The SCEAS System
Navigation Menu

Conferences in DBLP

Selected Areas in Cryptography (SAC) (sacrypt)
1998 (conf/sacrypt/1998)

  1. Serge Vaudenay
    Feistel Ciphers with L2-Decorrelation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:1-14 [Conf]
  2. Sandy Harris, Carlisle M. Adams
    Key-Dependent S-Box Manipulations. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:15-26 [Conf]
  3. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall
    On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:27-42 [Conf]
  4. Zhi-Guo Chen, Stafford E. Tavares
    Toward Provable Security of Substitution-Permutation Encryption Networks. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:43-56 [Conf]
  5. Jean-Sébastien Coron, David Naccache
    An Accurate Evaluation of Maurer's Universal Test. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:57-71 [Conf]
  6. David M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay
    Computational Alternatives to Random Number Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:72-80 [Conf]
  7. Burton S. Kaliski Jr., Yiqun Lisa Yin
    Storage-Efficient Finite Field Basis Conversion. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:81-93 [Conf]
  8. Wenbo Mao
    Verifiable Partial Sharing of Integer Fractions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:94-105 [Conf]
  9. Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
    Higher Order Differential Attack Using Chosen Higher Order Differences. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:106-117 [Conf]
  10. Kazumaro Aoki
    On Maximum Non-averaged Differential Probability. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:118-130 [Conf]
  11. Serge Mister, Stafford E. Tavares
    Cryptanalysis of RC4-like Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:131-143 [Conf]
  12. Douglas R. Stinson, Ruizhong Wei
    Key Preassigned Traceability Schemes for Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:144-156 [Conf]
  13. Markus Jakobsson, David M'Raïhi
    Mix-Based Electronic Payments. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:157-173 [Conf]
  14. Sarvar Patel
    Over the Air Service Provisioning. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:174-189 [Conf]
  15. Michael J. Wiener, Robert J. Zuccherato
    Faster Attacks on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:190-200 [Conf]
  16. Julio López, Ricardo Dahab
    Improved Algorithms for Elliptic Curve Arithmetic in GF(2n). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:201-212 [Conf]
  17. Phong Q. Nguyen, Jacques Stern
    Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:213-218 [Conf]
  18. Jin-yi Cai, Thomas W. Cusick
    A Lattice-Based Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:219-233 [Conf]
  19. Jens-Peter Kaps, Christof Paar
    Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:234-247 [Conf]
  20. Helger Lipmaa
    IDEA: A Cipher For Multimedia Architectures? [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:248-263 [Conf]
  21. Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta
    A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:264-279 [Conf]
  22. Xian-Mo Zhang, Yuliang Zheng
    The Nonhomomorphicity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:280-295 [Conf]
  23. David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
    Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
  24. Helena Handschuh, Howard M. Heys
    A Timing Attack on RC5. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:306-318 [Conf]
  25. Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:319-338 [Conf]
  26. Simon Blake-Wilson, Alfred Menezes
    Authenticated Diffie-Hellman Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:339-361 [Conf]
  27. Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir
    Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:362-376 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002