Skip to search formSkip to main contentSkip to account menu

Eurocrypt

Known as: International Conference on the Theory and Applications of Cryptographic Techniques, Workshop on the Theory and Application of Cryptographic Techniques 
Eurocrypt (or EUROCRYPT) is a conference for cryptography research. The full name of the conference is now the Annual International Conference on the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Nowadays it is well known that randomness may fail due to bugs or deliberate randomness subversion. As a result, the security of… 
2016
2016
Access control plays an important role in many information systems. Embedding policy-based access control into modern encryption… 
2012
2012
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health… 
2009
2009
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes… 
2009
2009
Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among… 
Highly Cited
2007
Highly Cited
2007
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its… 
Highly Cited
2004
Highly Cited
2004
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a… 
Review
1993
Review
1993
In accordance with a ruling of the European Economic Community (EEC), as from 1995, television receivers manufactured in Europe… 
Highly Cited
1991
Highly Cited
1991
There are a number of techniques known for speeding up modular multiplication, which is the main arithmetic operation in RSA… 
1988
1988
The security of several signature schemes and cryptosystems, essentially proposed by Okamoto, is based on the difficulty of…