypto-biometric authentication scheme for ATM based banking applications Proceedings of the 2006 international conference on Advances in Biometrics, (675-681)
  1243. Chong S, Teoh A and Ngo D Iris authentication using privatized advanced correlation filter Proceedings of the 2006 international conference on Advances in Biometrics, (382-388)
  1244. Kurkowski M and Srebrny M (2006). A Quantifier-free First-order Knowledge Logic of Authentication, Fundamenta Informaticae, 72:1-3, (263-282), Online publication date: 1-Jan-2006.
  1245. Adelsbach A, Rohe M and Sadeghi A Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data Transactions on Data Hiding and Multimedia Security I, (73-103)
  1246. Pérez-Freire L, Comesaña P, Troncoso-Pastoriza J and Pérez-González F Watermarking security Transactions on Data Hiding and Multimedia Security I, (41-72)
  1247. Rivat J and Sárközy A On pseudorandom sequences and their application General Theory of Information Transfer and Combinatorics, (343-361)
  1248. Cimato S, Cresti A and D'Arco P (2006). A unified model for unconditionally secure key distribution, Journal of Computer Security, 14:1, (45-64), Online publication date: 1-Jan-2006.
  1249. Du R, Foo E, Boyd C and Choo K Formal analysis of secure contracting protocol for e-tendering Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54, (155-164)
  1250. Hars L (2006). Modular inverse algorithms without multiplications for cryptographic applications, EURASIP Journal on Embedded Systems, 2006:1, (2-2), Online publication date: 1-Jan-2006.
  1251. Schmidt-Samoa K, Semay O and Takagi T (2006). Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems, IEEE Transactions on Computers, 55:1, (48-57), Online publication date: 1-Jan-2006.
  1252. Black J, Cochran M and Gardner R (2006). A Security Analysis of the Internet Chess Club, IEEE Security and Privacy, 4:1, (46-52), Online publication date: 1-Jan-2006.
  1253. Cid C (2006). Recent developments in cryptographic hash functions, Information Security Tech. Report, 11:2, (100-107), Online publication date: 1-Jan-2006.
  1254. Das M, Saxena A and Gulati V Cryptanalysis and improvement of a multisignature scheme Proceedings of the 7th international conference on Distributed Computing, (398-403)
  1255. Dai X and Grundy J Off-Line micro-payment system for content sharing in p2p networks Proceedings of the Second international conference on Distributed Computing and Internet Technology, (297-307)
  1256. Dods C, Smart N and Stam M Hash based digital signature schemes Proceedings of the 10th international conference on Cryptography and Coding, (96-115)
  1257. Sidorenko A and Schoenmakers B Concrete security of the blum-blum-shub pseudorandom generator Proceedings of the 10th international conference on Cryptography and Coding, (355-375)
  1258. Maurer U and Sjödin J Domain expansion of MACs Proceedings of the 10th international conference on Cryptography and Coding, (168-185)
  1259. Mitchell C Partial key recovery attacks on XCBC, TMAC and OMAC Proceedings of the 10th international conference on Cryptography and Coding, (155-167)
  1260. Yoon E and Yoo K Secure fingerprint-based remote user authentication scheme using smartcards Proceedings of the First international conference on Internet and Network Economics, (405-413)
  1261. Mishra P Efficient simultaneous inversion in parallel and application to point multiplication in ECC Proceedings of the First SKLOIS conference on Information Security and Cryptology, (324-335)
  1262. Huang H and Chang C Enhancement of an authenticated multiple-key agreement protocol without using conventional one-way function Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (554-559)
  1263. Li X, Ma J and Moon S On the security of the canetti-krawczyk model Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (356-363)
  1264. Park J, Choi J, Lee S, Park H and Lee D User-oriented multimedia service using smart sensor agent module in the intelligent home Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I, (313-320)
  1265. Cruz-Cortés N, Rodríguez-Henríquez F, Juárez-Morales R and Coello Coello C Finding optimal addition chains using a genetic algorithm approach Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I, (208-215)
  1266. Øverlier L, Brekne T and Årnes A Non-expanding transaction specific pseudonymization for IP traffic monitoring Proceedings of the 4th international conference on Cryptology and Network Security, (261-273)
  1267. Yoon E and Yoo K New authentication scheme based on a one-way hash function and diffie-hellman key exchange Proceedings of the 4th international conference on Cryptology and Network Security, (147-160)
  1268. Hong J and Kim W TMD-Tradeoff and state entropy loss considerations of streamcipher MICKEY Proceedings of the 6th international conference on Cryptology in India, (169-182)
  1269. Mihaljević M, Fossorier M and Imai H Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks Proceedings of the 6th international conference on Cryptology in India, (155-168)
  1270. Goi B, Phan R and Siddiqi M Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (936-944)
  1271. Yoon E and Yoo K Improvement of an efficient user identification scheme based on ID-Based cryptosystem Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (586-591)
  1272. Yoon E and Yoo K A new simple authenticated key agreement and protected password change protocol Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (955-964)
  1273. Jao D, Miller S and Venkatesan R Do all elliptic curves of the same order have the same difficulty of discrete log? Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (21-40)
  1274. Neves N, Correia M and Verissimo P (2005). Solving Vector Consensus with a Wormhole, IEEE Transactions on Parallel and Distributed Systems, 16:12, (1120-1131), Online publication date: 1-Dec-2005.
  1275. Chang K, Hong D and Cho H (2005). Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation, IEEE Transactions on Computers, 54:12, (1628-1630), Online publication date: 1-Dec-2005.
  1276. Goyal V, Jain A and Quisquater J Improvements to mitchell's remote user authentication protocol Proceedings of the 8th international conference on Information Security and Cryptology, (69-80)
  1277. Ting G Ambiguity attacks on the ganic-eskicioglu robust DWT-SVD image watermarking scheme Proceedings of the 8th international conference on Information Security and Cryptology, (378-388)
  1278. Kwon S, Kwon T and Park Y New architecture for multiplication in GF(2) and comparisons with normal and polynomial basis multipliers for elliptic curve cryptography Proceedings of the 8th international conference on Information Security and Cryptology, (335-351)
  1279. Yoon E and Yoo K An efficient password authentication schemes without using the server public key for grid computing Proceedings of the 4th international conference on Grid and Cooperative Computing, (149-154)
  1280. Yoon E and Yoo K Robust secret key based authentication scheme using smart cards Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II, (723-734)
  1281. Lian S, Liu Z, Ren Z and Wang Z Selective video encryption based on advanced video coding Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II, (281-290)
  1282. ACM
    Naor D, Shenhav A and Wool A Toward securing untrusted storage without public-key operations Proceedings of the 2005 ACM workshop on Storage security and survivability, (51-56)
  1283. ACM
    Kher V and Kim Y Securing distributed storage Proceedings of the 2005 ACM workshop on Storage security and survivability, (9-25)
  1284. ACM
    Bhargav-Spantzel A, Squicciarini A and Bertino E Establishing and protecting digital identity in federation systems Proceedings of the 2005 workshop on Digital identity management, (11-19)
  1285. Vaidya B, Kim J, Pyun J, Park J and Han S Evaluation of audio streaming in secure wireless access network Proceedings of the 10th Panhellenic conference on Advances in Informatics, (828-838)
  1286. Fúster-Sabater A and Caballero-Gil P A deterministic approach to balancedness and run quantification in pseudorandom pattern generators Proceedings of the 10th Panhellenic conference on Advances in Informatics, (695-704)
  1287. ACM
    Song R, Korba L and Yee G AnonDSR Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, (33-42)
  1288. ACM
    Di Raimondo M, Gennaro R and Krawczyk H Secure off-the-record messaging Proceedings of the 2005 ACM workshop on Privacy in the electronic society, (81-89)
  1289. ACM
    Aciiçmez O, Schindler W and Koç Ç Improving Brumley and Boneh timing attack on unprotected SSL implementations Proceedings of the 12th ACM conference on Computer and communications security, (139-146)
  1290. Wang S, Cao Z and Bao H Security of an efficient ID-Based authenticated key agreement protocol from pairings Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications, (342-349)
  1291. Khabbazian M, Gulliver T and Bhargava V (2005). A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods, IEEE Transactions on Computers, 54:11, (1454-1459), Online publication date: 1-Nov-2005.
  1292. Fan C, Chan Y and Zhang Z (2005). Robust remote authentication scheme with smart cards, Computers and Security, 24:8, (619-628), Online publication date: 1-Nov-2005.
  1293. Sun M, Shi Y, Liu Q and Sclabassi R (2005). Data Integration for Medical Information Management, Journal of VLSI Signal Processing Systems, 41:3, (319-328), Online publication date: 1-Nov-2005.
  1294. Charpin P and Pasalic E (2005). Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces, Designs, Codes and Cryptography, 37:2, (319-346), Online publication date: 1-Nov-2005.
  1295. Park Y, Shin J and Rhee K Design of a secure digital contents delivery system in p2p networks Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems, (311-321)
  1296. Mihaljević M, Fossorier M and Imai H A novel broadcast encryption based on time-bound cryptographic keys Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems, (258-276)
  1297. Mihaljević M, Fossorier M and Imai H Security weaknesses of certain broadcast encryption schemes Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems, (228-245)
  1298. Freiling F and Ghosh S Code stabilization Proceedings of the 7th international conference on Self-Stabilizing Systems, (128-139)
  1299. Ramasamy H, Agbaria A and Sanders W Parsimony-Based approach for obtaining resource-efficient and trustworthy execution Proceedings of the Second Latin-American conference on Dependable Computing, (206-225)
  1300. Chen T, Sortais M, Schäfer G, Adams S, Fan C and Wolisz A (2005). Performance analysis of a Denial of Service protection scheme for optimized and QoS-aware handover, Computer Networks: The International Journal of Computer and Telecommunications Networking, 49:3, (449-464), Online publication date: 19-Oct-2005.
  1301. ACM
    Olariu S, Eltoweissy M and Younis M ANSWER Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, (88-95)
  1302. ACM
    Soliman H and Omari M Application of synchronous dynamic encryption system in mobile wireless domains Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, (24-30)
  1303. ACM
    Yang X, Wetherall D and Anderson T (2005). A DoS-limiting network architecture, ACM SIGCOMM Computer Communication Review, 35:4, (241-252), Online publication date: 1-Oct-2005.
  1304. Luo J, Hubaux J and Eugster P (2005). DICTATE, IEEE Transactions on Dependable and Secure Computing, 2:4, (311-323), Online publication date: 1-Oct-2005.
  1305. Lukac R and Plataniotis K (2005). A cost-effective encryption scheme for color images, Real-Time Imaging, 11:5-6, (454-464), Online publication date: 1-Oct-2005.
