The SCEAS System
Navigation Menu

Conferences in DBLP

INDOCRYPT (indocrypt)
2001 (conf/indocrypt/2001)

  1. Anne Canteaut
    Cryptographic Functions and Design Criteria for Block Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:1-16 [Conf]
  2. Josep Domingo-Ferrer
    Mobile Agent Route Protection through Hash-Based Mechanisms. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:17-29 [Conf]
  3. Minoru Kuribayashi, Hatsukazu Tanaka
    A New Anonymous Fingerprinting Scheme with High Enciphering Rate. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:30-39 [Conf]
  4. Palash Sarkar, Paul J. Schellenberg
    A Parallel Algorithm for Extending Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:40-49 [Conf]
  5. Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah
    Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:50-61 [Conf]
  6. Kishan Chand Gupta, Subhamoy Maitra
    Multiples of Primitive Polynomials over GF(2). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:62-72 [Conf]
  7. Jaemoon Kim, Ikkwon Yie, Seung Ik Oh, Hyung-Don Kim, Jado Ryu
    Fast Generation of Cubic Irreducible Polynomials for XTR. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:73-78 [Conf]
  8. Josef Pieprzyk, Xian-Mo Zhang
    Cheating Prevention in Secret Sharing over GF(pt). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:79-90 [Conf]
  9. S. Ali Miri, V. Kumar Murty
    An Application of Sieve Methods to Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:91-98 [Conf]
  10. Harald Baier
    Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:99-107 [Conf]
  11. Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica
    A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:108-116 [Conf]
  12. Palash Sarkar, Douglas R. Stinson
    Frameproof and IPP Codes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:117-126 [Conf]
  13. Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing
    Linear Authentication Codes: Bounds and Constructions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:127-135 [Conf]
  14. Steve Kremer, Olivier Markowitch
    Selective Receipt in Certified E-mail. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:136-148 [Conf]
  15. Subhamoy Maitra, Dipti Prasad Mukherjee
    Spatial Domain Digital Watermarking with Buyer Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:149-161 [Conf]
  16. Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma
    Efficient Public Auction with One-Time Registration and Public Verifiability. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:162-174 [Conf]
  17. Kapali Viswanathan, Colin Boyd, Ed Dawson
    An Analysis of Integrity Services in Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:175-187 [Conf]
  18. S. S. Bedi, N. Rajesh Pillai
    Cryptanalysis of the Nonlinear FeedForward Generator. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:188-194 [Conf]
  19. Markus Maurer, Alfred Menezes, Edlyn Teske
    Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:195-213 [Conf]
  20. Amr M. Youssef, Guang Gong
    Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:214-222 [Conf]
  21. Yi Mu, Vijay Varadharajan
    Robust and Secure Broadcasting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:223-231 [Conf]
  22. K. Srinathan, C. Pandu Rangan, V. Kamakoti
    Toward Optimal Player Weights in Secure Distributed Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:232-241 [Conf]
  23. Subhamoy Maitra
    Autocorrelation Properties of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:242-253 [Conf]
  24. Maria Fedorova, Yuriy Tarannikov
    On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:254-266 [Conf]
  25. D. Ramesh
    A Twin Algorithm for Efficient Generation of Digital Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:267-274 [Conf]
  26. Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
    Efficient "on the Fly" Signature Schemes Based on Integer Factoring. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:275-286 [Conf]
  27. Alexander Kholosha
    Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:287-296 [Conf]
  28. Sandeepan Chowdhury, Subhamoy Maitra
    Efficient Software Implementation of Linear Feedback Shift Registers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:297-307 [Conf]
  29. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim
    Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:308-315 [Conf]
  30. Shujun Li, Xuanqin Mou, Cai Yuanlong
    Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:316-329 [Conf]
  31. Gideon Samid
    Re-dividing Complexity between Algorithms and Keys. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:330-338 [Conf]
  32. Eike Kiltz
    A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:339-350 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002