The SCEAS System
Navigation Menu

Conferences in DBLP

Selected Areas in Cryptography (SAC) (sacrypt)
2002 (conf/sacrypt/2002)

  1. John Malone-Lee, Nigel P. Smart
    Modifications of ECDSA. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:1-12 [Conf]
  2. Dongryeol Kim, Seongan Lim
    Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:13-20 [Conf]
  3. Francesco Sica, Mathieu Ciet, Jean-Jacques Quisquater
    Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:21-36 [Conf]
  4. Philip Hawkes, Gregory G. Rose
    Guess-and-Determine Attacks on SNOW. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:37-46 [Conf]
  5. Patrik Ekdahl, Thomas Johansson
    A New Version of the Stream Cipher SNOW. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:47-61 [Conf]
  6. John Black, Phillip Rogaway, Thomas Shrimpton
    Encryption-Scheme Security in the Presence of Key-Dependent Messages. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:62-75 [Conf]
  7. Jakob Jonsson
    On the Security of CTR + CBC-MAC. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:76-93 [Conf]
  8. Soichi Furuya, Kouichi Sakurai
    Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:94-109 [Conf]
  9. Ben Reichardt, David Wagner
    Markov Truncated Differential Cryptanalysis of Skipjack. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:110-128 [Conf]
  10. Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko
    Higher Order Differential Attack of Camellia (II). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:129-146 [Conf]
  11. Hüseyin Demirci
    Square-like Attacks on Reduced Rounds of IDEA. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:147-159 [Conf]
  12. Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim
    Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:160-174 [Conf]
  13. Pascale Charpin, Enes Pasalic
    On Propagation Characteristics of Resilient Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:175-195 [Conf]
  14. Paul Camion, Miodrag J. Mihaljevic, Hideki Imai
    Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:196-213 [Conf]
  15. Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu
    Multiples of Primitive Polynomials and Their Products over GF(2). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:214-231 [Conf]
  16. Sabine Leveiller, Gilles Zémor, Philippe Guillot, Joseph Boutros
    A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:232-249 [Conf]
  17. Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot
    White-Box Cryptography and an AES Implementation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:250-270 [Conf]
  18. Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
    Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:271-290 [Conf]
  19. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
    New Results on Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:291-309 [Conf]
  20. Florian Hess
    Efficient Identity Based Signature Schemes Based on Pairings. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:310-324 [Conf]
  21. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    The Group Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:325-338 [Conf]
  22. Shoichi Hirose
    Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:339-352 [Conf]
  23. Sarvar Patel
    An Efficient MAC for Short Messages. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:353-368 [Conf]
  24. Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim
    Optimal Extension Fields for XTR. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:369-384 [Conf]
  25. M. Jason Hinek, Mo King Low, Edlyn Teske
    On Some Attacks on Multi-prime RSA. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:385-404 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002