The SCEAS System
Navigation Menu

Conferences in DBLP

INDOCRYPT (indocrypt)
2003 (conf/indocrypt/2003)

  1. Harald Niederreiter
    Linear Complexity and Related Complexity Measures for Sequences. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:1-17 [Conf]
  2. Xiang Li, Jennifer Seberry
    Forensic Computing. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:18-35 [Conf]
  3. Palash Sarkar
    Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:36-51 [Conf]
  4. Souradyuti Paul, Bart Preneel
    Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:52-67 [Conf]
  5. Hamdi Murat Yildirim
    Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:68-81 [Conf]
  6. Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee
    Impossible Differential Cryptanalysis for Block Cipher Structures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:82-96 [Conf]
  7. Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee
    Impossible Differential Attack on 30-Round SHACAL-2. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:97-106 [Conf]
  8. Kishan Chand Gupta, Palash Sarkar
    Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:107-120 [Conf]
  9. Selçuk Kavut, Melek D. Yücel
    Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:121-134 [Conf]
  10. Ventzislav Nikov, Svetla Nikova, Bart Preneel
    On Multiplicative Linear Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:135-147 [Conf]
  11. Avishek Adhikari, Somnath Sikdar
    A New (2, n)-Visual Threshold Scheme for Color Images. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:148-161 [Conf]
  12. V. Vinod, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim
    On the Power of Computational Secret Sharing. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:162-176 [Conf]
  13. Yi Mu, Willy Susilo, Yan-Xia Lin
    Identity-Based Broadcasting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:177-190 [Conf]
  14. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
    Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:191-204 [Conf]
  15. Rana Barua, Ratna Dutta, Palash Sarkar
    Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:205-217 [Conf]
  16. P. J. Abisha, D. G. Thomas, K. G. Subramanian
    Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:218-227 [Conf]
  17. Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim
    Prime Numbers of Diffie-Hellman Groups for IKE-MODP. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:228-234 [Conf]
  18. Françoise Levy-dit-Vehel, Ludovic Perret
    Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:235-251 [Conf]
  19. Guilin Wang
    Security Analysis of Several Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:252-265 [Conf]
  20. Javier Herranz, Germán Sáez
    Forking Lemmas for Ring Signature Schemes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:266-279 [Conf]
  21. Jordi Castellà-Roca, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell
    Practical Mental Poker Without a TTP Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:280-294 [Conf]
  22. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
    Lightweight Mobile Credit-Card Payment Protocol. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:295-308 [Conf]
  23. Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis
    On the Construction of Prime Order Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:309-322 [Conf]
  24. Farzali A. Izadi, V. Kumar Murty
    Counting Points on an Abelian Variety over a Finite Field. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:323-333 [Conf]
  25. Katsuyuki Okeya, Dong-Guk Han
    Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:334-348 [Conf]
  26. Guido Bertoni, Jorge Guajardo, Gerardo Orlando
    Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:349-362 [Conf]
  27. Tanmoy Kanti Das
    Cryptanalysis of Block Based Spatial Domain Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:363-374 [Conf]
  28. Duncan S. Wong, Agnes Hui Chan, Feng Zhu
    More Efficient Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:375-387 [Conf]
  29. Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague
    A Password-Based Authenticator: Security Proof and Applications. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:388-401 [Conf]
  30. Tetsu Iwata, Kaoru Kurosawa
    Stronger Security Bounds for OMAC, TMAC, and XCBC. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:402-415 [Conf]
  31. Marc Fischlin
    Progressive Verification: The Case of Message Authentication: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:416-429 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002