Conferences in DBLP
Alexander Maximov , Thomas Johansson , Steve Babbage An Improved Correlation Attack on A5/1. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:1-18 [Conf ] Frederik Armknecht , Joseph Lano , Bart Preneel Extending the Resynchronization Attack. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:19-38 [Conf ] Håkan Englund , Thomas Johansson A New Simple Technique to Attack Filter Generators and Related Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:39-53 [Conf ] Dan Page , Martijn Stam On XTR and Side-Channel Analysis. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:54-68 [Conf ] Johannes Blömer , Jorge Guajardo , Volker Krummel Provably Secure Masking of AES. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:69-83 [Conf ] Pascal Junod , Serge Vaudenay Perfect Diffusion Primitives for Block Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:84-99 [Conf ] Gilles Piret , Jean-Jacques Quisquater Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:100-113 [Conf ] Pascal Junod , Serge Vaudenay FOX : A New Family of Block Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:114-129 [Conf ] Roberto Maria Avanzi A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:130-143 [Conf ] Soonhak Kwon , Chang Hoon Kim , Chun Pyo Hong Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:144-158 [Conf ] Jean-Claude Bajard , Laurent Imbert , Thomas Plantard Modular Number Systems: Beyond the Mersenne Family. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:159-169 [Conf ] Tanja Lange , Marc Stevens Efficient Doubling on Genus Two Curves over Binary Fields. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:170-181 [Conf ] Duong Hieu Phan , David Pointcheval About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:182-197 [Conf ] Adam Young , Moti Yung A Subliminal Channel in Secret Block Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:198-211 [Conf ] Pierre-Alain Fouque , Antoine Joux , Guillaume Poupard Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:212-226 [Conf ] Olivier Billet , Henri Gilbert , Charaf Ech-Chatbi Cryptanalysis of a White Box AES Implementation. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:227-240 [Conf ] Joachim von zur Gathen , Igor Shparlinski Predicting Subset Sum Pseudorandom Generators. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:241-251 [Conf ] Wenling Wu , Dengguo Feng , Hua Chen Collision Attack and Pseudorandomness of Reduced-Round Camellia. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:252-266 [Conf ] Shaoquan Jiang , Guang Gong Password Based Key Exchange with Mutual Authentication. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:267-279 [Conf ] Ruizhong Wei , Jiang Wu Product Construction of Key Distribution Schemes for Sensor Networks. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:280-293 [Conf ] JooYoung Lee , Douglas R. Stinson Deterministic Key Predistribution Schemes for Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:294-307 [Conf ] Ventzislav Nikov , Svetla Nikova On Proactive Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:308-325 [Conf ] Sarvar Patel , Zulfikar Ramzan , Ganapathy S. Sundaram Efficient Constructions of Variable-Input-Length Block Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:326-340 [Conf ] Mridul Nandi A Sufficient Condition for Optimal Domain Extension of UOWHFs. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:341-354 [Conf ]