  1306. Ouda A and El-Sakka M A step towards practical steganography systems Proceedings of the Second international conference on Image Analysis and Recognition, (1158-1166)
  1307. Augot D, Finiasz M and Sendrier N A family of fast syndrome based cryptographic hash functions Proceedings of the 1st international conference on Progress in Cryptology in Malaysia, (64-83)
  1308. Monnerat J, Oswald Y and Vaudenay S Optimization of the MOVA undeniable signature scheme Proceedings of the 1st international conference on Progress in Cryptology in Malaysia, (196-209)
  1309. Yen S, Lien W, Moon S and Ha J Power analysis by exploiting chosen message and internal collisions – vulnerability of checking mechanism for RSA-Decryption Proceedings of the 1st international conference on Progress in Cryptology in Malaysia, (183-195)
  1310. Yoon E, Ryu E and Yoo K Secure protected password change scheme Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security, (472-477)
  1311. ACM
    Al-Hamdani W and Griskell I A proposed curriculum of cryptography courses Proceedings of the 2nd annual conference on Information security curriculum development, (4-11)
  1312. ACM
    van Oorschot P Message authentication by integrity with public corroboration Proceedings of the 2005 workshop on New security paradigms, (57-63)
  1313. Lee H, Ha K and Ku K ID-based multi-party authenticated key agreement protocols from multilinear forms Proceedings of the 8th international conference on Information Security, (104-117)
  1314. Kong Y, Seberry J, Getta J and Yu P A cryptographic solution for general access control Proceedings of the 8th international conference on Information Security, (461-473)
  1315. Mitchell C Error oracle attacks on CBC mode Proceedings of the 8th international conference on Information Security, (244-258)
  1316. ACM
    Quan G, Davis J, Devarkal S and Buell D High-level synthesis for large bit-width multipliers on FPGAs Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis, (213-218)
  1317. Liu F and Koenig H Puzzle Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (88-97)
  1318. Kubbilun W, Gajek S, Psarros M and Schwenk J Trustworthy verification and visualisation of multiple XML-signatures Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (311-320)
  1319. Adelsbach A, Rohe M and Sadeghi A Non-interactive watermark detection for a correlation-based watermarking scheme Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security, (129-139)
  1320. Wong A, Sorell M and Clarke R Secure mutual distrust transaction tracking using cryptographic elements Proceedings of the 4th international conference on Digital Watermarking, (459-469)
  1321. Furon T A survey of watermarking security Proceedings of the 4th international conference on Digital Watermarking, (201-215)
  1322. Yoon E and Yoo K Robust authenticated encryption scheme with message linkages Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV, (281-288)
  1323. Bouvry P, Klein G and Seredynski F Weak key analysis and micro-controller implementation of CA stream ciphers Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV, (910-915)
  1324. Yoon E and Yoo K A new efficient fingerprint-based remote user authentication scheme for multimedia systems Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III, (332-338)
  1325. Lee H Arbitrated verifier signature with message recovery for proof of ownership Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I, (504-510)
  1326. Ateniese G, Chou D, de Medeiros B and Tsudik G Sanitizable signatures Proceedings of the 10th European conference on Research in Computer Security, (159-177)
  1327. Maitra S, Gupta K and Venkateswarlu A (2005). Results on multiples of primitive polynomials and their products over GF(2), Theoretical Computer Science, 341:1, (311-343), Online publication date: 5-Sep-2005.
  1328. ACM
    Køien G Privacy enhanced cellular access security Proceedings of the 4th ACM workshop on Wireless security, (57-66)
  1329. ACM
    Meyer U, Cordasco J and Wetzel S An approach to enhance inter-provider roaming through secret sharing and its application to WLANs Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots, (1-13)
  1330. Hacıgümüş H and Mehrotra S Efficient key updates in encrypted database systems Proceedings of the Second VDLB international conference on Secure Data Management, (1-15)
  1331. Joo M and Choi Y (2005). A fault-tolerant pipelined architecture for symmetric block ciphers, Computers and Electrical Engineering, 31:6, (380-390), Online publication date: 1-Sep-2005.
  1332. Gonzalez Nieto J, Boyd C and Dawson E (2005). A Public Key Cryptosystem Based On A Subgroup Membership Problem, Designs, Codes and Cryptography, 36:3, (301-316), Online publication date: 1-Sep-2005.
  1333. Nedjah N and de Macedo Mourelle L (2005). Secure evolvable hardware for public-key cryptosystems, New Generation Computing, 23:3, (259-275), Online publication date: 1-Sep-2005.
  1334. Seredynski M and Bouvry P (2005). Block cipher based on reversible cellular automata, New Generation Computing, 23:3, (245-258), Online publication date: 1-Sep-2005.
  1335. Batina L, Hwang D, Hodjat A, Preneel B and Verbauwhede I Hardware/software co-design for hyperelliptic curve cryptography (HECC) on the 8051 µP Proceedings of the 7th international conference on Cryptographic hardware and embedded systems, (106-118)
  1336. Großschädl J, Avanzi R, Savaş E and Tillich S Energy-efficient software implementation of long integer modular arithmetic Proceedings of the 7th international conference on Cryptographic hardware and embedded systems, (75-90)
  1337. Hars L Fast truncated multiplication for cryptographic applications Proceedings of the 7th international conference on Cryptographic hardware and embedded systems, (211-225)
  1338. Bucci M and Luzzi R Design of testable random bit generators Proceedings of the 7th international conference on Cryptographic hardware and embedded systems, (147-156)
  1339. Chen T, Zhu B, Li S and Cheng X ThresPassport – a distributed single sign-on service Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II, (771-780)
  1340. ACM
    Yang X, Wetherall D and Anderson T A DoS-limiting network architecture Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, (241-252)
  1341. Mukhopadhyay S and Sarkar P Application of LFSRs in time/memory trade-off cryptanalysis Proceedings of the 6th international conference on Information Security Applications, (25-37)
  1342. Takashima K Practical modifications of leadbitter et al.'s repeated-bits side-channel analysis on (EC)DSA Proceedings of the 6th international conference on Information Security Applications, (259-270)
  1343. Jorns O, Jung O, Gross J and Bessler S A privacy enhancement mechanism for location based service architectures using transaction pseudonyms Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business, (100-109)
  1344. Lu Y, Meier W and Vaudenay S The conditional correlation attack Proceedings of the 25th annual international conference on Advances in Cryptology, (97-117)
  1345. Granger R and Vercauteren F On the discrete logarithm problem on algebraic tori Proceedings of the 25th annual international conference on Advances in Cryptology, (66-85)
  1346. Krawczyk H HMQV Proceedings of the 25th annual international conference on Advances in Cryptology, (546-566)
  1347. Kissner L and Song D Privacy-preserving set operations Proceedings of the 25th annual international conference on Advances in Cryptology, (241-257)
  1348. Yoshida H and Biryukov A Analysis of a SHA-256 variant Proceedings of the 12th international conference on Selected Areas in Cryptography, (245-260)
  1349. Pramstaller N, Rechberger C and Rijmen V Breaking a new hash function design strategy called SMASH Proceedings of the 12th international conference on Selected Areas in Cryptography, (233-244)
  1350. Youn T, Park Y, Kim C and Lim J An efficient public key cryptosystem with a privacy enhanced double decryption mechanism Proceedings of the 12th international conference on Selected Areas in Cryptography, (144-158)
  1351. Nuckolls G Verified query results from hybrid authentication trees Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security, (84-98)
  1352. Shmueli E, Waisenberg R, Elovici Y and Gudes E Designing secure indexes for encrypted databases Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security, (54-68)
  1353. Brumley D and Boneh D (2005). Remote timing attacks are practical, Computer Networks: The International Journal of Computer and Telecommunications Networking, 48:5, (701-716), Online publication date: 5-Aug-2005.
  1354. Wang Y and Varadharajan V (2005). Secure route structures for parallel mobile agents based systems using fast binary dispatch, Mobile Information Systems, 1:3, (185-205), Online publication date: 1-Aug-2005.
  1355. Kiltz E and Simon H (2005). Threshold circuit lower bounds on cryptographic functions, Journal of Computer and System Sciences, 71:2, (185-212), Online publication date: 1-Aug-2005.
  1356. Mullen G (2005). Editorial, Finite Fields and Their Applications, 11:3, (321-325), Online publication date: 1-Aug-2005.
  1357. Hsu C (2005). Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem, Applied Mathematics and Computation, 167:2, (882-890), Online publication date: 1-Aug-2005.
  1358. Yoon E, Kim W and Yoo K Robust and simple authentication protocol for secure communication on the web Proceedings of the 5th international conference on Web Engineering, (352-362)
  1359. Kwon T and Moon H Multi-modal techniques for identity theft prevention Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues, (291-300)
  1360. Pon R and Critchlow T Performance-oriented privacy-preserving data integration Proceedings of the Second international conference on Data Integration in the Life Sciences, (240-256)
  1361. Benenson Z Authenticated queries in sensor networks Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks, (54-67)
  1362. Asano T and Kamio K A tree based one-key broadcast encryption scheme with low computational overhead Proceedings of the 10th Australasian conference on Information Security and Privacy, (89-100)
  1363. Mitchell C Cryptanalysis of two variants of PCBC mode when used for message integrity Proceedings of the 10th Australasian conference on Information Security and Privacy, (560-571)
  1364. Furukawa J and Imai H An efficient group signature scheme from bilinear maps Proceedings of the 10th Australasian conference on Information Security and Privacy, (455-467)
  1365. Choo K and Hitchcock Y Security requirements for key establishment proof models Proceedings of the 10th Australasian conference on Information Security and Privacy, (429-442)
  1366. Yao M, Peng K and Dawson E Using “fair forfeit” to prevent truncation attacks on mobile agents Proceedings of the 10th Australasian conference on Information Security and Privacy, (158-169)
  1367. Vaidya J and Clifton C (2005). Secure set intersection cardinality with application to association rule mining, Journal of Computer Security, 13:4, (593-622), Online publication date: 1-Jul-2005.
  1368. Amir Y, Nita-Rotaru C, Stanton J and Tsudik G (2005). Secure Spread, IEEE Transactions on Dependable and Secure Computing, 2:3, (248-261), Online publication date: 1-Jul-2005.
  1369. Wollinger T, Pelzl J and Paar C (2005). Cantor versus Harley, IEEE Transactions on Computers, 54:7, (861-872), Online publication date: 1-Jul-2005.
  1370. Apvrille A and Pourzandi M (2005). Secure Software Development by Example, IEEE Security and Privacy, 3:4, (10-17), Online publication date: 1-Jul-2005.
  1371. Price G and Mitchell C Interoperation between a conventional PKI and an ID-Based infrastructure Proceedings of the Second European conference on Public Key Infrastructure, (73-85)
  1372. Shin S, Kobara K and Imai H A lower-bound of complexity for RSA-Based password-authenticated key exchange Proceedings of the Second European conference on Public Key Infrastructure, (191-205)
  1373. ACM
    Liu F and Koenig H A novel encryption algorithm for high resolution video Proceedings of the international workshop on Network and operating systems support for digital audio and video, (69-74)
  1374. Boreale M and Buscemi M (2005). A method for symbolic analysis of security protocols, Theoretical Computer Science, 338:1-3, (393-425), Online publication date: 10-Jun-2005.
