Conferences in DBLP
Ueli M. Maurer Abstract Models of Computation in Cryptography. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:1-12 [Conf ] Neal Koblitz , Alfred Menezes Pairing-Based Cryptography at High Security Levels. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:13-36 [Conf ] Andrew Brown , Lorenz Minder , Amin Shokrollahi Improved Decoding of Interleaved AG Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:37-46 [Conf ] Woo Tae Kim , Se H. Kang , Eon Kyeong Joo Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:47-58 [Conf ] Hans Georg Schaathun , Gérard D. Cohen A Trellis-Based Bound on (2, 1)-Separating Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:59-67 [Conf ] Canhui Cai , Jing Chen Tessellation Based Multiple Description Coding. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:68-77 [Conf ] Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Exploiting Coding Theory for Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:78-95 [Conf ] C. Dods , Nigel P. Smart , Martijn Stam Hash Based Digital Signature Schemes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:96-115 [Conf ] John Malone-Lee A General Construction for Simultaneous Signing and Encrypting. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:116-135 [Conf ] Caroline Kudla , Kenneth G. Paterson Non-interactive Designated Verifier Proofs and Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:136-154 [Conf ] Chris J. Mitchell Partial Key Recovery Attacks on XCBC, TMAC and OMAC. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:155-167 [Conf ] Ueli M. Maurer , Johan Sjödin Domain Expansion of MACs: Alternative Uses of the FIL-MAC. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:168-185 [Conf ] An Braeken , Christopher Wolf , Bart Preneel Normality of Vectorial Functions. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:186-200 [Conf ] Changhoon Lee , Jongsung Kim , Jaechul Sung , Seokhie Hong , Sangjin Lee , Dukjae Moon Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:201-219 [Conf ] Alexander W. Dent , John Malone-Lee The Physically Observable Security of Signature Schemes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:220-232 [Conf ] Manuel Barbosa , Dan Page On the Automatic Construction of Indistinguishable Operations. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:233-247 [Conf ] Mustapha Hedabou Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:248-261 [Conf ] Jintai Ding , Jason E. Gower , Dieter Schmidt , Christopher Wolf , Zhijun Yin Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:262-277 [Conf ] Carlos Cid , Sean Murphy , Matthew J. B. Robshaw An Algebraic Framework for Cipher Embeddings. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:278-289 [Conf ] An Braeken , Bart Preneel Probabilistic Algebraic Attacks. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:290-303 [Conf ] Goce Jakimoski Unconditionally Secure Information Authentication in Presence of Erasures. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:304-321 [Conf ] Robert König , Ueli M. Maurer Generalized Strong Extractors and Deterministic Privacy Amplification. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:322-339 [Conf ] Germán Sáez On Threshold Self-healing Key Distribution Schemes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:340-354 [Conf ] Andrey Sidorenko , Berry Schoenmakers Concrete Security of the Blum-Blum-Shub Pseudorandom Generator. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:355-375 [Conf ] K. Bentahar The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:376-391 [Conf ] Steven D. Galbraith , James F. McKee Pairings on Elliptic Curves over Finite Commutative Rings. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:392-409 [Conf ] Martijn Stam A Key Encapsulation Mechanism for NTRU. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:410-427 [Conf ] Manuel Barbosa , P. Farshim Efficient Identity-Based Key Encapsulation to Multiple Parties. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:428-441 [Conf ] Liqun Chen , Zhaohui Cheng Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:442-459 [Conf ]