-
1
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
Springer-Verlag
-
R. Anderson and M. Kuhn, "Low cost attacks on tamper resistant devices", in Security protocols: International Workshop’97, LNCS 1361, Springer-Verlag, pp. 125-136, 1997.
-
(1997)
Security Protocols: International Workshop’97, LNCS
, vol.1361
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
2
-
-
27844603537
-
An efficient and practical scheme for privacy protection in e-commerce of digital goods
-
F. Bao, R. Deng, P. Feng,. An efficient and practical scheme for privacy protection in e-commerce of digital goods., Pre-Proceedings of The 3rd International Conference on Information Security and Cryptology (ICISC00), pp. 167-176, 2000.
-
(2000)
Pre-Proceedings of the International Conference on Information Security and Cryptology (ICISC00)
, pp. 167-176
-
-
Bao, F.1
Deng, R.2
Feng, P.3
-
4
-
-
0026397734
-
Differential cryptanalysi of DES-like cryptosystems
-
E. Biham and A. Shamir, "Differential cryptanalysi of DES-like cryptosystems", Journal of Cryptology, Vol. 4, No. 1, pp. 3-72, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
7
-
-
84957355967
-
On the importantance of checking cryptographic protocols for faults
-
Springer-Verlag
-
D. Boneh, R. DeMillo, and R. Lipton, "On the importantance of checking cryptographic protocols for faults", in Proc of Eurocrypt’97, LNCS 1233, Springer-Verlag, pp. 37-51, 1997.
-
(1997)
Proc of Eurocrypt’97, LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
Demillo, R.2
Lipton, R.3
-
8
-
-
84957670625
-
-
Crypto’95, LNCS, Springer-Verlag
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data", Crypto’95, LNCS, pp. 452-465, Springer-Verlag, 1995.
-
(1995)
Collusion-Secure Fingerprinting for Digital Data
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
9
-
-
84880293917
-
Risistance against differential power analysis for elliptic curve cryptosystems
-
Springer-Verlag
-
J. Coron,. Risistance against differential power analysis for elliptic curve cryptosystems., Proc. Of CHES. 99, LNCS 1717, Springer-Verlag, pp. 292-302, 1999.
-
(1999)
Proc. of CHES. 99, LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.1
-
10
-
-
0030645563
-
Computational private information retrieval
-
B. Chor and N. Gilboa, "Computational private information retrieval", Proc. Of 29th STOC, pp. 304-313, 1997.
-
(1997)
Proc. of 29Th STOC
, pp. 304-313
-
-
Chor, B.1
Gilboa, N.2
-
11
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevita, and M. Sudan, "Private information retrieval", Proc. of 36th FOCS, pp. 41-50, 1995.
-
(1995)
Proc. of 36Th FOCS
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevita, E.3
Sudan, M.4
-
12
-
-
84958757774
-
-
LNCS, Springer-Verlag
-
J. Coron, P. Kocher, and D. Naccache,. Statistics and secret leaksge., to appear in the Proceedings of Financial Cryptography 01, LNCS, Springer-Verlag.
-
Statistics and Secret Leaksge., to Appear in the Proceedings of Financial Cryptography 01
-
-
Coron, J.1
Kocher, P.2
Naccache, D.3
-
14
-
-
1642602228
-
Computationally Private Information Retrieval with Polylogrithmic Communication
-
Springer-Verlag
-
C. Cachin, S. Micali, and M. Stadler, "Computationally Private Information Retrieval with Polylogrithmic Communication", in Proceedings of Eurocrypt’99, LNCS, Springer-Verlag, pp. 402-414, 1999.
-
(1999)
Proceedings of Eurocrypt’99, LNCS
, pp. 402
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
15
-
-
0004166728
-
-
IBM Research Report, RC 20509, July 25
-
S. Craver, N. Memon, B. Yeo, M. Yeung, "Can invisible watermarks resolve rightful ownership", IBM Research Report, RC 20509, July 25, 1996.
-
(1996)
Can Invisible Watermarks Resolve Rightful Ownership
-
-
Craver, S.1
Memon, N.2
Yeo, B.3
Yeung, M.4
-
16
-
-
84957066742
-
-
Crypto’99, pp. 1-18, Springer-Verlag
-
J. Coron, D. Naccache and J. Stern, "On the security of RSA padding", Crypto’99, pp. 1-18, Springer-Verlag, 1999.
-
(1999)
On the Security of RSA Padding
-
-
Coron, J.1
Naccache, D.2
Stern, J.3
-
17
-
-
84969337808
-
-
http://www. tandem. com/brfs_wps/esscpttb/esscpttb.htm
-
-
-
-
18
-
-
84969363345
-
Cryptanalysis of TWOPRIMES
-
D. Coppersmith, D. Wagner, B. Schneier and J. Kelsey, "Cryptanalysis of TWOPRIMES", Proceedings of FSE’98, LNCS, Springer-Verlag, 1998.
-
(1998)
Proceedings of FSE’98, LNCS, Springer-Verlag
-
-
Coppersmith, D.1
Wagner, D.2
Schneier, B.3
Kelsey, J.4
-
21
-
-
84905823671
-
-
ACM Multimedia. 98, Bristol,UK
-
C. Griwodz, O. Merkel, J. Dittmann, R. Steinmetz,. Protecting VoD the Easier Way., ACM Multimedia. 98, pp. 21-28, Bristol, UK, 1998.
