文件名称:EUROCRYPT-2009
下载
别用迅雷、360浏览器下载。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
介绍说明--下载内容均来自于网络,请自行研究使用
密码学国际顶级会议论文集,是密码学研究者寻求的有价值的文献。-Cryptography top international conference proceedings, cryptography researchers seeking valuable literature
(系统自动生成,下载前可以参看下载内容)
下载文件列表
| 文件名 | 大小 | 更新时间 |
|---|---|---|
| EUROCRYPT09\A Double-Piped Mode of Operation for MACs | PRFs and PROs Security beyond the Birthday Barrier .pdf | |
| ...........\A Leakage-Resilient Mode of Operation .pdf | ||
| ...........\A New Randomness Extraction Paradigm for Hybrid Encryption .pdf | ||
| ...........\A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks .pdf | ||
| ...........\A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks .pdf | ||
| ...........\Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) .pdf | ||
| ...........\Asymmetric Group Key Agreement .pdf | ||
| ...........\back-matter.pdf | ||
| ...........\Breaking RSA Generically Is Equivalent to Factoring .pdf | ||
| ...........\Cryptanalysis of MDC-2 .pdf | ||
| ...........\Cryptanalysis on HMAC NMAC MD5 and MD5 MAC .pdf | ||
| ...........\Cryptography without (Hardly Any) Secrets .pdf | ||
| ...........\Cube Attacks on Tweakable Black Box Polynomials .pdf | ||
| ...........\Double-Base Number System for Multi-scalar Multiplications .pdf | ||
| ...........\ECM on Graphics Cards .pdf | ||
| ...........\Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves .pdf | ||
| ...........\Finding Preimages in Full MD5 Faster Than Exhaustive Search .pdf | ||
| ...........\front-matter.pdf | ||
| ...........\Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields .pdf | ||
| ...........\Key Agreement from Close Secrets over Unsecured Channels.pdf | ||
| ...........\On Randomizing Hash Functions to Strengthen the Security of Digital Signatures .pdf | ||
| ...........\On the Portability of Generalized Schnorr Proofs .pdf | ||
| ...........\On the Security Loss in Cryptographic Reductions .pdf | ||
| ...........\On the Security of Cryptosystems with Quadratic Decryption The Nicest Cryptanalysis .pdf | ||
| ...........\On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model .pdf | ||
| ...........\Optimal Randomness Extraction from a Diffie-Hellman Element .pdf | ||
| ...........\Order-Preserving Symmetric Encryption .pdf | ||
| ...........\Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening .pdf | ||
| ...........\Practical Chosen Ciphertext Secure Encryption from Factoring .pdf | ||
| ...........\Realizing Hash-and-Sign Signatures under Standard Assumptions .pdf | ||
| ...........\Resettably Secure Computation .pdf | ||
| ...........\Salvaging Merkle-Damg_ard for.pdf | ||
| ...........\Simulation without the Artificial Abort Simplified Proof and Improved Concrete Security for Waters IBE Scheme .pdf | ||
| ...........\Smashing SQUASH-0 .pdf | ||
| ...........\Traitors Collaborating in Public Pirates 2.0 .pdf | ||
| ...........\Verifiable Random Functions from Identity-Based Key Encapsulation .pdf | ||
| EUROCRYPT09 |