  1375. McGregor J, Yin Y and Lee R A traitor tracing scheme based on RSA for fast decryption Proceedings of the Third international conference on Applied Cryptography and Network Security, (56-74)
  1376. Chevallier-Mames B New signature schemes with coupons and tight reduction Proceedings of the Third international conference on Applied Cryptography and Network Security, (513-528)
  1377. Wang P, Kim Y, Kher V and Kwon T Strengthening password-based authentication protocols against online dictionary attacks Proceedings of the Third international conference on Applied Cryptography and Network Security, (17-32)
  1378. Itkis G, McNerney R and Russell S Intrusion-Resilient secure channels Proceedings of the Third international conference on Applied Cryptography and Network Security, (238-253)
  1379. Goodrich M, Atallah M and Tamassia R Indexing information for data forensics Proceedings of the Third international conference on Applied Cryptography and Network Security, (206-221)
  1380. Álvarez Marañón G, Hernández Encinas L and Martín del Rey Á A new secret sharing scheme for images based on additive 2-dimensional cellular automata Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part I, (411-418)
  1381. ACM
    Castelluccia C and Mutaf P Shake them up! Proceedings of the 3rd international conference on Mobile systems, applications, and services, (51-64)
  1382. Danezis G and Clulow J Compulsion resistant anonymous communications Proceedings of the 7th international conference on Information Hiding, (11-25)
  1383. Lee R, Kwan P, McGregor J, Dwoskin J and Wang Z Architecture for Protecting Critical Secrets in Microprocessors Proceedings of the 32nd annual international symposium on Computer Architecture, (2-13)
  1384. Balopoulos T, Gritzalis S and Katsikas S (2005). Specifying Privacy-Preserving Protocols in Typed MSR, Computer Standards & Interfaces, 27:5, (501-512), Online publication date: 1-Jun-2005.
  1385. Lin Q, Yin F and Liang H Blind source separation-based encryption of images and speeches Proceedings of the Second international conference on Advances in neural networks - Volume Part II, (544-549)
  1386. Køien G and Oleshchuk V Location privacy for cellular systems; analysis and solution Proceedings of the 5th international conference on Privacy Enhancing Technologies, (40-58)
  1387. Brekne T, Årnes A and Øslebø A Anonymization of IP traffic monitoring data Proceedings of the 5th international conference on Privacy Enhancing Technologies, (179-196)
  1388. Black J, Cochran M and Shrimpton T On the impossibility of highly-efficient blockcipher-based hash functions Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, (526-541)
  1389. Kelsey J and Schneier B Second preimages on n-bit hash functions for much less than 2 work Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, (474-490)
  1390. Kwon T and Moon H Multi-modal biometrics with PKI technologies for border control applications Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics, (99-114)
  1391. ACM
    Wang G An abuse-free fair contract signing protocol based on the RSA signature Proceedings of the 14th international conference on World Wide Web, (412-421)
  1392. Nait-Sidi-Moh A and Wack M Modelling of process of electronic signature with petri nets and (max, plus) algebra Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (792-801)
  1393. Fúster-Sabater A and Caballero-Gil P A simple acceptance/rejection criterium for sequence generators in symmetric cryptography Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III, (719-728)
  1394. Shao M, Zhou J and Wang G On the security of a certified e-mail scheme with temporal authentication Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III, (701-710)
  1395. Jeong J, Park Y and Cho Y Efficient dos resistant multicast authentication schemes Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (353-362)
  1396. Lee M SPA-resistant simultaneous scalar multiplication Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (314-321)
  1397. Kim H, Park B, Ha J, Lee B and Park D New key management systems for multilevel security Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II, (245-253)
  1398. Kwon T Authenticated key agreement without subgroup element verification Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (577-583)
  1399. Castelluccia C, Saxena N and Yi J Self-configurable key pre-distribution in mobile ad hoc networks Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (1083-1095)
  1400. Choi C, Dong Y and Zhang Z LIPS Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (178-190)
  1401. Datta A, Derek A, Mitchell J and Pavlovic D (2005). A derivation system and compositional logic for security protocols, Journal of Computer Security, 13:3, (423-482), Online publication date: 1-May-2005.
  1402. ACM
    Papanikolaou N (2005). An introduction to quantum cryptography, XRDS: Crossroads, The ACM Magazine for Students, 11:3, (3-3), Online publication date: 1-May-2005.
  1403. ACM
    Lee R, Kwan P, McGregor J, Dwoskin J and Wang Z (2005). Architecture for Protecting Critical Secrets in Microprocessors, ACM SIGARCH Computer Architecture News, 33:2, (2-13), Online publication date: 1-May-2005.
  1404. Elbirt A and Paar C (2005). An Instruction-Level Distributed Processor for Symmetric-Key Cryptography, IEEE Transactions on Parallel and Distributed Systems, 16:5, (468-480), Online publication date: 1-May-2005.
  1405. Rantos K and Mitchell C (2005). Matching key recovery mechanisms to business requirements, Computers and Security, 24:3, (232-245), Online publication date: 1-May-2005.
  1406. Białota R and Kawa G (2005). Modified Alternating$$\vec{k}$$--generators, Designs, Codes and Cryptography, 35:2, (159-174), Online publication date: 1-May-2005.
  1407. Dahu W and Xueye W A new key exchange scheme based on extended Chebyshev polynomials Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science, (1-5)
  1408. Chin C, Jin A and Ling D Iris verification based on Iris feature and secret pseudo-random number Proceedings of the 4th WSEAS International Conference on Electronic, Signal Processing and Control, (1-6)
  1409. Burmester M, de Medeiros B and Yasinsac A Community-centric vanilla-rollback access, or Proceedings of the 13th international conference on Security protocols, (228-237)
  1410. Hacıgümüş H, Iyer B and Mehrotra S Query optimization in encrypted database systems Proceedings of the 10th international conference on Database Systems for Advanced Applications, (43-55)
  1411. Briais S and Nestmann U A formal semantics for protocol narrations Proceedings of the 1st international conference on Trustworthy global computing, (163-181)
  1412. Seys S and Preneel B Efficient cooperative signatures Proceedings of the Second international conference on Security in Pervasive Computing, (86-100)
  1413. Goldreich O (2005). Foundations of cryptography, Foundations and Trends® in Theoretical Computer Science, 1:1, (1-116), Online publication date: 1-Apr-2005.
  1414. ACM
    Chen Y, Mihçak M and Kirovski D (2005). Certifying authenticity via fiber-infused paper, ACM SIGecom Exchanges, 5:3, (29-37), Online publication date: 1-Apr-2005.
  1415. Brown D (2005). Generic Groups, Collision Resistance, and ECDSA, Designs, Codes and Cryptography, 35:1, (119-152), Online publication date: 1-Apr-2005.
  1416. Hess F and Shparlinski I (2005). On the Linear Complexity and Multidimensional Distribution of Congruential Generators over Elliptic Curves, Designs, Codes and Cryptography, 35:1, (111-117), Online publication date: 1-Apr-2005.
  1417. Adelmann C and Winterhof A Interpolation of functions related to the integer factoring problem Proceedings of the 2005 international conference on Coding and Cryptography, (144-154)
  1418. Brandstätter N, Lange T and Winterhof A On the non-linearity and sparsity of boolean functions related to the discrete logarithm in finite fields of characteristic two Proceedings of the 2005 international conference on Coding and Cryptography, (135-143)
  1419. ACM
    Anshul D and Roy S A ZKP-based identification scheme for base nodes in wireless sensor networks Proceedings of the 2005 ACM symposium on Applied computing, (319-323)
  1420. Gaubatz G, Kaps J, Ozturk E and Sunar B State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, (146-150)
  1421. Wong D Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, (284-288)
  1422. Zúquete A (2005). An efficient high quality random number generator for multi-programmed systems, Journal of Computer Security, 13:2, (243-263), Online publication date: 1-Mar-2005.
  1423. ACM
    McGregor J and Lee R (2005). Protecting cryptographic keys and computations via virtual secure coprocessing, ACM SIGARCH Computer Architecture News, 33:1, (16-26), Online publication date: 1-Mar-2005.
  1424. Daneshbeh A and Hasan M (2005). A Class of Unidirectional Bit Serial Systolic Architectures for Multiplicative Inversion and Division over {\rm GF}(2^m), IEEE Transactions on Computers, 54:3, (370-380), Online publication date: 1-Mar-2005.
  1425. Haenni R (2005). Using probabilistic argumentation for key validation in public-key cryptography, International Journal of Approximate Reasoning, 38:3, (355-376), Online publication date: 1-Mar-2005.
  1426. Sklavos N and Koufopavlou O (2005). Implementation of the SHA-2 Hash Family Standard Using FPGAs, The Journal of Supercomputing, 31:3, (227-248), Online publication date: 1-Mar-2005.
  1427. Correia M, Neves N, Lung L and Veríssimo P (2005). Low complexity Byzantine-resilient consensus, Distributed Computing, 17:3, (237-249), Online publication date: 1-Mar-2005.
  1428. Arnault F and Berger T F-FCSR Proceedings of the 12th international conference on Fast Software Encryption, (83-97)
  1429. Knudsen L and Mathiassen J Preimage and collision attacks on MD2 Proceedings of the 12th international conference on Fast Software Encryption, (255-267)
  1430. Daemen J and Rijmen V A new MAC construction alred and a specific instance ALPHA-MAC Proceedings of the 12th international conference on Fast Software Encryption, (1-17)
  1431. Boneh D, Goh E and Nissim K Evaluating 2-DNF formulas on ciphertexts Proceedings of the Second international conference on Theory of Cryptography, (325-341)
  1432. Gollmann D Protocol analysis for concrete environments Proceedings of the 10th international conference on Computer Aided Systems Theory, (365-372)
  1433. Biernat J and Nikodem M Fault cryptanalysis of elgamal signature scheme Proceedings of the 10th international conference on Computer Aided Systems Theory, (327-336)
  1434. Bicakci K and Baykal N (2005). Improved server assisted signatures, Computer Networks: The International Journal of Computer and Telecommunications Networking, 47:3, (351-366), Online publication date: 1-Feb-2005.
  1435. Seo S, Cho T and Lee S A secure mobile agent protocol for AMR systems in home network environments Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking, (814-823)
  1436. Schindler W On the optimization of side-channel attacks by advanced stochastic methods Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography, (85-103)
  1437. Jonsson J and Robshaw M Securing RSA-KEM via the AES Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography, (29-46)
  1438. ACM
    Goodloe A, Gunter C and Stehr M Formal prototyping in early stages of protocol design Proceedings of the 2005 workshop on Issues in the theory of security, (67-80)
  1439. Focardi R Static analysis of authentication Foundations of Security Analysis and Design III, (109-132)
  1440. Koeune F and Standaert F A tutorial on physical security and side-channel attacks Foundations of Security Analysis and Design III, (78-108)
  1441. Lin S and Knoblock C (2005). SERGEANT, Web Intelligence and Agent Systems, 3:1, (1-15), Online publication date: 1-Jan-2005.
  1442. Berczyński S, Kravtsov Y, Pejas J and Surovyatkina E Secure data transimission via modulation of the chaotic sequence parameters Enhanced methods in computer security, biometric and artificial intelligence systems, (135-142)
  1443. Jackiewicz M and Kuriata E Analysis of non-linear pseudo-noise sequences Enhanced methods in computer security, biometric and artificial intelligence systems, (93-102)
  1444. Reid J and Caelli W DRM, trusted computing and operating system architecture Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44, (127-136)
  1445. Blundo C, Cimato S and De Bonis A (2005). Secure E-Coupons, Electronic Commerce Research, 5:1, (117-139), Online publication date: 1-Jan-2005.
  1446. Naor M and Pinkas B (2005). Computationally Secure Oblivious Transfer, Journal of Cryptology, 18:1, (1-35), Online publication date: 1-Jan-2005.
