|
Conferences in DBLP
- G. R. Blakley, I. Borosh
A General Theory of Codes, II: Paradigms and Homomorphisms. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:1-31 [Conf]
- Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:32-42 [Conf]
- Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:43-54 [Conf]
- Bart Preneel
Cryptanalysis of Message Authentication Codes. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:55-65 [Conf]
- R. Balasubramanian, S. V. Nagaraj
The Least Witness of a Composite Number. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:66-74 [Conf]
- Hidenori Kuwadako, Hatsukazu Tanaka
Fast Algorithm for Finding a Small Root of a Quadratic Modular Equation. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:75-81 [Conf]
- Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi
Modified Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:82-95 [Conf]
- Daisuke Nakamura, Kunikatsu Kobayashi
Modified ElGamal Cryptosystem. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:96-108 [Conf]
- Kazuo Ohta
Remarks on Blind Decryption. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:109-115 [Conf]
- George I. Davida, René Peralta
High-Speed Cryptography. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:116-120 [Conf]
- John Kelsey, Bruce Schneier, Chris Hall, David Wagner
Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:121-134 [Conf]
- Yoshiki Sameshima
A Key Escrow System of the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:135-146 [Conf]
- Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue
A Key Escrow System with Protecting User's Privacy by Blind Decoding. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:147-157 [Conf]
- Yvo Desmedt
Some Recent Research Aspects of Threshold Cryptography. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:158-173 [Conf]
- Akashi Satoh, Y. Kobayashi, H. Niijima, Nobuyuki Ooba, Seiji Munetoh, S. Sone
A High-Speed Small RSA Encryption LSI with Low Power Dissipation. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:174-187 [Conf]
- Constantinos Markantonakis
The Case for a Secure Multi-Application Smart Card Operating System. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:188-197 [Conf]
- Kenji Koyama, Routo Terada
An Augmented Family of Cryptographic Parity Circuits. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:198-208 [Conf]
- Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You
A New Byte-Oriented Block Cipher. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:209-220 [Conf]
- Mihir Bellare
Practice-Oriented Provable-Security. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:221-231 [Conf]
- Jussipekka Leiwo, Yuliang Zheng
A Framework for the Management of Information Security. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:232-245 [Conf]
- Jean-Marie Kabasele-Tenday
Specifying Security in a Composite System. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:246-255 [Conf]
- Kan Zhang
On Rough Sets and Inference Analysis. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:256-265 [Conf]
- Tzonelih Hwang, Chih-Hung Wang
Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:266-272 [Conf]
- Seungjoo Kim, Sangjoon Park, Dongho Won
Group Signatures for Hierarchical Multigroups. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:273-281 [Conf]
- Kan Zhang
Threshold Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:282-290 [Conf]
- Yuliang Zheng
Signcryption and Its Applications in Efficient Public Key Solutions. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:291-312 [Conf]
- Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:313-320 [Conf]
- Andreas Fuchsberger
An Incremental Payment Method for Internet Based Streaming Real-Time Media. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:321-327 [Conf]
- Shahrokh Saeednia, Reihaneh Safavi-Naini
A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:328-334 [Conf]
- Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo
The Application of ID-Based Key Distribution Systems to an Elliptic Curve. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:335-344 [Conf]
- Kouichi Yamazaki, Masao Osaki, Osamu Hirota
On Reconciliation of Discrepant Sequences Shared through Quantum Mechanical Channels. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:345-356 [Conf]
|