The SCEAS System
Navigation Menu

Conferences in DBLP

INDOCRYPT (indocrypt)
2006 (conf/indocrypt/2006)

  1. James L. Massey
    Whither Cryptography? [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:1- [Conf]
  2. Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw
    Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:2-16 [Conf]
  3. Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
    Differential and Rectangle Attacks on Reduced-Round SHACAL-1. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:17-31 [Conf]
  4. Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai
    Algebraic Attacks on Clock-Controlled Cascade Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:32-47 [Conf]
  5. Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
    An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:48-62 [Conf]
  6. Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe
    Update on Tiger. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:63-79 [Conf]
  7. Donghoon Chang, Kishan Chand Gupta, Mridul Nandi
    RC4-Hash: A New Hash Function Based on RC4. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:80-94 [Conf]
  8. Markku-Juhani Olavi Saarinen
    Security of VSH in the Real World. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:95-103 [Conf]
  9. Raphael C.-W. Phan, Bok-Min Goi
    Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:104-117 [Conf]
  10. Weijia Wang, Lei Hu
    Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:118-132 [Conf]
  11. Alfred Menezes, Berkant Ustaoglu
    On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:133-147 [Conf]
  12. Neal Koblitz, Alfred Menezes
    Another Look at "Provable Security". II. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:148-175 [Conf]
  13. Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
    Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:176-190 [Conf]
  14. Isamu Teranishi, Takuro Oyama, Wakaha Ogata
    General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:191-205 [Conf]
  15. Ian F. Blake, Aldar C.-F. Chan
    Conditionally Verifiable Signature. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:206-220 [Conf]
  16. Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan
    Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:221-235 [Conf]
  17. Frédéric Didier
    Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:236-250 [Conf]
  18. Valery Pryamikov
    Enciphering with Arbitrary Small Finite Domains. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:251-265 [Conf]
  19. Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel
    Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:266-279 [Conf]
  20. Peng Wang, Dengguo Feng, Wenling Wu
    Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:280-286 [Conf]
  21. Debrup Chakraborty, Palash Sarkar
    HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:287-302 [Conf]
  22. Ryo Nojima, Kazukuni Kobara, Hideki Imai
    Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:303-316 [Conf]
  23. Mridul Nandi
    A Simple and Unified Method of Proving Indistinguishability. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:317-334 [Conf]
  24. Christophe Doche, Laurent Imbert
    Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:335-348 [Conf]
  25. Johannes Buchmann, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich
    CMSS - An Improved Merkle Signature Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:349-363 [Conf]
  26. Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
    Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:364-378 [Conf]
  27. Manuel Barbosa, P. Farshim
    Secure Cryptographic Workflow in the Standard Model. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:379-393 [Conf]
  28. Sanjit Chatterjee, Palash Sarkar
    Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:394-408 [Conf]
  29. Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma
    Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:409-423 [Conf]
  30. Matthew Darnall, Doug Kuhlman
    AES Software Implementations on ARM7TDMI. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:424-435 [Conf]
  31. Antoine Joux, Pascal Delaunay
    Galois LFSR, Embedded Devices and Side Channel Weaknesses. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:436-451 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002