Skip to search formSkip to main contentSkip to account menu

Eurocrypt

Known as: International Conference on the Theory and Applications of Cryptographic Techniques, Workshop on the Theory and Application of Cryptographic Techniques 
Eurocrypt (or EUROCRYPT) is a conference for cryptography research. The full name of the conference is now the Annual International Conference on the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Nowadays it is well known that randomness may fail due to bugs or deliberate randomness subversion. As a result, the security of… 
2016
2016
Access control plays an important role in many information systems. Embedding policy-based access control into modern encryption… 
2013
2013
Resettable hardware tokens, usually in the form of smart cards, are used for a variety of security-critical tasks in open… 
2013
2013
According to the relation of an attribute set and its subset, the author presents a hierarchical attribute-based encryption… 
2012
2012
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health… 
2009
2009
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes… 
2009
2009
Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among… 
Highly Cited
2004
Highly Cited
2004
The trusted computing group (TCG) specified two protocols that allow a trusted hardware device to remotely convince a… 
Review
1993
Review
1993
In accordance with a ruling of the European Economic Community (EEC), as from 1995, television receivers manufactured in Europe… 
1988
1988
The security of several signature schemes and cryptosystems, essentially proposed by Okamoto, is based on the difficulty of…