Conferences in DBLP
Scott R. Fluhrer , Itsik Mantin , Adi Shamir Weaknesses in the Key Scheduling Algorithm of RC4. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:1-24 [Conf ] Philip Hawkes , Frank Quick , Gregory G. Rose A Practical Cryptanalysis of SSC2. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:25-37 [Conf ] Scott R. Fluhrer , Stefan Lucks Analysis of the E0 Encryption System. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:38-48 [Conf ] Amr M. Youssef , Guang Gong Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:49-59 [Conf ] Enes Pasalic , Subhamoy Maitra Linear Codes in Constructing Resilient Functions with High Nonlinearity. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:60-74 [Conf ] Tetsu Iwata , Takayuki Yoshiwara , Kaoru Kurosawa New Covering Radius of Reed-Muller Codes for t-Resilient Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:75-86 [Conf ] Paolo D'Arco , Douglas R. Stinson Generalized Zig-zag Functions and Oblivious Transfer Reductions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:87-102 [Conf ] Niels Ferguson , Richard Schroeppel , Doug Whiting A Simple Algebraic Representation of Rijndael. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:103-111 [Conf ] Liam Keliher , Henk Meijer , Stafford E. Tavares Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:112-128 [Conf ] Aggelos Kiayias , Moti Yung Polynomial Reconstruction Based Cryptography. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:129-133 [Conf ] Brian King An Improved Implementation of Elliptic Curves over GF(2) when Using Projective Point Arithmetic. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:134-150 [Conf ] Jean-Sébastien Coron , David M'Raïhi , Christophe Tymen Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:151-164 [Conf ] Bodo Möller Algorithms for Multi-exponentiation. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:165-180 [Conf ] Florian Hess , Gadiel Seroussi , Nigel P. Smart Two Topics in Hyperelliptic Cryptography. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:181-189 [Conf ] Håvard Raddum , Lars R. Knudsen A Differential Attack on Reduced-Round SC2000. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:190-198 [Conf ] Pascal Junod On the Complexity of Matsui's Attack. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:199-211 [Conf ] Fabian Kuhn , René Struik Random Walks Revisited: Extensions of Pollard's Rho Algorithm for Computing Multiple Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:212-229 [Conf ] Arash Reyhani-Masoleh , M. Anwarul Hasan Fast Normal Basis Multiplication Using General Purpose Processors. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:230-244 [Conf ] Gurgen H. Khachatrian , Melsik K. Kuregian , Karen R. Ispiryan , James L. Massey Fast Multiplication of Integers for Public-Key Applications. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:245-254 [Conf ] Toru Akishita Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:255-267 [Conf ] Yasuyuki Sakai , Kouichi Sakurai On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:268-283 [Conf ] Guang Gong , Lein Harn , Huapeng Wu The GH Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:284-300 [Conf ] Seongan Lim , Seungjoo Kim , Ikkwon Yie , Jaemoon Kim , Hongsub Lee XTR Extended to GF(p6m ). [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:301-312 [Conf ] Phong Q. Nguyen The Two Faces of Lattices in Cryptology. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:313- [Conf ] Bert den Boer , Bart Van Rompay , Bart Preneel , Joos Vandewalle New (Two-Track-)MAC Based on the Two Trails of RIPEMD. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:314-324 [Conf ] Johannes Blömer , Alexander May Key Revocation with Interval Cover Families. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:325-341 [Conf ] Wenbo Mao Timed-Release Cryptography. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:342-358 [Conf ]