The SCEAS System
Navigation Menu

Conferences in DBLP

INDOCRYPT (indocrypt)
2005 (conf/indocrypt/2005)

  1. V. Kumar Murty
    Abelian Varieties and Cryptography. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:1-12 [Conf]
  2. Harald Niederreiter, Li-Ping Wang
    Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:13-22 [Conf]
  3. Jin Hong
    Period of Streamcipher Edon80. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:23-34 [Conf]
  4. An Braeken, Bart Preneel
    On the Algebraic Immunity of Symmetric Boolean Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:35-48 [Conf]
  5. Claude Carlet
    On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:49-62 [Conf]
  6. Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
    How to Construct Universal One-Way Hash Functions of Order r. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:63-76 [Conf]
  7. Mridul Nandi
    Towards Optimal Double-Length Hash Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:77-89 [Conf]
  8. Souradyuti Paul, Bart Preneel
    Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:90-103 [Conf]
  9. Frederik Armknecht, Matthias Krause, Dirk Stegemann
    Design Principles for Combiners with Memory. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:104-117 [Conf]
  10. Domingo Gómez, Jaime Gutierrez, Álvar Ibeas
    Cryptanalysis of the Quadratic Generator. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:118-129 [Conf]
  11. Håkan Englund, Alexander Maximov
    Attack the Dragon. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:130-142 [Conf]
  12. Thierry P. Berger, Marine Minier
    Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:143-154 [Conf]
  13. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:155-168 [Conf]
  14. Jin Hong, Woo-Hwan Kim
    TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:169-182 [Conf]
  15. Gildas Avoine, Pascal Junod, Philippe Oechslin
    Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:183-196 [Conf]
  16. Tanmoy Kanti Das, Jianying Zhou
    Cryptanalysis of Barni et al. Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:197-208 [Conf]
  17. Heiko Stamer
    Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:209-220 [Conf]
  18. Sarang Aravamuthan, Sachin Lodha
    An Optimal Subset Cover for Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:221-231 [Conf]
  19. Michael Coglianese, Bok-Min Goi
    MaTRU: A New NTRU-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:232-243 [Conf]
  20. Duong Viet, Akihiro Yamamura, Hidema Tanaka
    Anonymous Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:244-257 [Conf]
  21. Michael Scott
    Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:258-269 [Conf]
  22. Mototsugu Nishioka
    Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:270-282 [Conf]
  23. Fabien Laguillaumie, Damien Vergnaud
    Short Undeniable Signatures Without Random Oracles: The Missing Link. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:283-296 [Conf]
  24. Hong Wang, Yuqing Zhang, Dengguo Feng
    Short Threshold Signature Schemes Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:297-310 [Conf]
  25. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Attacking an Asynchronous Multi-party Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:311-321 [Conf]
  26. Jens-Matthias Bohli, Jörn Müller-Quade, Stefan Röhrich
    Fairness and Correctness in Case of a Premature Abort. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:322-331 [Conf]
  27. Man Ho Au, Sherman S. M. Chow, Willy Susilo
    Short E-Cash. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:332-346 [Conf]
  28. Mårten Trolin
    A Universally Composable Scheme for Electronic Cash. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:347-360 [Conf]
  29. Akhilesh Tyagi
    Energy-Privacy Trade-Offs in VLSI Computations. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:361-374 [Conf]
  30. Chang Han Kim, Yongtae Kim, Nam Su Chang, IlWhan Park
    Modified Serial Multipliers for Type-IV Gaussian Normal Bases. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:375-388 [Conf]
  31. Christophe Nègre
    Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:389-402 [Conf]
  32. Tanja Lange, Pradeep Kumar Mishra
    SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:403-416 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002