The SCEAS System
Navigation Menu

Conferences in DBLP

Selected Areas in Cryptography (SAC) (sacrypt)
1999 (conf/sacrypt/1999)

  1. Helena Handschuh, Serge Vaudenay
    A Universal Encryption Standard. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:1-12 [Conf]
  2. John Kelsey, Bruce Schneier, Niels Ferguson
    Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:13-33 [Conf]
  3. Guang Gong, Thomas A. Berson, Douglas R. Stinson
    Elliptic Curve Pseudorandom Sequence Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:34-48 [Conf]
  4. Serge Vaudenay
    Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:49-61 [Conf]
  5. John O. Pliam
    Guesswork and Variation Distance as Measures of Cipher Security. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:62-77 [Conf]
  6. Liam Keliher, Henk Meijer, Stafford E. Tavares
    Modeling Linear Characteristics of Substitution-Permutation Networks. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:78-91 [Conf]
  7. Yuliang Zheng, Xian-Mo Zhang
    Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:92-105 [Conf]
  8. Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda
    Security of E2 against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:106-117 [Conf]
  9. John Kelsey, Bruce Schneier
    Key-Schedule Cryptanalysis of DEAL. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:118-134 [Conf]
  10. Kazumaro Aoki
    Efficient Evaluation of Security against Generalized Interpolation Attack. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:135-146 [Conf]
  11. Detlef Hühnlein
    Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:147-162 [Conf]
  12. Biljana Cubaleska, Andreas Rieke, Thomas Hermann
    Improving and Extending the Lim/Lee Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:163-174 [Conf]
  13. Fabrice Noilhan
    Software Optimization of Decorrelation Module. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:175-183 [Conf]
  14. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf
    Pseudonym Systems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:184-199 [Conf]
  15. Douglas R. Stinson, Ruizhong Wei
    Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:200-214 [Conf]
  16. Dirk Westhoff, Markus Schneider II, Claus Unger, Firoz Kaderali
    Protecting a Mobile Agent's Route against Collusions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:215-225 [Conf]
  17. William Allen Simpson
    Photuris: Design Criteria. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:226-242 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002