The SCEAS System
Navigation Menu

Conferences in DBLP

Selected Areas in Cryptography (SAC) (sacrypt)
2004 (conf/sacrypt/2004)

  1. Alexander Maximov, Thomas Johansson, Steve Babbage
    An Improved Correlation Attack on A5/1. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:1-18 [Conf]
  2. Frederik Armknecht, Joseph Lano, Bart Preneel
    Extending the Resynchronization Attack. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:19-38 [Conf]
  3. Håkan Englund, Thomas Johansson
    A New Simple Technique to Attack Filter Generators and Related Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:39-53 [Conf]
  4. Dan Page, Martijn Stam
    On XTR and Side-Channel Analysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:54-68 [Conf]
  5. Johannes Blömer, Jorge Guajardo, Volker Krummel
    Provably Secure Masking of AES. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:69-83 [Conf]
  6. Pascal Junod, Serge Vaudenay
    Perfect Diffusion Primitives for Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:84-99 [Conf]
  7. Gilles Piret, Jean-Jacques Quisquater
    Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:100-113 [Conf]
  8. Pascal Junod, Serge Vaudenay
    FOX : A New Family of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:114-129 [Conf]
  9. Roberto Maria Avanzi
    A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:130-143 [Conf]
  10. Soonhak Kwon, Chang Hoon Kim, Chun Pyo Hong
    Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:144-158 [Conf]
  11. Jean-Claude Bajard, Laurent Imbert, Thomas Plantard
    Modular Number Systems: Beyond the Mersenne Family. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:159-169 [Conf]
  12. Tanja Lange, Marc Stevens
    Efficient Doubling on Genus Two Curves over Binary Fields. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:170-181 [Conf]
  13. Duong Hieu Phan, David Pointcheval
    About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:182-197 [Conf]
  14. Adam Young, Moti Yung
    A Subliminal Channel in Secret Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:198-211 [Conf]
  15. Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard
    Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:212-226 [Conf]
  16. Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
    Cryptanalysis of a White Box AES Implementation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:227-240 [Conf]
  17. Joachim von zur Gathen, Igor Shparlinski
    Predicting Subset Sum Pseudorandom Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:241-251 [Conf]
  18. Wenling Wu, Dengguo Feng, Hua Chen
    Collision Attack and Pseudorandomness of Reduced-Round Camellia. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:252-266 [Conf]
  19. Shaoquan Jiang, Guang Gong
    Password Based Key Exchange with Mutual Authentication. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:267-279 [Conf]
  20. Ruizhong Wei, Jiang Wu
    Product Construction of Key Distribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:280-293 [Conf]
  21. JooYoung Lee, Douglas R. Stinson
    Deterministic Key Predistribution Schemes for Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:294-307 [Conf]
  22. Ventzislav Nikov, Svetla Nikova
    On Proactive Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:308-325 [Conf]
  23. Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
    Efficient Constructions of Variable-Input-Length Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:326-340 [Conf]
  24. Mridul Nandi
    A Sufficient Condition for Optimal Domain Extension of UOWHFs. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:341-354 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002