Conferences in DBLP
Joan Daemen , Vincent Rijmen Security of a Wide Trail Design. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:1-11 [Conf ] Guozhen Xiao , Shimin Wei Fast Algorithms for Determining the Linear Complexity of Period Sequences. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:12-21 [Conf ] François Arnault , Thierry P. Berger , Abdelkader Necer A New Class of Stream Ciphers Combining LFSR and FCSR Architectures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:22-33 [Conf ] Selçuk Kavut , Melek D. Yücel Slide Attack on Spectr-H64. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:34-47 [Conf ] Helger Lipmaa On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:48-61 [Conf ] William D. Banks , Igor Shparlinski A Variant of NTRU with Non-invertible Polynomials. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:62-70 [Conf ] S. C. Samuel , D. G. Thomas , P. J. Abisha , K. G. Subramanian Tree Replacement and Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:71-78 [Conf ] Olaf Müller , Michael Nüsken Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:79-92 [Conf ] B. Prabhu , K. Srinathan , C. Pandu Rangan Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:93-107 [Conf ] Ravi Mukkamala QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:108-121 [Conf ] Kapali Viswanathan , Ashutosh Saxena Towards Logically and Physically Secure Public-Key Infrastructures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:122-134 [Conf ] Tanmoy Kanti Das , Subhamoy Maitra Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:135-148 [Conf ] Vu Dong Tô , Reihaneh Safavi-Naini , Yejing Wang A 2-Secure Code with Efficient Tracing Algorithm. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:149-162 [Conf ] Ravi Sankar Veerubhotla , Ashutosh Saxena , Ved Prakash Gulati Reed Solomon Codes for Digital Fingerprinting. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:163-175 [Conf ] Douglas Wikström A Note on the Malleability of the El Gamal Cryptosystem. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:176-184 [Conf ] Mohamed Al-Ibrahim , Hossein Ghodosi , Josef Pieprzyk Authentication of Concast Communication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:185-198 [Conf ] Byoungcheon Lee , Kwangjo Kim Self-certified Signatures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:199-214 [Conf ] K. C. Reddy , Divya Nalla Identity Based Authenticated Group Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:215-233 [Conf ] Soumen Maity , Thomas Johansson Construction of Cryptographically Important Boolean Functions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:234-245 [Conf ] John A. Clark , Jeremy L. Jacob , Susan Stepney , Subhamoy Maitra , William Millan Evolving Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:246-259 [Conf ] Sugata Gangopadhyay , Subhamoy Maitra Further Results Related to Generalized Nonlinearity. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:260-274 [Conf ] Jean-Claude Bajard , Laurent Imbert , Christophe Nègre Modular Multiplication in GF(pk ) Using Lagrange Representation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:275-284 [Conf ] YoungJu Choie , Jong Won Lee Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:285-295 [Conf ] Tetsuya Izu , Bodo Möller , Tsuyoshi Takagi Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:296-313 [Conf ] Jong-Phil Yang , Kyung Hyune Rhee The Design and Implementation of Improved Secure Cookies Based on Certificate. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:314-325 [Conf ] Kenji Imamoto , Kouichi Sakurai A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:326-338 [Conf ] Eikoh Chida , Yosuke Kasai , Masahiro Mambo , Hiroki Shizuya Spending Offline Divisible Coins with Combining Capability. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:339-353 [Conf ] Yongdong Wu , Di Ma , Changsheng Xu Efficient Object-Based Stream Authentication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:354-367 [Conf ] Douglas Wikström The Security of a Mix-Center Based on a Semantically Secure Cryptosystem. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:368-381 [Conf ] Yong-Ho Lee , Im-Yeong Lee , Hyung-Woo Lee New Identity Escrow Scheme for Anonymity Authentication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:382-394 [Conf ] Ventzislav Nikov , Svetla Nikova , Bart Preneel , Joos Vandewalle On Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:395-408 [Conf ] K. Srinathan , N. Tharani Rajan , C. Pandu Rangan Non-perfect Secret Sharing over General Access Structures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:409-421 [Conf ] Ventzislav Nikov , Svetla Nikova , Bart Preneel , Joos Vandewalle On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:422-436 [Conf ]