  1447. Zhang B, Wu H, Feng D and Bao F Chosen ciphertext attack on a new class of self-synchronizing stream ciphers Proceedings of the 5th international conference on Cryptology in India, (73-83)
  1448. Hitchcock Y, Boyd C and Nieto J Tripartite key exchange in the canetti-krawczyk proof model Proceedings of the 5th international conference on Cryptology in India, (17-32)
  1449. Sato H, Schepers D and Takagi T Exact analysis of montgomery multiplication Proceedings of the 5th international conference on Cryptology in India, (290-304)
  1450. Júnior J and de Freitas D Cryptanalysis of ake98 Proceedings of the 5th international conference on Cryptology in India, (206-217)
  1451. Júnior J Faster variants of the MESH block ciphers Proceedings of the 5th international conference on Cryptology in India, (162-174)
  1452. Kim H, Lee J, Yoon H and Cho J Secure group communication with low communication complexity Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies, (586-590)
  1453. Drinic M and Kirovski D A Hardware-Software Platform for Intrusion Prevention Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture, (233-242)
  1454. Courtois N Algebraic attacks on combiners with memory and several outputs Proceedings of the 7th international conference on Information Security and Cryptology, (3-20)
  1455. Peng K, Boyd C, Dawson E and Lee B An efficient and verifiable solution to the millionaire problem Proceedings of the 7th international conference on Information Security and Cryptology, (51-66)
  1456. Saxena N, Tsudik G and Yi J Identity-Based access control for ad hoc groups Proceedings of the 7th international conference on Information Security and Cryptology, (362-379)
  1457. Hirose S Provably secure double-block-length hash functions in a black-box model Proceedings of the 7th international conference on Information Security and Cryptology, (330-342)
  1458. Chatterjee S, Sarkar P and Barua R Efficient computation of tate pairing in projective coordinate over general characteristic fields Proceedings of the 7th international conference on Information Security and Cryptology, (168-181)
  1459. Rabinovich M and Wang H (2004). DHTTP, IEEE/ACM Transactions on Networking, 12:6, (1007-1020), Online publication date: 1-Dec-2004.
  1460. Lee Y, Lee H and Lee H (2004). Multi-party authenticated key agreement protocols from multi-linear forms, Applied Mathematics and Computation, 159:2, (317-331), Online publication date: 1-Dec-2004.
  1461. Page D and Smart N (2004). Parallel Cryptographic Arithmetic Using a Redundant Montgomery Representation, IEEE Transactions on Computers, 53:11, (1474-1482), Online publication date: 1-Nov-2004.
  1462. Shparlinski I (2004). On the uniformity of distribution of the decryption exponent in fixed encryption exponent RSA, Information Processing Letters, 92:3, (143-147), Online publication date: 1-Nov-2004.
  1463. Steinfeld R and Zheng Y (2004). On the Security of RSA with Primes Sharing Least-Significant Bits, Applicable Algebra in Engineering, Communication and Computing, 15:3-4, (179-200), Online publication date: 1-Nov-2004.
  1464. Burman S and Sarkar P (2004). An Efficient Algorithm for Software Generation of Binary Linear Recurrences, Applicable Algebra in Engineering, Communication and Computing, 15:3-4, (201-203), Online publication date: 1-Nov-2004.
  1465. Zhao X, Dai Y and Feng D Towards the public but noninvertible watermarking Proceedings of the Third international conference on Digital Watermarking, (218-231)
  1466. Phan R and Ling H Flaws in generic watermarking protocols based on zero-knowledge proofs Proceedings of the Third international conference on Digital Watermarking, (184-191)
  1467. ACM
    Popescu B, Crispo B, Tanenbaum A and Kamperman F A DRM security architecture for home networks Proceedings of the 4th ACM workshop on Digital rights management, (1-10)
  1468. Yi X (2004). Authenticated key agreement in dynamic peer groups, Theoretical Computer Science, 326:1-3, (363-382), Online publication date: 20-Oct-2004.
  1469. ACM
    Schlesinger R A cryptography course for non-mathematicians Proceedings of the 1st annual conference on Information security curriculum development, (94-98)
  1470. ACM
    Edoh K Elliptic curve cryptography Proceedings of the 1st annual conference on Information security curriculum development, (88-93)
  1471. Seba H, Bouabdallah A and Badache N (2004). A new approach to scalable and fault-tolerant group key management protocols, Journal of High Speed Networks, 13:4, (283-296), Online publication date: 1-Oct-2004.
  1472. Zhang Z and Xiao G (2004). New multisignature scheme for specified group of verifiers, Applied Mathematics and Computation, 157:2, (425-431), Online publication date: 1-Oct-2004.
  1473. Abadi M and Fournet C (2004). Private authentication, Theoretical Computer Science, 322:3, (427-476), Online publication date: 6-Sep-2004.
  1474. Tan Z, Lin C, Yin H and Li B (2004). Optimization and Benchmark of Cryptographic Algorithms on Network Processors, IEEE Micro, 24:5, (55-69), Online publication date: 1-Sep-2004.
  1475. ACM
    Hu Y, Perrig A and Sirbu M (2004). SPV, ACM SIGCOMM Computer Communication Review, 34:4, (179-192), Online publication date: 30-Aug-2004.
  1476. ACM
    Hu Y, Perrig A and Sirbu M SPV Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (179-192)
  1477. Ntarmos N and Triantafillou P SeAl Proceedings of the Fourth International Conference on Peer-to-Peer Computing, (116-123)
  1478. Wierzbicki A and Kucharski T P2P Scrabble. Can P2P Games Commence? Proceedings of the Fourth International Conference on Peer-to-Peer Computing, (100-107)
  1479. Kwon S Signed digit representation with NAF and balanced ternary form and efficient exponentiation in GF(q) using a Gaussian normal basis of type II Proceedings of the 5th international conference on Information Security Applications, (332-344)
  1480. Ren K, Lee H, Kim K and Yoo T Efficient authenticated key agreement protocol for dynamic groups Proceedings of the 5th international conference on Information Security Applications, (144-159)
  1481. ACM
    Lai B, Hwang D, Kim S and Verbauwhede I Reducing radio energy consumption of key management protocols for wireless sensor networks Proceedings of the 2004 international symposium on Low power electronics and design, (351-356)
  1482. Gaubatz G, Kaps J and Sunar B Public key cryptography in sensor networks—revisited Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (2-18)
  1483. ACM
    Wollinger T, Guajardo J and Paar C (2004). Security on FPGAs, ACM Transactions on Embedded Computing Systems, 3:3, (534-574), Online publication date: 1-Aug-2004.
  1484. ACM
    Wollinger T, Pelzl J, Wittelsberger V, Paar C, Saldamli G and Koç Ç (2004). Elliptic and hyperelliptic curves on embedded μP, ACM Transactions on Embedded Computing Systems, 3:3, (509-533), Online publication date: 1-Aug-2004.
  1485. Schneider S and Delicata R Verifying security protocols Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years, (243-263)
  1486. Yi X (2004). Identity-Based Fault-Tolerant Conference Key Agreement, IEEE Transactions on Dependable and Secure Computing, 1:3, (170-178), Online publication date: 1-Jul-2004.
  1487. Kim Y, Perrig A and Tsudik G (2004). Group Key Agreement Efficient in Communication, IEEE Transactions on Computers, 53:7, (905-921), Online publication date: 1-Jul-2004.
  1488. ACM
    Agarwal S, Garg R, Gupta M and Moreira J Adaptive incremental checkpointing for massively parallel systems Proceedings of the 18th annual international conference on Supercomputing, (277-286)
  1489. Brent R Fast and reliable random number generators for scientific computing Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing, (1-10)
  1490. ACM
    Georgiev I, Boyanov K and Georgiev I Global identification of storage objects in network attached storage Proceedings of the 5th international conference on Computer systems and technologies, (1-6)
  1491. Owens L, Duffy A and Dowling T An Identity Based Encryption system Proceedings of the 3rd international symposium on Principles and practice of programming in Java, (154-159)
  1492. Blundo C, D'Arco P, Daza V and Padró C (2004). Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures, Theoretical Computer Science, 320:2-3, (269-291), Online publication date: 14-Jun-2004.
  1493. ACM
    Maurer U The role of cryptography in database security Proceedings of the 2004 ACM SIGMOD international conference on Management of data, (5-10)
  1494. Bajard J and Imbert L (2004). A Full RNS Implementation of RSA, IEEE Transactions on Computers, 53:6, (769-774), Online publication date: 1-Jun-2004.
  1495. Chevallier-Mames B, Ciet M and Joye M (2004). Low-Cost Solutions for Preventing Simple Side-Channel Analysis, IEEE Transactions on Computers, 53:6, (760-768), Online publication date: 1-Jun-2004.
  1496. Tseng Y, Yang C and Su J (2004). Authentication and Billing Protocols for the Integration of WLAN and 3G Networks, Wireless Personal Communications: An International Journal, 29:3-4, (351-366), Online publication date: 1-Jun-2004.
  1497. Castelluccia C (2004). Cryptographically Generated Addresses for Constrained Devices*, Wireless Personal Communications: An International Journal, 29:3-4, (221-232), Online publication date: 1-Jun-2004.
  1498. Duan Y and Canny J Protecting user data in ubiquitous computing Proceedings of the 4th international conference on Privacy Enhancing Technologies, (167-185)
  1499. ACM
    Kirovski D Toward an automated verification of certificates of authenticity Proceedings of the 5th ACM conference on Electronic commerce, (160-169)
  1500. Courtois N General principles of algebraic attacks and new design criteria for cipher components Proceedings of the 4th international conference on Advanced Encryption Standard, (67-83)
  1501. Courtois N The inverse s-box, non-linear polynomial relations and cryptanalysis of block ciphers Proceedings of the 4th international conference on Advanced Encryption Standard, (170-188)
  1502. Amir Y, Kim Y, Nita-Rotaru C, Schultz J, Stanton J and Tsudik G (2004). Secure Group Communication Using Robust Contributory Key Agreement, IEEE Transactions on Parallel and Distributed Systems, 15:5, (468-480), Online publication date: 1-May-2004.
  1503. Hodjat A and Verbauwhede I (2004). High-Throughput Programmable Cryptocoprocessor, IEEE Micro, 24:3, (34-45), Online publication date: 1-May-2004.
  1504. Seredynski F, Bouvry P and Zomaya A (2004). Cellular automata computations and secret key cryptography, Parallel Computing, 30:5-6, (753-766), Online publication date: 1-May-2004.
  1505. ACM
    Mentens N, Ors S and Preneel B An FPGA implementation of an elliptic curve processor GF(2m) Proceedings of the 14th ACM Great Lakes symposium on VLSI, (454-457)
  1506. Liu D, Chi C and Li M Normalizing Traffic Pattern with Anonymity for Mission Critical Applications Proceedings of the 37th annual symposium on Simulation
  1507. Blundo C and Cimato S (2004). A Software Infrastructure for Authenticated Web Metering, Computer, 37:4, (28-33), Online publication date: 1-Apr-2004.
  1508. Meidl W and Winterhof A (2004). On the linear complexity profile of some new explicit inversive pseudorandom numbers, Journal of Complexity, 20:2-3, (350-355), Online publication date: 1-Apr-2004.
  1509. Carlet C and Ding C (2004). Highly nonlinear mappings, Journal of Complexity, 20:2-3, (205-244), Online publication date: 1-Apr-2004.
