Conferences in DBLP
Dingyi Pei , Wenliang Qin The Correlation of a Boolean Function with Its Variables. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:1-8 [Conf ] Jambunathan K On Choice of Connection-Polynominals for LFSR-Based Stream Ciphers. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:9-18 [Conf ] Yuriy Tarannikov On Resilient Boolean Functions with Maximal Possible Nonlinearity. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:19-30 [Conf ] Eric Filiol Decimation Attack of Stream Ciphers. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:31-42 [Conf ] Eli Biham , Orr Dunkelman Cryptanalysis of the A5/1 GSM Stream Cipher. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:43-51 [Conf ] Ali Aydin Selçuk On Bias Estimation in Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:52-66 [Conf ] John O. Pliam On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:67-79 [Conf ] Eli Biham , Vladimir Furman Improved Impossible Differentials on Twofish. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:80-92 [Conf ] R. Sai Anand , C. E. Veni Madhavan An Online, Transferable E-Cash Payment System. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:93-103 [Conf ] Ik Rae Jeong , Dong Hoon Lee Anonymity Control in Multi-bank E-Cash System. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:104-116 [Conf ] K. Srinathan , C. Pandu Rangan Efficient Asynchronous Secure Multiparty Distributed Computation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:117-129 [Conf ] K. Srinathan , C. Pandu Rangan Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:130-142 [Conf ] Jaroslaw Pastuszak , Josef Pieprzyk , Jennifer Seberry Codes Identifying Bad Signature in Batches. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:143-154 [Conf ] Yi Mu , Vijay Varadharajan Distributed Signcryption. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:155-164 [Conf ] Reihaneh Safavi-Naini , Willy Susilo , Huaxiong Wang Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:165-177 [Conf ] Katsuyuki Okeya , Kouichi Sakurai Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:178-190 [Conf ] Johannes Buchmann , Harald Baier Efficient Construction of Cryptographically Strong Elliptic Curves. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:191-202 [Conf ] Julio López , Ricardo Dahab High-Speed Software Multiplication in F2m . [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:203-212 [Conf ] Arash Reyhani-Masoleh , M. Anwarul Hasan On Efficient Normal Basis Multiplication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:213-224 [Conf ] Sanjeev Kumar Mishra , Palash Sarkar Symmetrically Private Information Retrieval. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:225-236 [Conf ] Boyeon Song , Kwangjo Kim Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:237-249 [Conf ] Reihaneh Safavi-Naini , Yejing Wang Anonymous Traceability Schemes with Unconditional Security. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:250-261 [Conf ] Dong Hyeon Cheon , Sangjin Lee , Jong In Lim , Sung Jae Lee New Block Cipher DONUT Using Pairwise Perfect Decorrelation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:262-270 [Conf ] Dan Boneh , Nagendra Modadugu , Michael Kim Generating RSA Keys on a Handheld Using an Untrusted Server. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:271-282 [Conf ] Seongan Lim , Seungjoo Kim , Ikkwon Yie , Hongsub Lee A Generalized Takagi-Cryptosystem with a modulus of the form pr qs . [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:283-294 [Conf ]