Conferences in DBLP
Anne Canteaut Cryptographic Functions and Design Criteria for Block Ciphers. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:1-16 [Conf ] Josep Domingo-Ferrer Mobile Agent Route Protection through Hash-Based Mechanisms. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:17-29 [Conf ] Minoru Kuribayashi , Hatsukazu Tanaka A New Anonymous Fingerprinting Scheme with High Enciphering Rate. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:30-39 [Conf ] Palash Sarkar , Paul J. Schellenberg A Parallel Algorithm for Extending Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:40-49 [Conf ] Bok-Min Goi , M. U. Siddiqi , Hean-Teik Chuah Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:50-61 [Conf ] Kishan Chand Gupta , Subhamoy Maitra Multiples of Primitive Polynomials over GF(2). [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:62-72 [Conf ] Jaemoon Kim , Ikkwon Yie , Seung Ik Oh , Hyung-Don Kim , Jado Ryu Fast Generation of Cubic Irreducible Polynomials for XTR. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:73-78 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Cheating Prevention in Secret Sharing over GF(pt ). [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:79-90 [Conf ] S. Ali Miri , V. Kumar Murty An Application of Sieve Methods to Elliptic Curves. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:91-98 [Conf ] Harald Baier Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:99-107 [Conf ] Mathieu Ciet , Jean-Jacques Quisquater , Francesco Sica A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:108-116 [Conf ] Palash Sarkar , Douglas R. Stinson Frameproof and IPP Codes. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:117-126 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang , Chaoping Xing Linear Authentication Codes: Bounds and Constructions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:127-135 [Conf ] Steve Kremer , Olivier Markowitch Selective Receipt in Certified E-mail. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:136-148 [Conf ] Subhamoy Maitra , Dipti Prasad Mukherjee Spatial Domain Digital Watermarking with Buyer Authentication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:149-161 [Conf ] Byoungcheon Lee , Kwangjo Kim , Joongsoo Ma Efficient Public Auction with One-Time Registration and Public Verifiability. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:162-174 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson An Analysis of Integrity Services in Protocols. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:175-187 [Conf ] S. S. Bedi , N. Rajesh Pillai Cryptanalysis of the Nonlinear FeedForward Generator. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:188-194 [Conf ] Markus Maurer , Alfred Menezes , Edlyn Teske Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:195-213 [Conf ] Amr M. Youssef , Guang Gong Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:214-222 [Conf ] Yi Mu , Vijay Varadharajan Robust and Secure Broadcasting. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:223-231 [Conf ] K. Srinathan , C. Pandu Rangan , V. Kamakoti Toward Optimal Player Weights in Secure Distributed Protocols. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:232-241 [Conf ] Subhamoy Maitra Autocorrelation Properties of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:242-253 [Conf ] Maria Fedorova , Yuriy Tarannikov On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:254-266 [Conf ] D. Ramesh A Twin Algorithm for Efficient Generation of Digital Signatures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:267-274 [Conf ] Takeshi Okamoto , Mitsuru Tada , Atsuko Miyaji Efficient "on the Fly" Signature Schemes Based on Integer Factoring. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:275-286 [Conf ] Alexander Kholosha Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:287-296 [Conf ] Sandeepan Chowdhury , Subhamoy Maitra Efficient Software Implementation of Linear Feedback Shift Registers. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:297-307 [Conf ] Seongan Lim , Seungjoo Kim , Ikkwon Yie , Jaemoon Kim Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:308-315 [Conf ] Shujun Li , Xuanqin Mou , Cai Yuanlong Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:316-329 [Conf ] Gideon Samid Re-dividing Complexity between Algorithms and Keys. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:330-338 [Conf ] Eike Kiltz A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:339-350 [Conf ]