Conferences in DBLP
James L. Massey Whither Cryptography? [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:1- [Conf ] Simon Fischer 0002 , Willi Meier , Côme Berbain , Jean-François Biasse , Matthew J. B. Robshaw Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:2-16 [Conf ] Jiqiang Lu , Jongsung Kim , Nathan Keller , Orr Dunkelman Differential and Rectangle Attacks on Reduced-Round SHACAL-1. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:17-31 [Conf ] Kenneth Koon-Ho Wong , Bernard D. Colbert , Lynn Margaret Batten , Sultan Al-Hinai Algebraic Attacks on Clock-Controlled Cascade Ciphers. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:32-47 [Conf ] Marc P. C. Fossorier , Miodrag J. Mihaljevic , Hideki Imai , Yang Cui , Kanta Matsuura An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:48-62 [Conf ] Florian Mendel , Bart Preneel , Vincent Rijmen , Hirotaka Yoshida , Dai Watanabe Update on Tiger. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:63-79 [Conf ] Donghoon Chang , Kishan Chand Gupta , Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:80-94 [Conf ] Markku-Juhani Olavi Saarinen Security of VSH in the Real World. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:95-103 [Conf ] Raphael C.-W. Phan , Bok-Min Goi Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:104-117 [Conf ] Weijia Wang , Lei Hu Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:118-132 [Conf ] Alfred Menezes , Berkant Ustaoglu On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:133-147 [Conf ] Neal Koblitz , Alfred Menezes Another Look at "Provable Security". II. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:148-175 [Conf ] Jaimee Brown , Juan Manuel González Nieto , Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:176-190 [Conf ] Isamu Teranishi , Takuro Oyama , Wakaha Ogata General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:191-205 [Conf ] Ian F. Blake , Aldar C.-F. Chan Conditionally Verifiable Signature. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:206-220 [Conf ] Arpita Patra , Ashish Choudhary , K. Srinathan , C. Pandu Rangan Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:221-235 [Conf ] Frédéric Didier Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:236-250 [Conf ] Valery Pryamikov Enciphering with Arbitrary Small Finite Domains. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:251-265 [Conf ] Selçuk Kavut , Subhamoy Maitra , Sumanta Sarkar , Melek D. Yücel Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:266-279 [Conf ] Peng Wang , Dengguo Feng , Wenling Wu Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:280-286 [Conf ] Debrup Chakraborty , Palash Sarkar HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:287-302 [Conf ] Ryo Nojima , Kazukuni Kobara , Hideki Imai Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:303-316 [Conf ] Mridul Nandi A Simple and Unified Method of Proving Indistinguishability. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:317-334 [Conf ] Christophe Doche , Laurent Imbert Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:335-348 [Conf ] Johannes Buchmann , Luis Carlos Coronado García , Erik Dahmen , Martin Döring , Elena Klintsevich CMSS - An Improved Merkle Signature Scheme. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:349-363 [Conf ] Man Ho Au , Joseph K. Liu , Willy Susilo , Tsz Hon Yuen Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:364-378 [Conf ] Manuel Barbosa , P. Farshim Secure Cryptographic Workflow in the Standard Model. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:379-393 [Conf ] Sanjit Chatterjee , Palash Sarkar Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:394-408 [Conf ] Jian Weng , Shengli Liu , Kefei Chen , Changshe Ma Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:409-423 [Conf ] Matthew Darnall , Doug Kuhlman AES Software Implementations on ARM7TDMI. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:424-435 [Conf ] Antoine Joux , Pascal Delaunay Galois LFSR, Embedded Devices and Side Channel Weaknesses. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:436-451 [Conf ]