Conferences in DBLP
John Malone-Lee , Nigel P. Smart Modifications of ECDSA. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:1-12 [Conf ] Dongryeol Kim , Seongan Lim Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:13-20 [Conf ] Francesco Sica , Mathieu Ciet , Jean-Jacques Quisquater Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:21-36 [Conf ] Philip Hawkes , Gregory G. Rose Guess-and-Determine Attacks on SNOW. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:37-46 [Conf ] Patrik Ekdahl , Thomas Johansson A New Version of the Stream Cipher SNOW. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:47-61 [Conf ] John Black , Phillip Rogaway , Thomas Shrimpton Encryption-Scheme Security in the Presence of Key-Dependent Messages. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:62-75 [Conf ] Jakob Jonsson On the Security of CTR + CBC-MAC. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:76-93 [Conf ] Soichi Furuya , Kouichi Sakurai Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:94-109 [Conf ] Ben Reichardt , David Wagner Markov Truncated Differential Cryptanalysis of Skipjack. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:110-128 [Conf ] Yasuo Hatano , Hiroki Sekine , Toshinobu Kaneko Higher Order Differential Attack of Camellia (II). [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:129-146 [Conf ] Hüseyin Demirci Square-like Attacks on Reduced Rounds of IDEA. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:147-159 [Conf ] Donghoon Chang , Jaechul Sung , Soo Hak Sung , Sangjin Lee , Jongin Lim Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:160-174 [Conf ] Pascale Charpin , Enes Pasalic On Propagation Characteristics of Resilient Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:175-195 [Conf ] Paul Camion , Miodrag J. Mihaljevic , Hideki Imai Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:196-213 [Conf ] Subhamoy Maitra , Kishan Chand Gupta , Ayineedi Venkateswarlu Multiples of Primitive Polynomials and Their Products over GF(2). [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:214-231 [Conf ] Sabine Leveiller , Gilles Zémor , Philippe Guillot , Joseph Boutros A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:232-249 [Conf ] Stanley Chow , Philip A. Eisen , Harold Johnson , Paul C. van Oorschot White-Box Cryptography and an AES Implementation. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:250-270 [Conf ] Sarvar Patel , Zulfikar Ramzan , Ganapathy S. Sundaram Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:271-290 [Conf ] Carlo Blundo , Paolo D'Arco , Alfredo De Santis , Douglas R. Stinson New Results on Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:291-309 [Conf ] Florian Hess Efficient Identity Based Signature Schemes Based on Pairings. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:310-324 [Conf ] Emmanuel Bresson , Olivier Chevassut , David Pointcheval The Group Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:325-338 [Conf ] Shoichi Hirose Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:339-352 [Conf ] Sarvar Patel An Efficient MAC for Short Messages. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:353-368 [Conf ] Dong-Guk Han , Ki Soon Yoon , Young-Ho Park , Chang Han Kim , Jongin Lim Optimal Extension Fields for XTR. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:369-384 [Conf ] M. Jason Hinek , Mo King Low , Edlyn Teske On Some Attacks on Multi-prime RSA. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:385-404 [Conf ]