Conferences in DBLP
V. Kumar Murty Abelian Varieties and Cryptography. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:1-12 [Conf ] Harald Niederreiter , Li-Ping Wang Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:13-22 [Conf ] Jin Hong Period of Streamcipher Edon80 . [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:23-34 [Conf ] An Braeken , Bart Preneel On the Algebraic Immunity of Symmetric Boolean Functions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:35-48 [Conf ] Claude Carlet On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:49-62 [Conf ] Deukjo Hong , Jaechul Sung , Seokhie Hong , Sangjin Lee How to Construct Universal One-Way Hash Functions of Order r . [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:63-76 [Conf ] Mridul Nandi Towards Optimal Double-Length Hash Functions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:77-89 [Conf ] Souradyuti Paul , Bart Preneel Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:90-103 [Conf ] Frederik Armknecht , Matthias Krause , Dirk Stegemann Design Principles for Combiners with Memory. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:104-117 [Conf ] Domingo Gómez , Jaime Gutierrez , Álvar Ibeas Cryptanalysis of the Quadratic Generator. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:118-129 [Conf ] Håkan Englund , Alexander Maximov Attack the Dragon. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:130-142 [Conf ] Thierry P. Berger , Marine Minier Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:143-154 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:155-168 [Conf ] Jin Hong , Woo-Hwan Kim TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:169-182 [Conf ] Gildas Avoine , Pascal Junod , Philippe Oechslin Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:183-196 [Conf ] Tanmoy Kanti Das , Jianying Zhou Cryptanalysis of Barni et al. Watermarking Scheme. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:197-208 [Conf ] Heiko Stamer Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:209-220 [Conf ] Sarang Aravamuthan , Sachin Lodha An Optimal Subset Cover for Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:221-231 [Conf ] Michael Coglianese , Bok-Min Goi MaTRU: A New NTRU-Based Cryptosystem. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:232-243 [Conf ] Duong Viet , Akihiro Yamamura , Hidema Tanaka Anonymous Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:244-257 [Conf ] Michael Scott Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:258-269 [Conf ] Mototsugu Nishioka Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:270-282 [Conf ] Fabien Laguillaumie , Damien Vergnaud Short Undeniable Signatures Without Random Oracles: The Missing Link. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:283-296 [Conf ] Hong Wang , Yuqing Zhang , Dengguo Feng Short Threshold Signature Schemes Without Random Oracles. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:297-310 [Conf ] Jose Antonio Onieva , Jianying Zhou , Javier Lopez Attacking an Asynchronous Multi-party Contract Signing Protocol. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:311-321 [Conf ] Jens-Matthias Bohli , Jörn Müller-Quade , Stefan Röhrich Fairness and Correctness in Case of a Premature Abort. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:322-331 [Conf ] Man Ho Au , Sherman S. M. Chow , Willy Susilo Short E-Cash. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:332-346 [Conf ] Mårten Trolin A Universally Composable Scheme for Electronic Cash. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:347-360 [Conf ] Akhilesh Tyagi Energy-Privacy Trade-Offs in VLSI Computations. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:361-374 [Conf ] Chang Han Kim , Yongtae Kim , Nam Su Chang , IlWhan Park Modified Serial Multipliers for Type-IV Gaussian Normal Bases. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:375-388 [Conf ] Christophe Nègre Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:389-402 [Conf ] Tanja Lange , Pradeep Kumar Mishra SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:403-416 [Conf ]