The SCEAS System
Navigation Menu

Conferences in DBLP

Selected Areas in Cryptography (SAC) (sacrypt)
2001 (conf/sacrypt/2001)

  1. Scott R. Fluhrer, Itsik Mantin, Adi Shamir
    Weaknesses in the Key Scheduling Algorithm of RC4. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:1-24 [Conf]
  2. Philip Hawkes, Frank Quick, Gregory G. Rose
    A Practical Cryptanalysis of SSC2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:25-37 [Conf]
  3. Scott R. Fluhrer, Stefan Lucks
    Analysis of the E0 Encryption System. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:38-48 [Conf]
  4. Amr M. Youssef, Guang Gong
    Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:49-59 [Conf]
  5. Enes Pasalic, Subhamoy Maitra
    Linear Codes in Constructing Resilient Functions with High Nonlinearity. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:60-74 [Conf]
  6. Tetsu Iwata, Takayuki Yoshiwara, Kaoru Kurosawa
    New Covering Radius of Reed-Muller Codes for t-Resilient Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:75-86 [Conf]
  7. Paolo D'Arco, Douglas R. Stinson
    Generalized Zig-zag Functions and Oblivious Transfer Reductions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:87-102 [Conf]
  8. Niels Ferguson, Richard Schroeppel, Doug Whiting
    A Simple Algebraic Representation of Rijndael. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:103-111 [Conf]
  9. Liam Keliher, Henk Meijer, Stafford E. Tavares
    Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:112-128 [Conf]
  10. Aggelos Kiayias, Moti Yung
    Polynomial Reconstruction Based Cryptography. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:129-133 [Conf]
  11. Brian King
    An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:134-150 [Conf]
  12. Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen
    Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:151-164 [Conf]
  13. Bodo Möller
    Algorithms for Multi-exponentiation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:165-180 [Conf]
  14. Florian Hess, Gadiel Seroussi, Nigel P. Smart
    Two Topics in Hyperelliptic Cryptography. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:181-189 [Conf]
  15. Håvard Raddum, Lars R. Knudsen
    A Differential Attack on Reduced-Round SC2000. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:190-198 [Conf]
  16. Pascal Junod
    On the Complexity of Matsui's Attack. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:199-211 [Conf]
  17. Fabian Kuhn, René Struik
    Random Walks Revisited: Extensions of Pollard's Rho Algorithm for Computing Multiple Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:212-229 [Conf]
  18. Arash Reyhani-Masoleh, M. Anwarul Hasan
    Fast Normal Basis Multiplication Using General Purpose Processors. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:230-244 [Conf]
  19. Gurgen H. Khachatrian, Melsik K. Kuregian, Karen R. Ispiryan, James L. Massey
    Fast Multiplication of Integers for Public-Key Applications. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:245-254 [Conf]
  20. Toru Akishita
    Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:255-267 [Conf]
  21. Yasuyuki Sakai, Kouichi Sakurai
    On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:268-283 [Conf]
  22. Guang Gong, Lein Harn, Huapeng Wu
    The GH Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:284-300 [Conf]
  23. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee
    XTR Extended to GF(p6m). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:301-312 [Conf]
  24. Phong Q. Nguyen
    The Two Faces of Lattices in Cryptology. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:313- [Conf]
  25. Bert den Boer, Bart Van Rompay, Bart Preneel, Joos Vandewalle
    New (Two-Track-)MAC Based on the Two Trails of RIPEMD. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:314-324 [Conf]
  26. Johannes Blömer, Alexander May
    Key Revocation with Interval Cover Families. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:325-341 [Conf]
  27. Wenbo Mao
    Timed-Release Cryptography. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:342-358 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002