The SCEAS System
Navigation Menu

Conferences in DBLP

INDOCRYPT (indocrypt)
2000 (conf/indocrypt/2000)

  1. Dingyi Pei, Wenliang Qin
    The Correlation of a Boolean Function with Its Variables. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:1-8 [Conf]
  2. Jambunathan K
    On Choice of Connection-Polynominals for LFSR-Based Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:9-18 [Conf]
  3. Yuriy Tarannikov
    On Resilient Boolean Functions with Maximal Possible Nonlinearity. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:19-30 [Conf]
  4. Eric Filiol
    Decimation Attack of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:31-42 [Conf]
  5. Eli Biham, Orr Dunkelman
    Cryptanalysis of the A5/1 GSM Stream Cipher. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:43-51 [Conf]
  6. Ali Aydin Selçuk
    On Bias Estimation in Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:52-66 [Conf]
  7. John O. Pliam
    On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:67-79 [Conf]
  8. Eli Biham, Vladimir Furman
    Improved Impossible Differentials on Twofish. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:80-92 [Conf]
  9. R. Sai Anand, C. E. Veni Madhavan
    An Online, Transferable E-Cash Payment System. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:93-103 [Conf]
  10. Ik Rae Jeong, Dong Hoon Lee
    Anonymity Control in Multi-bank E-Cash System. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:104-116 [Conf]
  11. K. Srinathan, C. Pandu Rangan
    Efficient Asynchronous Secure Multiparty Distributed Computation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:117-129 [Conf]
  12. K. Srinathan, C. Pandu Rangan
    Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:130-142 [Conf]
  13. Jaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry
    Codes Identifying Bad Signature in Batches. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:143-154 [Conf]
  14. Yi Mu, Vijay Varadharajan
    Distributed Signcryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:155-164 [Conf]
  15. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:165-177 [Conf]
  16. Katsuyuki Okeya, Kouichi Sakurai
    Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:178-190 [Conf]
  17. Johannes Buchmann, Harald Baier
    Efficient Construction of Cryptographically Strong Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:191-202 [Conf]
  18. Julio López, Ricardo Dahab
    High-Speed Software Multiplication in F2m. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:203-212 [Conf]
  19. Arash Reyhani-Masoleh, M. Anwarul Hasan
    On Efficient Normal Basis Multiplication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:213-224 [Conf]
  20. Sanjeev Kumar Mishra, Palash Sarkar
    Symmetrically Private Information Retrieval. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:225-236 [Conf]
  21. Boyeon Song, Kwangjo Kim
    Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:237-249 [Conf]
  22. Reihaneh Safavi-Naini, Yejing Wang
    Anonymous Traceability Schemes with Unconditional Security. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:250-261 [Conf]
  23. Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee
    New Block Cipher DONUT Using Pairwise Perfect Decorrelation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:262-270 [Conf]
  24. Dan Boneh, Nagendra Modadugu, Michael Kim
    Generating RSA Keys on a Handheld Using an Untrusted Server. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:271-282 [Conf]
  25. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee
    A Generalized Takagi-Cryptosystem with a modulus of the form prqs. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:283-294 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002