  1510. Tolia N, Harkes J, Kozuch M and Satyanarayanan M Integrating portable and distributed storage Proceedings of the 3rd USENIX conference on File and storage technologies, (17-17)
  1511. Tolia N, Harkes J, Kozuch M and Satyanarayanan M Integrating Portable and Distributed Storage Proceedings of the 3rd USENIX Conference on File and Storage Technologies, (227-238)
  1512. Müller S (2004). On the Computation of Square Roots in Finite Fields, Designs, Codes and Cryptography, 31:3, (301-312), Online publication date: 1-Mar-2004.
  1513. Chen S, Xu J, Kalbarczyk Z, Iyer R and Whisnant K (2004). Modeling and evaluating the security threats of transient errors in firewall software, Performance Evaluation, 56:1-4, (53-72), Online publication date: 1-Mar-2004.
  1514. ACM
    Kohlbrenner P and Gaj K An embedded true random number generator for FPGAs Proceedings of the 2004 ACM/SIGDA 12th international symposium on Field programmable gate arrays, (71-78)
  1515. Cilardo A, Mazzeo A, Romano L and Saggese G Carry-Save Montgomery Modular Exponentiation on Reconfigurable Hardware Proceedings of the conference on Design, automation and test in Europe - Volume 3
  1516. Biehl I, Paulus S and Takagi T (2004). Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders, Designs, Codes and Cryptography, 31:2, (99-123), Online publication date: 1-Feb-2004.
  1517. Wang M, Su C, Huang C and Wu C An HMAC processor with integrated SHA-1 and MD5 algorithms Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (456-458)
  1518. Du R, Foo E, Boyd C and Fitzgerald B Defining security services for electronic tendering Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32, (43-52)
  1519. Lee H, Alves-Foss J and Harrison S (2004). The construction of secure mobile agents via evaluating encrypted functions, Web Intelligence and Agent Systems, 2:1, (1-19), Online publication date: 1-Jan-2004.
  1520. Golić J and Menicocci R (2004). Correlation Analysis of the Alternating Step Generator, Designs, Codes and Cryptography, 31:1, (51-74), Online publication date: 1-Jan-2004.
  1521. Chien H and Jan J (2004). Improved authenticated multiple-key agreement protocol without using conventional one-way function, Applied Mathematics and Computation, 147:2, (491-497), Online publication date: 1-Jan-2004.
  1522. ACM
    Peng C, Deng R, Wu Y and Shao W A flexible and scalable authentication scheme for JPEG2000 image codestreams Proceedings of the eleventh ACM international conference on Multimedia, (433-441)
  1523. Pfitzmann B and Waidner M (2003). Analysis of Liberty Single-Sign-on with Enabled Clients, IEEE Internet Computing, 7:6, (38-44), Online publication date: 1-Nov-2003.
  1524. Hühnlein D, Jacobson M and Weber D (2003). Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic Orders, Designs, Codes and Cryptography, 30:3, (281-299), Online publication date: 1-Nov-2003.
  1525. Tseng Y (2003). A scalable key-management scheme with minimizing key storage for secure group communications, International Journal of Network Management, 13:6, (419-425), Online publication date: 1-Nov-2003.
  1526. ACM
    Kaya T, Lin G, Noubir G and Yilmaz A Secure multicast groups on ad hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (94-102)
  1527. ACM
    Deng J, Han R and Mishra S Security support for in-network processing in Wireless Sensor Networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (83-93)
  1528. ACM
    Weimerskirch A and Westhoff D Identity certified authentication for ad-hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (33-40)
  1529. ACM
    Datta A, Derek A, Mitchell J and Pavlovic D Secure protocol composition Proceedings of the 2003 ACM workshop on Formal methods in security engineering, (11-23)
  1530. ACM
    MacKenzie P, Oprea A and Reiter M Automatic generation of two-party computations Proceedings of the 10th ACM conference on Computer and communications security, (210-219)
  1531. ACM
    Zhu B, Wu J and Kankanhalli M Print signatures for document authentication Proceedings of the 10th ACM conference on Computer and communications security, (145-154)
  1532. Pramanik S and Upadhyaya S VPSS Proceedings of the 2003 IEEE conference on Military communications - Volume II, (826-831)
  1533. Lehane B, Doyle L and O'Mahony D Shared RSA key generation in a mobile ad hoc network Proceedings of the 2003 IEEE conference on Military communications - Volume II, (814-819)
  1534. Zhang W, Rao R, Cao G and Kesidis G Secure routing in ad hoc networks and a related intrusion detection problem Proceedings of the 2003 IEEE conference on Military communications - Volume II, (735-740)
  1535. Zachary J A decentralized approach to secure management of nodes in distributed sensor networks Proceedings of the 2003 IEEE conference on Military communications - Volume I, (579-584)
  1536. Smith J, Russell S and Looi M Security as a safety issue in rail communications Proceedings of the 8th Australian workshop on Safety critical systems and software - Volume 33, (79-88)
  1537. ACM
    Hellekalek P and Wegenkittl S (2003). Empirical evidence concerning AES, ACM Transactions on Modeling and Computer Simulation, 13:4, (322-333), Online publication date: 1-Oct-2003.
  1538. Deguillaume F, Voloshynovskiy S and Pun T (2003). Secure hybrid robust watermarking resistant against tampering and copy attack, Signal Processing, 83:10, (2133-2170), Online publication date: 1-Oct-2003.
  1539. ACM
    Kong J, Das S, Tsai E and Gerla M ESCORT Proceedings of the 2nd ACM workshop on Wireless security, (51-60)
  1540. ACM
    Čapkun S and Hubaux J BISS Proceedings of the 2nd ACM workshop on Wireless security, (21-29)
  1541. Nguyen P and Shparlinski I (2003). The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces, Designs, Codes and Cryptography, 30:2, (201-217), Online publication date: 1-Sep-2003.
  1542. Goldreich O (2003). Cryptography and cryptographic protocols, Distributed Computing, 16:2-3, (177-199), Online publication date: 1-Sep-2003.
  1543. ACM
    Alkassar A, Stüble C and Sadeghi A Secure object identification Proceedings of the 2003 workshop on New security paradigms, (77-85)
  1544. Hoque S, Selim H, Howells G, Fairhurst M and Deravi F SAGENT Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 2
  1545. Lee C, Yang W and Hwang M (2003). Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem, Fundamenta Informaticae, 55:3-4, (307-320), Online publication date: 1-Aug-2003.
  1546. Álvarez R, Climent J, Tortosa L and Zamora A A pseudorandom bit generator based on block upper triangular matrices Proceedings of the 2003 international conference on Web engineering, (299-300)
  1547. ACM
    Park J, Chong E and Siegel H Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures Proceedings of the twenty-second annual symposium on Principles of distributed computing, (172-181)
  1548. Seredyński F, Bouvry P and Zomaya A Cellular programming and symmetric key cryptography systems Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII, (1369-1382)
  1549. Heng S and Kurosawa K Square hash with a small key size Proceedings of the 8th Australasian conference on Information security and privacy, (522-531)
  1550. Kim H and Moon S Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders Proceedings of the 8th Australasian conference on Information security and privacy, (488-497)
  1551. Kwon T Robust software tokens Proceedings of the 8th Australasian conference on Information security and privacy, (476-487)
  1552. Hwang Y, Kim C and Lee P An efficient revocation scheme with minimal message length for stateless receivers Proceedings of the 8th Australasian conference on Information security and privacy, (377-386)
  1553. Yen S, Moon S and Ha J Permanent fault attack on the parameters of RSA with CRT Proceedings of the 8th Australasian conference on Information security and privacy, (285-296)
  1554. Pashalidis A and Mitchell C A taxonomy of single sign-on systems Proceedings of the 8th Australasian conference on Information security and privacy, (249-264)
  1555. Persiano P and Visconti I An anonymous credential system and a privacy-aware PKI Proceedings of the 8th Australasian conference on Information security and privacy, (27-38)
  1556. Mcloone M and Mccanny J (2003). Rijndael FPGA Implementations Utilising Look-Up Tables, Journal of VLSI Signal Processing Systems, 34:3, (261-275), Online publication date: 1-Jul-2003.
  1557. López J, Ortega J and Troya J Applying SDL to formal analysis of security systems Proceedings of the 11th international conference on System design, (300-316)
  1558. Brent R, Larvala S and Zimmermann P (2003). A fast algorithm for testing reducibility of trinomials mod 2 and some new primitive trinomials of degree 3021377, Mathematics of Computation, 72:243, (1443-1452), Online publication date: 1-Jul-2003.
  1559. Bleichenbacher D, Kiayias A and Yung M Decoding of interleaved Reed Solomon codes over noisy data Proceedings of the 30th international conference on Automata, languages and programming, (97-108)
  1560. Lory P A process-oriented model for authentication on the basis of a coloured Petri net Proceedings of the 2003 international conference on Business process management, (232-245)
  1561. ACM
    Gray D Anonymous coursework submission Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning, (556-561)
  1562. ACM
    Aleksandrov B and Angelov M Protecting information by means of the remainders theorem Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning, (85-89)
  1563. Seo S and Lee S A secure mobile agent system using multi-signature scheme in electronic commerce Proceedings of the 2nd international conference on Human.society@internet, (527-536)
  1564. Boulkenafed M and Issarny V A middleware service for mobile ad hoc data sharing, enhancing data availability Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware, (493-511)
  1565. Linnartz J and Tuyls P New shielding functions to enhance privacy and prevent misuse of biometric templates Proceedings of the 4th international conference on Audio- and video-based biometric person authentication, (393-402)
  1566. Lee H and Lee I Designated verification of digital watermark for network based image distribution Proceedings of the 2003 international conference on Computational science, (1069-1078)
  1567. ACM
    Benini L, Macii A, Macii E, Omerbegovic E, Pro F and Poncino M Energy-aware design techniques for differential power analysis protection Proceedings of the 40th annual Design Automation Conference, (36-41)
  1568. ACM
    Kong J and Hong X ANODR Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (291-302)
  1569. ACM
    Čapkun S, Hubaux J and Buttyán L Mobility helps security in ad hoc networks Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (46-56)
  1570. Kim C, Kwon S, Kim J and Hong C A compact and fast division architecture for a finite field GF(2m) Proceedings of the 2003 international conference on Computational science and its applications: PartI, (855-864)
  1571. Brent R and Zimmermann P Random number generators with period divisible by a Mersenne prime Proceedings of the 2003 international conference on Computational science and its applications: PartI, (1-10)
  1572. Lange T and Winterhof A (2003). Interpolation of the discrete logarithm in F by Boolean functions and by polynomials in several variables modulo a divisor of q - 1, Discrete Applied Mathematics, 128:1, (193-206), Online publication date: 15-May-2003.
  1573. Lange T and Winterhof A Interpolation of the elliptic curve Diffie-Hellman mapping Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes, (51-60)
  1574. Courtois N and Meier W Algebraic attacks on stream ciphers with linear feedback Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, (345-359)
  1575. Ekdahl P, Meier W and Johansson T Predicting the shrinking generator with fixed connections Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, (330-344)
  1576. Dodis Y and An J Concealment and its applications to authenticated encryption Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, (312-329)
  1577. Sherman A and McGrew D (2003). Key Establishment in Large Dynamic Groups Using One-Way Function Trees, IEEE Transactions on Software Engineering, 29:5, (444-458), Online publication date: 1-May-2003.
