The SCEAS System
Navigation Menu

Conferences in DBLP

IMA Conference on Cryptography and Coding (ima)
2005 (conf/ima/2005)

  1. Ueli M. Maurer
    Abstract Models of Computation in Cryptography. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:1-12 [Conf]
  2. Neal Koblitz, Alfred Menezes
    Pairing-Based Cryptography at High Security Levels. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:13-36 [Conf]
  3. Andrew Brown, Lorenz Minder, Amin Shokrollahi
    Improved Decoding of Interleaved AG Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:37-46 [Conf]
  4. Woo Tae Kim, Se H. Kang, Eon Kyeong Joo
    Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:47-58 [Conf]
  5. Hans Georg Schaathun, Gérard D. Cohen
    A Trellis-Based Bound on (2, 1)-Separating Codes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:59-67 [Conf]
  6. Canhui Cai, Jing Chen
    Tessellation Based Multiple Description Coding. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:68-77 [Conf]
  7. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Exploiting Coding Theory for Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:78-95 [Conf]
  8. C. Dods, Nigel P. Smart, Martijn Stam
    Hash Based Digital Signature Schemes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:96-115 [Conf]
  9. John Malone-Lee
    A General Construction for Simultaneous Signing and Encrypting. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:116-135 [Conf]
  10. Caroline Kudla, Kenneth G. Paterson
    Non-interactive Designated Verifier Proofs and Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:136-154 [Conf]
  11. Chris J. Mitchell
    Partial Key Recovery Attacks on XCBC, TMAC and OMAC. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:155-167 [Conf]
  12. Ueli M. Maurer, Johan Sjödin
    Domain Expansion of MACs: Alternative Uses of the FIL-MAC. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:168-185 [Conf]
  13. An Braeken, Christopher Wolf, Bart Preneel
    Normality of Vectorial Functions. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:186-200 [Conf]
  14. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon
    Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:201-219 [Conf]
  15. Alexander W. Dent, John Malone-Lee
    The Physically Observable Security of Signature Schemes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:220-232 [Conf]
  16. Manuel Barbosa, Dan Page
    On the Automatic Construction of Indistinguishable Operations. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:233-247 [Conf]
  17. Mustapha Hedabou
    Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:248-261 [Conf]
  18. Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin
    Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:262-277 [Conf]
  19. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
    An Algebraic Framework for Cipher Embeddings. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:278-289 [Conf]
  20. An Braeken, Bart Preneel
    Probabilistic Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:290-303 [Conf]
  21. Goce Jakimoski
    Unconditionally Secure Information Authentication in Presence of Erasures. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:304-321 [Conf]
  22. Robert König, Ueli M. Maurer
    Generalized Strong Extractors and Deterministic Privacy Amplification. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:322-339 [Conf]
  23. Germán Sáez
    On Threshold Self-healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:340-354 [Conf]
  24. Andrey Sidorenko, Berry Schoenmakers
    Concrete Security of the Blum-Blum-Shub Pseudorandom Generator. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:355-375 [Conf]
  25. K. Bentahar
    The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:376-391 [Conf]
  26. Steven D. Galbraith, James F. McKee
    Pairings on Elliptic Curves over Finite Commutative Rings. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:392-409 [Conf]
  27. Martijn Stam
    A Key Encapsulation Mechanism for NTRU. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:410-427 [Conf]
  28. Manuel Barbosa, P. Farshim
    Efficient Identity-Based Key Encapsulation to Multiple Parties. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:428-441 [Conf]
  29. Liqun Chen, Zhaohui Cheng
    Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:442-459 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002