Conferences in DBLP
Praveen Gauravaram , William Millan Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE). [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:1-13 [Conf ] Kevin Chen , William Millan , Leonie Ruth Simpson Perspectives on Word Based Stream Ciphers. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:14-27 [Conf ] Praveen Gauravaram , William Millan , Lauren May CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:28-39 [Conf ] Lan Nguyen , Reihaneh Safavi-Naini An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:40-56 [Conf ] Kun Peng , Riza Aditya , Colin Boyd , Ed Dawson , Byoungcheon Lee A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:57-71 [Conf ] Hossein Ghodosi , Josef Pieprzyk A Modification to the 'Authentication of Concast Communication'. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:72-77 [Conf ] Christopher Wolf Efficient Public Key Generation for HFE and Variations. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:78-93 [Conf ] Jaimee Brown , Ed Dawson , Juan Manuel González Nieto Implementation of the GBD Cryptosystem. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:94-109 [Conf ] Matthew Henricksen , Ming Yao , Ernest Foo An Implementation of the Yao Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:110-124 [Conf ] Chris Wullems , Harikrishna Vasanta , Mark Looi , Andrew Clark A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:125-139 [Conf ] Mike Bond , Jolyon Clulow Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:140-151 [Conf ] Yousef Bani Hammad , Gary Carter , Ed Dawson , Yvonne Hitchcock Improvements to the RAK Factoring Algorithm. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:152-0 [Conf ]