Conferences in DBLP
Serge Vaudenay Feistel Ciphers with L_{2} -Decorrelation. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:1-14 [Conf ] Sandy Harris , Carlisle M. Adams Key-Dependent S-Box Manipulations. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:15-26 [Conf ] Bruce Schneier , John Kelsey , Doug Whiting , David Wagner , Chris Hall On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:27-42 [Conf ] Zhi-Guo Chen , Stafford E. Tavares Toward Provable Security of Substitution-Permutation Encryption Networks. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:43-56 [Conf ] Jean-Sébastien Coron , David Naccache An Accurate Evaluation of Maurer's Universal Test. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:57-71 [Conf ] David M'Raïhi , David Naccache , David Pointcheval , Serge Vaudenay Computational Alternatives to Random Number Generators. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:72-80 [Conf ] Burton S. Kaliski Jr. , Yiqun Lisa Yin Storage-Efficient Finite Field Basis Conversion. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:81-93 [Conf ] Wenbo Mao Verifiable Partial Sharing of Integer Fractions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:94-105 [Conf ] Shiho Moriai , Takeshi Shimoyama , Toshinobu Kaneko Higher Order Differential Attack Using Chosen Higher Order Differences. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:106-117 [Conf ] Kazumaro Aoki On Maximum Non-averaged Differential Probability. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:118-130 [Conf ] Serge Mister , Stafford E. Tavares Cryptanalysis of RC4-like Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:131-143 [Conf ] Douglas R. Stinson , Ruizhong Wei Key Preassigned Traceability Schemes for Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:144-156 [Conf ] Markus Jakobsson , David M'Raïhi Mix-Based Electronic Payments. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:157-173 [Conf ] Sarvar Patel Over the Air Service Provisioning. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:174-189 [Conf ] Michael J. Wiener , Robert J. Zuccherato Faster Attacks on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:190-200 [Conf ] Julio López , Ricardo Dahab Improved Algorithms for Elliptic Curve Arithmetic in GF(2^{n} ). [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:201-212 [Conf ] Phong Q. Nguyen , Jacques Stern Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:213-218 [Conf ] Jin-yi Cai , Thomas W. Cusick A Lattice-Based Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:219-233 [Conf ] Jens-Peter Kaps , Christof Paar Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:234-247 [Conf ] Helger Lipmaa IDEA: A Cipher For Multimedia Architectures? [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:248-263 [Conf ] Masayuki Kanda , Youichi Takashima , Tsutomu Matsumoto , Kazumaro Aoki , Kazuo Ohta A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:264-279 [Conf ] Xian-Mo Zhang , Yuliang Zheng The Nonhomomorphicity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:280-295 [Conf ] David Wagner , Leone Simpson , Ed Dawson , John Kelsey , William Millan , Bruce Schneier Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:296-305 [Conf ] Helena Handschuh , Howard M. Heys A Timing Attack on RC5. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:306-318 [Conf ] Chris Hall , John Kelsey , Vincent Rijmen , Bruce Schneier , David Wagner Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:319-338 [Conf ] Simon Blake-Wilson , Alfred Menezes Authenticated Diffie-Hellman Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:339-361 [Conf ] Eli Biham , Alex Biryukov , Orr Dunkelman , Eran Richardson , Adi Shamir Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:362-376 [Conf ]