  1578. Provos N and Honeyman P (2003). Hide and Seek, IEEE Security and Privacy, 1:3, (32-44), Online publication date: 1-May-2003.
  1579. Bhalla N (2003). Refereed Is the mouse click mighty enough to bring society to its knees?, Computers and Security, 22:4, (322-336), Online publication date: 1-May-2003.
  1580. Peyravian M, Roginsky A and Zunic N (2003). Refereed Methods for preventing unauthorized software distribution, Computers and Security, 22:4, (316-321), Online publication date: 1-May-2003.
  1581. Deng J, Han R and Mishra S A performance evaluation of intrusion-tolerant routing in wireless sensor networks Proceedings of the 2nd international conference on Information processing in sensor networks, (349-364)
  1582. Lee J, Cheon J and Kim S An analysis of proxy signatures Proceedings of the 2003 RSA conference on The cryptographers' track, (68-79)
  1583. Abadi M and Blanchet B (2003). Secrecy types for asymmetric communication, Theoretical Computer Science, 298:3, (387-415), Online publication date: 11-Apr-2003.
  1584. Yen S, Kim S, Lim S and Moon S (2003). RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis, IEEE Transactions on Computers, 52:4, (461-472), Online publication date: 1-Apr-2003.
  1585. Satoh A and Takano K (2003). A Scalable Dual-Field Elliptic Curve Cryptographic Processor, IEEE Transactions on Computers, 52:4, (449-460), Online publication date: 1-Apr-2003.
  1586. Bucci M, Germani L, Luzzi R, Trifiletti A and Varanonuovo M (2003). A High-Speed Oscillator-Based Truly Random Number Source for Cryptographic Applications on a Smart Card IC, IEEE Transactions on Computers, 52:4, (403-409), Online publication date: 1-Apr-2003.
  1587. Kallahalla M, Riedel E, Swaminathan R, Wang Q and Fu K Plutus Proceedings of the 2nd USENIX conference on File and storage technologies, (3-3)
  1588. Zhu F, Mutka M and Ni L Splendor Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
  1589. ACM
    Gassend B, Clarke D, van Dijk M and Devadas S Delay-based circuit authentication and applications Proceedings of the 2003 ACM symposium on Applied computing, (294-301)
  1590. Cilardo A, Mazzeo A, Romano L, Saggese G and Cattaneo G (2003). A web services based architecture for digital time stamping, Journal of Web Engineering, 2:3, (148-175), Online publication date: 1-Feb-2003.
  1591. van Dam W, Hallgren S and Ip L Quantum algorithms for some hidden shift problems Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, (489-498)
  1592. Srebrny M and Such P Encryption using two-dimensional cellular automata with applications Artificial intelligence and security in computing systems, (203-215)
  1593. Agnew G Secure electronic transactions Payment technologies for E-commerce, (211-226)
  1594. Zhang F and Wang Y Security fundamentals Payment technologies for E-commerce, (7-38)
  1595. Rivest R Cryptography, computers in Encyclopedia of Computer Science, (468-470)
  1596. Heys H (2003). Analysis of the Statistical Cipher Feedback Mode of Block Ciphers, IEEE Transactions on Computers, 52:1, (77-92), Online publication date: 1-Jan-2003.
  1597. ACM
    Adya A, Bolosky W, Castro M, Cermak G, Chaiken R, Douceur J, Howell J, Lorch J, Theimer M and Wattenhofer R (2002). Farsite, ACM SIGOPS Operating Systems Review, 36:SI, (1-14), Online publication date: 31-Dec-2003.
  1598. Adya A, Bolosky W, Castro M, Cermak G, Chaiken R, Douceur J, Howell J, Lorch J, Theimer M and Wattenhofer R Farsite Proceedings of the 5th symposium on Operating systems design and implementation (Copyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading), (1-14)
  1599. ACM
    Kirovski D, Drinić M and Potkonjak M (2002). Enabling trusted software integrity, ACM SIGOPS Operating Systems Review, 36:5, (108-120), Online publication date: 1-Dec-2002.
  1600. ACM
    Kirovski D, Drinić M and Potkonjak M (2002). Enabling trusted software integrity, ACM SIGARCH Computer Architecture News, 30:5, (108-120), Online publication date: 1-Dec-2002.
  1601. Sella Y Speeding up secure sessions establishment on the internet Proceedings of the 5th international conference on Information security and cryptology, (433-450)
  1602. Yen S, Moon S and Ha J Hardware fault attack on RSA with CRT revisited Proceedings of the 5th international conference on Information security and cryptology, (374-388)
  1603. Choi S and Yang K Balanced shrinking generators Proceedings of the 5th international conference on Information security and cryptology, (213-226)
  1604. Courtois N Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt Proceedings of the 5th international conference on Information security and cryptology, (182-199)
  1605. Rila L and Mitchell C Security analysis of smartcard to card reader communications for biometric cardholder authentication Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5, (3-3)
  1606. ACM
    Damiani E, di Vimercati D, Paraboschi S, Samarati P and Violante F A reputation-based approach for choosing reliable resources in peer-to-peer networks Proceedings of the 9th ACM conference on Computer and communications security, (207-216)
  1607. ACM
    Bertino E, Carminati B and Ferrari E A temporal key management scheme for secure broadcasting of XML documents Proceedings of the 9th ACM conference on Computer and communications security, (31-40)
  1608. Fournet C and Abadi M Hiding names Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems, (317-338)
  1609. Schaumont P and Verbauwhede I (2002). Domain Specific Tools and Methods for Application in Security Processor Design, Design Automation for Embedded Systems, 7:4, (365-383), Online publication date: 1-Nov-2002.
  1610. Kwak D, Ha J, Lee H, Kim H and Moon S A WTLS handshake protocol with user anonymity and forward secrecy Proceedings of the 7th CDMA international conference on Mobile communications, (219-230)
  1611. ACM
    Kirovski D, Drinić M and Potkonjak M Enabling trusted software integrity Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, (108-120)
  1612. ACM
    Kirovski D, Drinić M and Potkonjak M (2002). Enabling trusted software integrity, ACM SIGPLAN Notices, 37:10, (108-120), Online publication date: 1-Oct-2002.
  1613. ACM
    Staddon J, Balfanz D and Durfee G Efficient tracing of failed nodes in sensor networks Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, (122-130)
  1614. ACM
    Faria D and Cheriton D DoS and authentication in wireless public access networks Proceedings of the 1st ACM workshop on Wireless security, (47-56)
  1615. ACM
    Čapkun S, Buttyán L and Hubaux J Small worlds in security systems Proceedings of the 2002 workshop on New security paradigms, (28-35)
  1616. ACM
    Zandy V and Miller B Reliable network connections Proceedings of the 8th annual international conference on Mobile computing and networking, (95-106)
  1617. ACM
    Hu Y, Perrig A and Johnson D Ariadne Proceedings of the 8th annual international conference on Mobile computing and networking, (12-23)
  1618. Borissov Y, Nikova S, Preneel B and Vandewalle J On a resynchronization weakness in a class of combiners with memory Proceedings of the 3rd international conference on Security in communication networks, (164-173)
  1619. Niedermeyer F and Schindler W On a class of key agreement protocols which cannot be unconditionally secure Proceedings of the 3rd international conference on Security in communication networks, (133-145)
  1620. Lee C, Yang W and Hwang M (2002). Untraceable blind signature schemes based on discrete logarithm problem, Fundamenta Informaticae, 55:3-4, (307-320), Online publication date: 1-Sep-2002.
  1621. Shoup V (2002). OAEP Reconsidered, Journal of Cryptology, 15:4, (223-249), Online publication date: 1-Sep-2002.
  1622. Vingralek R GnatDb Proceedings of the 28th international conference on Very Large Data Bases, (884-893)
  1623. ACM
    Blundo C and Cimato S SAWM Proceedings of the 14th international conference on Software engineering and knowledge engineering, (641-648)
  1624. Blake I and Garefalakis T (2002). On the Security of the Digital Signature Algorithm, Designs, Codes and Cryptography, 26:1-3, (87-96), Online publication date: 26-Jun-2002.
  1625. ACM
    Schaumont P, Kuo H and Verbauwhede I Unlocking the design secrets of a 2.29 Gb/s Rijndael processor Proceedings of the 39th annual Design Automation Conference, (634-639)
  1626. Claessens J, Dem V, De Cock D, Preneel B and Vandewalle J (2002). On the Security of Today's Online Electronic Banking Systems, Computers and Security, 21:3, (253-265), Online publication date: 1-Jun-2002.
  1627. Nguyen and Shparlinski (2002). The Insecurity of the Digital Signature Algorithm with Partially Known Nonces, Journal of Cryptology, 15:3, (151-176), Online publication date: 1-Jun-2002.
  1628. ACM
    Blundo C, Cimato S and De Bonis A A lightweight protocol for the generation and distribution of secure e-coupons Proceedings of the 11th international conference on World Wide Web, (542-552)
  1629. ACM
    Cornelli F, Damiani E, di Vimercati S, Paraboschi S and Samarati P Choosing reputable servents in a P2P network Proceedings of the 11th international conference on World Wide Web, (376-386)
  1630. Xiao L, Zhang X and Xu Z On Reliable and Scalable Peer-to-Peer Web Document Sharing Proceedings of the 16th International Parallel and Distributed Processing Symposium
  1631. Abadi M Private authentication Proceedings of the 2nd international conference on Privacy enhancing technologies, (27-40)
  1632. Markiewicz M, Lucena C and Cowan D (2002). Taming access control security, Software—Practice & Experience, 32:4, (341-358), Online publication date: 10-Apr-2002.
  1633. Fan C and Lei C (2002). An unlinkably divisible and intention attachable ticket scheme for runoff elections, Journal of Network and Computer Applications, 25:2, (93-107), Online publication date: 1-Apr-2002.
  1634. Furukawa J, Miyauchi H, Mori K, Obana S and Sako K An implementation of a universally verifiable electronic voting scheme based on shuffling Proceedings of the 6th international conference on Financial cryptography, (16-30)
  1635. ACM
    Ferreira L and Dahab R Blinded-key signatures Proceedings of the 2002 ACM symposium on Applied computing, (82-86)
  1636. Biehl I, Buchmann J, Hamdy S and Meyer A (2002). A Signature Scheme Based on the Intractability of Computing Roots, Designs, Codes and Cryptography, 25:3, (223-236), Online publication date: 1-Mar-2002.
  1637. Golić J and Menicocci R (2002). Computation of Edit Probabilities and Edit Distances for the A5-Type Keystream Generator, Journal of Complexity, 18:1, (356-374), Online publication date: 1-Mar-2002.
  1638. ACM
    McCracken S and Zilic Z FPGA test time reduction through a novel interconnect testing scheme Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays, (136-144)
  1639. Quinlan S and Dorward S Awarded Best Paper! - Venti: A New Approach to Archival Data Storage Proceedings of the 1st USENIX Conference on File and Storage Technologies, (7-es)
  1640. Maniatis P and Baker M Enabling the Archival Storage of Signed Documents Proceedings of the 1st USENIX Conference on File and Storage Technologies, (3-es)
  1641. Quinlan S and Dorward S Venti Proceedings of the 1st USENIX conference on File and storage technologies, (7-7)
  1642. Maniatis P and Baker M Enabling the archival storage of signed documents Proceedings of the 1st USENIX conference on File and storage technologies, (3-3)
  1643. Tzeng W (2002). A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, IEEE Transactions on Knowledge and Data Engineering, 14:1, (182-188), Online publication date: 1-Jan-2002.
