The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptographic Algorithms and their Uses (cau)
2004 (conf/cau/2004)

  1. Praveen Gauravaram, William Millan
    Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:1-13 [Conf]
  2. Kevin Chen, William Millan, Leonie Ruth Simpson
    Perspectives on Word Based Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:14-27 [Conf]
  3. Praveen Gauravaram, William Millan, Lauren May
    CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:28-39 [Conf]
  4. Lan Nguyen, Reihaneh Safavi-Naini
    An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:40-56 [Conf]
  5. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
    A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:57-71 [Conf]
  6. Hossein Ghodosi, Josef Pieprzyk
    A Modification to the 'Authentication of Concast Communication'. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:72-77 [Conf]
  7. Christopher Wolf
    Efficient Public Key Generation for HFE and Variations. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:78-93 [Conf]
  8. Jaimee Brown, Ed Dawson, Juan Manuel González Nieto
    Implementation of the GBD Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:94-109 [Conf]
  9. Matthew Henricksen, Ming Yao, Ernest Foo
    An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:110-124 [Conf]
  10. Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew Clark
    A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:125-139 [Conf]
  11. Mike Bond, Jolyon Clulow
    Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:140-151 [Conf]
  12. Yousef Bani Hammad, Gary Carter, Ed Dawson, Yvonne Hitchcock
    Improvements to the RAK Factoring Algorithm. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:152-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002