-
(1998)
Protecting Vod the Easier Way
, pp. 21-28
-
-
Griwodz, C.1
Merkel, O.2
Dittmann, J.3
Steinmetz, R.4
-
22
-
-
84949517809
-
Probing attacks on tamper-resisyant devices
-
Springer-Verlag
-
H. Handschun, P. Paillier, and J. Stern,. Probing attacks on tamper-resisyant devices., Proc. Of CHES. 99, LNCS 1717, Springer-Verlag, pp. 303-315, 1999.
-
(1999)
Proc. of CHES. 99, LNCS 1717
, pp. 303-315
-
-
Handschun, H.1
Paillier, P.2
Stern, J.3
-
24
-
-
84949230268
-
RSA-type signatures in the presence of transient faults
-
M. Darnell, editor, Springer-Verlag
-
M. Joye, J.-J. Quisquater, F. Bao, and R. H. Deng, "RSA-type signatures in the presence of transient faults", In M. Darnell, editor, Cryptography and Coding, Vol. 1355 of Lecture Notes in Computer Science, pp. 155-160, Springer-Verlag, 1997.
-
(1997)
Cryptography and Coding, Vol. 1355 of Lecture Notes in Computer Science
, pp. 155-160
-
-
Joye, M.1
Quisquater, J.-J.2
Bao, F.3
Deng, R.H.4
-
26
-
-
0001959541
-
Single-database computationally private information retrieval
-
E. Kushilevita and R. Ostrovsky, "Single-database computationally private information retrieval", Proc. Of 38th FOCS, 1997.
-
(1997)
Proc. of 38Th FOCS
-
-
Kushilevita, E.1
Ostrovsky, R.2
-
27
-
-
84969353777
-
-
P. Kocher, http://www. cryptography. com/resources/
-
-
-
Kocher, P.1
-
28
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Springer-Verlag
-
M. Matsui, "Linear cryptanalysis method for DES cipher", Proceedings of Eurocrypt’93, LNCS 765, Springer-Verlag, pp. 386-397, 1994.
-
(1994)
Proceedings of Eurocrypt’93, LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
29
-
-
84958809105
-
-
Video Dialtone Technology, McGraw-Hill
-
Video Dialtone Technology, McGraw-Hill, 1995.
-
(1995)
-
-
-
30
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
B. M. Macq and J-J Quisquater,. Cryptology for digital TV broadcasting., Proceedings of the IEEE, Vol. 83, No, 6, pp. 944-957, 1995.
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
Macq, B.M.1
Quisquater, J.-J.2
-
31
-
-
0029424437
-
Performance study of a selective Encryption scheme for security of networked, real-time video
-
T. Maples and G. Spanos, "Performance study of a selective Encryption scheme for security of networked, real-time video", Proc. of the 4th International Conference on Computer and Communications and Networks, Las Vegas, Nevada, Sept, 1995.
-
(1995)
Proc. of the 4Th International Conference on Computer and Communications and Networks, Las Vegas, Nevada, Sept
-
-
Maples, T.1
Spanos, G.2
-
32
-
-
0001412930
-
A new public-key cryptosystem as secure as factoring
-
LNCS, Springer-Verlag
-
T. Okamoto and S. Uchiyama, "A new public-key cryptosystem as secure as factoring", Proceedings of Eurocrypt. 98, LNCS, Springer-Verlag, 1998.
-
(1998)
Proceedings of Eurocrypt
, vol.98
-
-
Okamoto, T.1
Uchiyama, S.2
-
33
-
-
84947921515
-
-
Eurocrypt’96, LNCS 1070, Springer-Verlag
-
B. Pfitzmann and M. Shunter, "Asymmetric fingerprinting", Eurocrypt’96, LNCS 1070, pp. 84-95, Springer-Verlag, 1996.
-
(1996)
Asymmetric Fingerprinting
, pp. 84-95
-
-
Pfitzmann, B.1
Shunter, M.2
-
36
-
-
84958809108
-
-
Analysis and Design of Stream Ciphers, Springer-Verlag
-
R. A. Rueppel, Analysis and Design of Stream Ciphers, Springer-Verlag, 1986.
-
(1986)
-
-
Rueppel, R.A.1
-
37
-
-
0030419062
-
Methods for Encrypting and decrypting MPEG video data efficiently
-
Boston, MA, November
-
L. Tang, "Methods for Encrypting and decrypting MPEG video data efficiently", Proc. of the 4th ACM Multimedia Conference, Boston, MA, November, 1996.
-
(1996)
Proc. of the 4Th ACM Multimedia Conference
-
-
Tang, L.1
-
38
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener, "Cryptanalysis of short RSA secret exponents", IEEE Transactions on Information Theory, Vol. 36, No. 3, pp. 553-558, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.1
-
39
-
-
84958747882
-
Cryptoanalysis of the m-permutation protection schemes
-
H. Wu, F. Bao, D. Ye, R. Deng, "Cryptoanalysis of the m-permutation protection schemes", Proc. of ACISP2000, LNCS 1841, Springer-Verlag, pp. 97-111, 2000.
-
(2000)
Proc. of ACISP2000, LNCS 1841, Springer-Verlag
, pp. 97-111
-
-
Wu, H.1
Bao, F.2
Ye, D.3
Deng, R.4
-
40
-
-
0001320242
-
Embedding robust label into images for copyright protection
-
Austria, Aug. 21-25
-
J. Zhao and E. Koch, "Embedding robust label into images for copyright protection", Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Austria, Aug. 21-25, 1995.
-
(1995)
Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies
-
-
Zhao, J.1
Koch, E.2
|