  1644. Vasco M and Shparlinski I (2002). Security of the most significant bits of the Shamir message passing scheme, Mathematics of Computation, 71:237, (333-342), Online publication date: 1-Jan-2002.
  1645. Stinson D (2002). Some baby-step giant-step algorithms for the low hamming weight discrete logarithm problem, Mathematics of Computation, 71:237, (379-391), Online publication date: 1-Jan-2002.
  1646. Roth V and Peters J A Scalable and Secure Global Tracking Service for Mobile Agents Proceedings of the 5th International Conference on Mobile Agents, (169-181)
  1647. Roth V On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection Proceedings of the 5th International Conference on Mobile Agents, (1-14)
  1648. Mao W (2001). Verifiable Partial Escrow of Integer Factors, Designs, Codes and Cryptography, 24:3, (327-342), Online publication date: 1-Dec-2001.
  1649. Shparlinski I and Silverman J (2001). On the Linear Complexity of the Naor–Reingold Pseudo-random Function from Elliptic Curves, Designs, Codes and Cryptography, 24:3, (279-289), Online publication date: 1-Dec-2001.
  1650. ACM
    Haber S and Pinkas B Securely combining public-key cryptosystems Proceedings of the 8th ACM conference on Computer and Communications Security, (215-224)
  1651. ACM
    Neff C A verifiable secret shuffle and its application to e-voting Proceedings of the 8th ACM conference on Computer and Communications Security, (116-125)
  1652. ACM
    Naccache D, Pointcheval D and Stern J Twin signatures Proceedings of the 8th ACM conference on Computer and Communications Security, (20-27)
  1653. Dhem J and Feyt N (2001). Hardware and Software Symbiosis Helps Smart Card Evolution, IEEE Micro, 21:6, (14-25), Online publication date: 1-Nov-2001.
  1654. ACM
    Hubaux J, Buttyán L and Capkun S The quest for security in mobile ad hoc networks Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (146-155)
  1655. Gopalakrishnan K, Memon N and Vora P (2001). Protocols for Watermark Verification, IEEE MultiMedia, 8:4, (66-70), Online publication date: 1-Oct-2001.
  1656. Dittmann J, Wohlmacher P and Nahrstedt K (2001). Using Cryptographic and Watermarking Algorithms, IEEE MultiMedia, 8:4, (54-65), Online publication date: 1-Oct-2001.
  1657. (2001). An Efficient Blind Signature Scheme for Information Hiding, International Journal of Electronic Commerce, 6:1, (93-100), Online publication date: 1-Sep-2001.
  1658. Fu K, Sit E, Smith K and Feamster N Dos and don'ts of client authentication on the web Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  1659. ACM
    Kaliski B (2001). An unknown key-share attack on the MQV key agreement protocol, ACM Transactions on Information and System Security, 4:3, (275-288), Online publication date: 1-Aug-2001.
  1660. Joye M, Quisquater J and Takagi T (2001). How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves, Designs, Codes and Cryptography, 23:3, (297-316), Online publication date: 19-Jul-2001.
  1661. ACM
    Perrig A, Szewczyk R, Wen V, Culler D and Tygar J SPINS Proceedings of the 7th annual international conference on Mobile computing and networking, (189-199)
  1662. Vannucci S On perfect secret sharing schemes and coalitional game forms Proceedings of the 8th conference on Theoretical aspects of rationality and knowledge, (183-192)
  1663. Zhang T and Parhi K (2001). Systematic Design of Original and Modified Mastrovito Multipliers for General Irreducible Polynomials, IEEE Transactions on Computers, 50:7, (734-749), Online publication date: 1-Jul-2001.
  1664. O'connor L (2001). On String Replacement Exponentiation, Designs, Codes and Cryptography, 23:2, (173-184), Online publication date: 1-Jul-2001.
  1665. ACM
    Koushanfar F and Qu G Hardware metering Proceedings of the 38th annual Design Automation Conference, (490-493)
  1666. ACM
    Wolfe G, Wong J and Potkonjak M Watermarking graph partitioning solutions Proceedings of the 38th annual Design Automation Conference, (486-489)
  1667. ACM
    Majumdar R and Wong J Watermarking of SAT using combinatorial isolation lemmas Proceedings of the 38th annual Design Automation Conference, (480-485)
  1668. Kim Y, Perrig A and Tsudik G Communication-efficient group key agreement Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (229-244)
  1669. Gabillon A and Byun J A two-level time-stamping system Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (139-149)
  1670. Burmester M, Chrissikopoulos V, Kotzanikolaou P and Magkos E Strong forward security Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge, (109-121)
  1671. Akl S and Bruda S (2001). Improving A Solution's Quality Through Parallel Processing, The Journal of Supercomputing, 19:2, (221-233), Online publication date: 9-Jun-2001.
  1672. Wilhelm U, Staamann S and Buttyán L Introducing trusted third parties to the mobile agent paradigm Secure Internet programming, (469-489)
  1673. Abadi M Protection in programming-language translations Secure Internet programming, (19-34)
  1674. ACM
    Steiner M, Buhler P, Eirich T and Waidner M (2001). Secure password-based cipher suite for TLS, ACM Transactions on Information and System Security, 4:2, (134-157), Online publication date: 1-May-2001.
  1675. Shparlinski I (2001). On the Linear Complexity of the Power Generator, Designs, Codes and Cryptography, 23:1, (5-10), Online publication date: 1-May-2001.
  1676. Exploring Robustness in Group Key Agreement Proceedings of the The 21st International Conference on Distributed Computing Systems
  1677. Brincat K (2001). On the Use of RSA as a Secret Key Cryptosystem, Designs, Codes and Cryptography, 22:3, (317-329), Online publication date: 1-Apr-2001.
  1678. Peyravian M, Matyas S, Roginsky A and Zunic N (2001). Refereed Papers, Computers and Security, 20:2, (173-179), Online publication date: 1-Apr-2001.
  1679. Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
  1680. Smith S and Safford D (2001). Practical server privacy with secure coprocessors, IBM Systems Journal, 40:3, (683-695), Online publication date: 1-Mar-2001.
  1681. ACM
    Abadi M and Fournet C (2001). Mobile values, new names, and secure communication, ACM SIGPLAN Notices, 36:3, (104-115), Online publication date: 1-Mar-2001.
  1682. Stinson D (2001). Something About All or Nothing (Transforms), Designs, Codes and Cryptography, 22:2, (133-138), Online publication date: 1-Mar-2001.
  1683. ACM
    Moskowitz I, Longdon G and Chang L A new paradigm hidden in steganography Proceedings of the 2000 workshop on New security paradigms, (41-50)
  1684. ACM
    Abadi M and Fournet C Mobile values, new names, and secure communication Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (104-115)
  1685. Gutzmann K (2001). Access Control and Session Management in the HTTP Environment, IEEE Internet Computing, 5:1, (26-35), Online publication date: 1-Jan-2001.
  1686. Boneh D, Demillo R and Lipton R (2001). On the Importance of Eliminating Errors in Cryptographic Computations, Journal of Cryptology, 14:2, (101-119), Online publication date: 1-Jan-2001.
  1687. Bailey D and Paar C (2001). Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography, Journal of Cryptology, 14:3, (153-176), Online publication date: 1-Jan-2001.
  1688. Gehrmann C and Nikander P Securing ad hoc services, a Jini view Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, (135-136)
  1689. Buttyán L and Hubaux J Enforcing service availability in mobile ad-hoc WANs Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, (87-96)
  1690. ACM
    Kim Y, Perrig A and Tsudik G Simple and fault-tolerant key agreement for dynamic collaborative groups Proceedings of the 7th ACM conference on Computer and Communications Security, (235-244)
  1691. ACM
    Håstad J, Jonsson J, Juels A and Yung M Funkspiel schemes Proceedings of the 7th ACM conference on Computer and Communications Security, (125-133)
  1692. Maheshwari U, Vingralek R and Shapiro W How to build a trusted database system on untrusted storage Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
  1693. Golic J, Clark A and Dawson E (2000). Generalized Inversion Attack on Nonlinear Filter Generators, IEEE Transactions on Computers, 49:10, (1100-1109), Online publication date: 1-Oct-2000.
  1694. Torrubia A and Mora F (2000). Information Security in Multiprocessor Systems Based on the X86 Architecture, Computers and Security, 19:6, (559-563), Online publication date: 1-Oct-2000.
  1695. ACM
    Mohapatra P (2000). Public key cryptography, XRDS: Crossroads, The ACM Magazine for Students, 7:1, (14-22), Online publication date: 1-Sep-2000.
  1696. Michener J and Acar T (2000). Security Domains, IEEE Software, 17:5, (52-58), Online publication date: 1-Sep-2000.
  1697. Wilhelm U, Staamann S and Buttyán L (2000). A Pessimistic Approach to Trust in Mobile Agent Platforms, IEEE Internet Computing, 4:5, (40-48), Online publication date: 1-Sep-2000.
  1698. Yen S and Joye M (2000). Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis, IEEE Transactions on Computers, 49:9, (967-970), Online publication date: 1-Sep-2000.
  1699. Horn G and Preneel B (2000). Authentication and payment in future mobile systems, Journal of Computer Security, 8:2,3, (183-207), Online publication date: 1-Aug-2000.
  1700. Steiner M, Tsudik G and Waidner M (2000). Key Agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems, 11:8, (769-780), Online publication date: 1-Aug-2000.
  1701. Lambrinoudakis C and Gritzalis S (2000). Managing Medical and Insurance Information Through a Smart-Card-Based Information System, Journal of Medical Systems, 24:4, (213-234), Online publication date: 1-Aug-2000.
  1702. Dondeti L, Mukherjee S and Samal A DISEC Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
  1703. Joye M and Yen S (2000). Optimal Left-to-Right Binary Signed-Digit Recoding, IEEE Transactions on Computers, 49:7, (740-748), Online publication date: 1-Jul-2000.
  1704. Devanbu P (2000). Desert Island Column, Automated Software Engineering, 7:3, (305-308), Online publication date: 1-Jul-2000.
  1705. ACM
    Alsinet T, Béjar R, Fernanadez C and Manyà F A Multi-agent system architecture for monitoring medical protocols Proceedings of the fourth international conference on Autonomous agents, (499-505)
  1706. Grieu F A chosen messages attack on the ISO/IEC 9796-1 signature scheme Proceedings of the 19th international conference on Theory and application of cryptographic techniques, (70-80)
  1707. ACM
    Devanbu P and Stubblebine S Software engineering for security Proceedings of the Conference on The Future of Software Engineering, (227-239)
  1708. ACM
    Landau S (2000). Technical opinion: designing cryptography for the new century, Communications of the ACM, 43:5, (115-120), Online publication date: 1-May-2000.
  1709. Leung K, Ma K, Wong W and Leong P FPGA Implementation of a Microcoded Elliptic Curve Cryptographic Processor Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
  1710. ACM
    Zhou J and Deng R (2000). On the validity of digital signatures, ACM SIGCOMM Computer Communication Review, 30:2, (29-34), Online publication date: 1-Apr-2000.
