5. ACNS 2007:
Zhuhai,
China
Jonathan Katz, Moti Yung (Eds.):
Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings.
Lecture Notes in Computer Science 4521 Springer 2007, ISBN 978-3-540-72737-8 BibTeX
Signature Schemes I
Computer and Network Security
Cryptanalysis
- Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner:
Cryptanalysis of the TRMC-4 Public Key Cryptosystem.
104-115
Electronic Edition (link) BibTeX
- Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen:
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
116-128
Electronic Edition (link) BibTeX
- Bahador Bakhshi, Babak Sadeghiyan:
A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA.
129-140
Electronic Edition (link) BibTeX
- Stefan Tillich, Christoph Herbst, Stefan Mangard:
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis.
141-157
Electronic Edition (link) BibTeX
Group-Oriented Security
Cryptographic Protocols
Anonymous Authentication
Identity-Based Cryptography
Security in Wireless,
Ad-Hoc,
and Peer-to-Peer Networks
Efficient Implementation
Signature Schemes II
Copyright © Sat May 16 22:56:05 2009
by Michael Ley (ley@uni-trier.de)