The SCEAS System
Navigation Menu

Conferences in DBLP

Selected Areas in Cryptography (SAC) (sacrypt)
2000 (conf/sacrypt/2000)

  1. Muxiang Zhang, Christopher Carroll, Agnes Hui Chan
    Analysis of IS-95 CDMA Voice Privacy. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:1-13 [Conf]
  2. David A. McGrew, Scott R. Fluhrer
    Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:14-28 [Conf]
  3. Amr M. Youssef
    Cryptanalysis of the ``Augmented Family of Cryptographic Parity Circuits'' Proposed at ISW'97. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:29-38 [Conf]
  4. Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
    Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:39-56 [Conf]
  5. Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay
    DFCv2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:57-71 [Conf]
  6. Kenji Ohkuma, Hirofumi Muratani, Fumihiko Sano, Shin-ichi Kawamura
    The Block Cipher Hierocrypt. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:72-88 [Conf]
  7. Valér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth
    Symmetric Block Ciphers Based on Group Bases. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:89-105 [Conf]
  8. Christian Günther, Tanja Lange, Andreas Stein
    Speeding up the Arithmetic on Koblitz Curves of Genus Two. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:106-117 [Conf]
  9. Huapeng Wu
    On Complexity of Polynomial Basis Squaring in F2m. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:118-129 [Conf]
  10. Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson
    Dynamic Multi-threshold Metering Schemes. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:130-143 [Conf]
  11. Francesco Bergadano, Davide Cavagnino, Bruno Crispo
    Chained Stream Authentication. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:144-157 [Conf]
  12. Carlisle M. Adams, Robert J. Zuccherato
    A Global PMI for Electronic Content Distribution. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:158-168 [Conf]
  13. John O. Pliam
    A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:169-188 [Conf]
  14. Serge Vaudenay
    Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:189-201 [Conf]
  15. Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee
    HAS-V: A New Hash Function with Variable Output Length. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:202-216 [Conf]
  16. Guang Gong, Amr M. Youssef
    On Welch-Gong Transformation Sequence Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:217-232 [Conf]
  17. Jovan Dj. Golic
    Modes of Operation of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:233-247 [Conf]
  18. Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, William Millan
    LILI Keystream Generator. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:248-261 [Conf]
  19. Yuliang Zheng, Xian-Mo Zhang
    Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:262-274 [Conf]
  20. Detlef Hühnlein, Michael J. Jacobson Jr., Damian Weber
    Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:275-287 [Conf]
  21. Detlef Hühnlein, Sachar Paulus
    On the Implementation of Cryptosystems Based on Real Quadratic Number Fields. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:288-302 [Conf]
  22. Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong
    Root Finding Interpolation Attack. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:303-314 [Conf]
  23. Haruki Seki, Toshinobu Kaneko
    Differential Cryptanalysis of Reduced Rounds of GOST. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:315-323 [Conf]
  24. Masayuki Kanda
    Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:324-338 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002