  1711. Jacobson M, Koblitz N, Silverman J, Stein A and Teske E (2000). Analysis of the Xedni Calculus Attack, Designs, Codes and Cryptography, 20:1, (41-64), Online publication date: 1-Apr-2000.
  1712. Odlyzko A (2000). Discrete Logarithms, Designs, Codes and Cryptography, 19:2-3, (129-145), Online publication date: 1-Mar-2000.
  1713. Blake-Wilson S (2000). Information Security, Mathematics, and Public-Key Cryptography, Designs, Codes and Cryptography, 19:2-3, (77-99), Online publication date: 1-Mar-2000.
  1714. Solinas J (2000). Efficient Arithmetic on Koblitz Curves, Designs, Codes and Cryptography, 19:2-3, (195-249), Online publication date: 1-Mar-2000.
  1715. ACM
    Melnyk V, Korkishko T, Melnyk A and Baesig J Comparative analysis of the DES cryptographic processor's architecture (abstract only) Proceedings of the symposium on Contemporary computing in Ukraine, (100-109)
  1716. ACM
    Kim H and Mangione-Smith W Factoring large numbers with programmable hardware Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays, (41-48)
  1717. Devanbu P and Stubblebine S (2000). Cryptographic Verification of Test Coverage Claims, IEEE Transactions on Software Engineering, 26:2, (178-192), Online publication date: 1-Feb-2000.
  1718. Dimitrov V, Jullien G and Miller W (2000). Complexity and Fast Algorithms for Multiexponentiations, IEEE Transactions on Computers, 49:2, (141-147), Online publication date: 1-Feb-2000.
  1719. ACM
    Abadi M, Fournet C and Gonthier G Authentication primitives and their compilation Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (302-315)
  1720. Bentley D, Rose G and Whalen T ssmail: Opportunistic Encryption in sendmail Proceedings of the 13th USENIX conference on System administration, (1-8)
  1721. Kirovski D and Potkonjak M Localized watermarking Proceedings of the 1999 IEEE/ACM international conference on Computer-aided design, (596-599)
  1722. Csapodi M, Vandewalle J and Preneel B (1999). CNN Algorithms for Video Authentication and Copyright Protection, Journal of VLSI Signal Processing Systems, 23:2-3, (449-463), Online publication date: 1-Nov-1999.
  1723. ACM
    Ateniese G Efficient verifiable encryption (and fair exchange) of digital signatures Proceedings of the 6th ACM conference on Computer and communications security, (138-146)
  1724. ACM
    Aiello W, Rubin A and Strauss M Using smartcards to secure a personalized gambling device Proceedings of the 6th ACM conference on Computer and communications security, (128-137)
  1725. ACM
    Monrose F, Reiter M and Wetzel S Password hardening based on keystroke dynamics Proceedings of the 6th ACM conference on Computer and communications security, (73-82)
  1726. ACM
    Juels A and Wattenberg M A fuzzy commitment scheme Proceedings of the 6th ACM conference on Computer and communications security, (28-36)
  1727. Paar C, Fleischmann P and Soria-Rodriguez P (1999). Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents, IEEE Transactions on Computers, 48:10, (1025-1034), Online publication date: 1-Oct-1999.
  1728. Kedem G and Ishihara Y Brute force attack on UNIX passwords with SIMD computer Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (8-8)
  1729. Helme A and Stabell-Kulø T Offline delegation Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (3-3)
  1730. Wilcox D, Pierson L, Robertson P, Witzke E and Gass K A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, (37-48)
  1731. Hartmann M, Paulus S and Takagi T NICE - New Ideal Coset Encryption Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, (328-339)
  1732. López J and Dahab R Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, (316-327)
  1733. Itoh K, Takenaka M, Torii N, Temma S and Kurihara Y Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, (61-72)
  1734. ACM
    Mitchell C and Rantos K (1999). A fair certification protocol, ACM SIGCOMM Computer Communication Review, 29:3, (47-49), Online publication date: 1-Jul-1999.
  1735. ACM
    Chin S (1999). High-confidence design for security, Communications of the ACM, 42:7, (33-37), Online publication date: 1-Jul-1999.
  1736. Bernstein D (1999). How to Stretch Random Functions, Journal of Cryptology, 12:3, (185-192), Online publication date: 1-Jun-1999.
  1737. Stabell-Kulø T, Arild R and Myrvang P Providing authentication to messages signed with a smart card in hostile environments Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, (11-11)
  1738. O'Connor L An analysis of exponentiation based on formal languages Proceedings of the 17th international conference on Theory and application of cryptographic techniques, (375-388)
  1739. Johansson T and Jönsson F Improved fast correlation attacks on stream ciphers via convolutional codes Proceedings of the 17th international conference on Theory and application of cryptographic techniques, (347-362)
  1740. Orlando G and Paar C A Super-Serial Galois Fields Multiplier for FPGAs and its Application to Public-Key Algorithms Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
  1741. ACM
    Martin K and Mitchell C (1999). Comments on an optimized protocol for mobile network authentication and security, ACM SIGMOBILE Mobile Computing and Communications Review, 3:2, (37-37), Online publication date: 1-Apr-1999.
  1742. Preneel B The State of Cryptographic Hash Functions Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, (158-182)
  1743. Knudsen L Contemporary Block Ciphers Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, (105-126)
  1744. Johnston A A generalized qth root algorithm Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms, (929-930)
  1745. ACM
    Kwon T and Song J (1999). Clarifying straight replays and forced delays, ACM SIGOPS Operating Systems Review, 33:1, (47-52), Online publication date: 1-Jan-1999.
  1746. Peyravian M, Roginsky A and Zunic N (1999). Refereed paper, Computers and Security, 18:4, (345-350), Online publication date: 1-Jan-1999.
  1747. ACM
    Kirovski D, Hwang Y, Potkonjak M and Cong J Intellectual property protection by watermarking combinational logic synthesis solutions Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design, (194-198)
  1748. ACM
    Gabber E and Wool A How to prove where you are Proceedings of the 5th ACM conference on Computer and communications security, (142-149)
  1749. ACM
    Halevi S and Krawczyk H Public-key cryptography and password protocols Proceedings of the 5th ACM conference on Computer and communications security, (122-131)
  1750. ACM
    Ateniese G, Steiner M and Tsudik G Authenticated group key agreement and friends Proceedings of the 5th ACM conference on Computer and communications security, (17-26)
  1751. ACM
    Mathuria A (1998). Comparing lower bounds on messages and rounds for two classes of key establishment protocols, ACM SIGCOMM Computer Communication Review, 28:5, (91-98), Online publication date: 1-Oct-1998.
  1752. ACM
    Joye M and Yen S (1998). ID-based secret-key cryptography, ACM SIGOPS Operating Systems Review, 32:4, (33-39), Online publication date: 1-Oct-1998.
  1753. ACM
    Mitchell C and Yeun C (1998). Fixing a problem in the Helsinki protocol, ACM SIGOPS Operating Systems Review, 32:4, (21-24), Online publication date: 1-Oct-1998.
  1754. Rubin A and Geer Jr. D (1998). A Survey of Web Security, Computer, 31:9, (34-41), Online publication date: 1-Sep-1998.
  1755. Rogaway P and Coppersmith D (1998). A Software-Optimized Encryption Algorithm, Journal of Cryptology, 11:4, (273-287), Online publication date: 1-Sep-1998.
  1756. ACM
    Bellare M, Canetti R and Krawczyk H A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) Proceedings of the thirtieth annual ACM symposium on Theory of computing, (419-428)
  1757. ACM
    Kahng A, Mantik S, Markov I, Potkonjak M, Tucker P, Wang H and Wolfe G Robust IP watermarking methodologies for physical design Proceedings of the 35th annual Design Automation Conference, (782-787)
  1758. ACM
    Kahng A, Lach J, Mangione-Smith W, Mantik S, Markov I, Potkonjak M, Tucker P, Wang H and Wolfe G Watermarking techniques for intellectual property protection Proceedings of the 35th annual Design Automation Conference, (776-781)
  1759. Devanbu P, Fong P and Stubblebine S Techniques for trusted software engineering Proceedings of the 20th international conference on Software engineering, (126-135)
  1760. Paar C, Fleischmann P and Roelse P (1998). Efficient Multiplier Architectures for Galois Fields GF(24n), IEEE Transactions on Computers, 47:2, (162-170), Online publication date: 1-Feb-1998.
  1761. Gutmann P Software generation of practically strong random numbers Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (19-19)
  1762. Schneier B and Kelsey J Cryptographic support for secure logs on untrusted machines Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (4-4)
  1763. Blaum M, Bruck J, Rubin K and Lenth W (1998). A Coding Approach for Detection of Tampering in Write-Once Optical Disks, IEEE Transactions on Computers, 47:1, (120-125), Online publication date: 1-Jan-1998.
  1764. Matyas M, Peyravian M, Roginsky A and Zunic N (1998). Refereed paper, Computers and Security, 17:3, (265-272), Online publication date: 1-Jan-1998.
  1765. ACM
    Devanbu P and Stubblebine S (1997). Cryptographic verification of test coverage claims, ACM SIGSOFT Software Engineering Notes, 22:6, (395-413), Online publication date: 1-Nov-1997.
  1766. Devanbu P and Stubblebine S Cryptographic verification of test coverage claims Proceedings of the 6th European SOFTWARE ENGINEERING conference held jointly with the 5th ACM SIGSOFT international symposium on Foundations of software engineering, (395-413)
  1767. Bellare M and Micciancio D A new paradigm for collision-free hashing Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, (163-192)
  1768. Gehrmann C, Tiloca M and Hoglund R SMACK: Short message authentication check against battery exhaustion in the Internet of Things 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), (274-282)
  1769. Bulenok M, Tunaru I, Biard L, Denis B and Uguen B Experimental channel-based secret key generation with integrated ultra wideband devices 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), (1-6)
  1770. Partridge T To what extent has human thought and personality become encapsulated by technology-related activity? 2015 IEEE International Symposium on Technology and Society (ISTAS), (1-5)
  1771. Dieber B, Kacianka S, Rass S and Schartner P Application-level security for ROS-based applications 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (4477-4482)
  1772. Arafin M and Qu G RRAM based lightweight user authentication 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), (139-145)
  1773. Vázquez-Fernández E, Cadena C and Reyes-Gómez D A genetic algorithm with a mutation mechanism based on a Gaussian and uniform distribution to minimize addition chains for small exponents 2016 IEEE Congress on Evolutionary Computation (CEC), (935-940)
  1774. Mejri M, Achir N and Hamdi M A new group Diffie-Hellman key generation proposal for secure VANET communications 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), (992-995)
  1775. Schindler W Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA Cryptographic Hardware and Embedded Systems -- CHES 2015, (229-247)
  1776. Espitau T, Fouque P and Karpman P Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE Advances in Cryptology -- CRYPTO 2015, (683-701)
  1777. Mouha N and Luykx A Multi-key Security: The Even-Mansour Construction Revisited Advances in Cryptology -- CRYPTO 2015, (209-223)
  1778. Dolecki M and Kozera R The Impact of the TPM Weights Distribution on Network Synchronization Time Computer Information Systems and Industrial Management, (451-460)
  1779. Chen H and Chen C A Secure Multicast Key Agreement Scheme Information and Communication Technology, (275-281)
Contributors
  • University of Waterloo
  • University of Waterloo
  • Carleton University

Recommendations