Skip to search formSkip to main contentSkip to account menu

International Cryptology Conference

Known as: CRYPTO, Crypto (conference) 
CRYPTO, the International Cryptology Conference, is one of the largest academic conferences in cryptography and cryptanalysis. It is organized by the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
in Vehicular ad hoc network has always been a major research area. Reducing cost of computation, effective consumption of limited… 
2009
2009
We presen t an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition… 
2008
2008
The aim of timestamping systems is to provide a proof-of-existence of a digital document at a given time. Such systems are… 
2008
2008
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot… 
2006
2006
Signatures and Lightweight Cryptography.- Probabilistic Multivariate Cryptography.- Short 2-Move Undeniable Signatures… 
2000
2000
XTR and NTRU.- The XTR Public Key System.- A Chosen-Ciphertext Attack against NTRU.- Privacy for Databases.- Privacy Preserving… 
1998
1998
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1.- A practical public key cryptosystem… 
1994
1994
Block Ciphers: Differential and Linear Cryptanalysis.- The First Experimental Cryptanalysis of the Data Encryption Standard… 
1991
1991
Cryptosystems.- Efficient Signature Schemes Based on Birational Permutations.- A new identification scheme based on syndrome…