The SCEAS System
Navigation Menu

Conferences in DBLP

INDOCRYPT (indocrypt)
2002 (conf/indocrypt/2002)

  1. Joan Daemen, Vincent Rijmen
    Security of a Wide Trail Design. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:1-11 [Conf]
  2. Guozhen Xiao, Shimin Wei
    Fast Algorithms for Determining the Linear Complexity of Period Sequences. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:12-21 [Conf]
  3. François Arnault, Thierry P. Berger, Abdelkader Necer
    A New Class of Stream Ciphers Combining LFSR and FCSR Architectures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:22-33 [Conf]
  4. Selçuk Kavut, Melek D. Yücel
    Slide Attack on Spectr-H64. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:34-47 [Conf]
  5. Helger Lipmaa
    On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:48-61 [Conf]
  6. William D. Banks, Igor Shparlinski
    A Variant of NTRU with Non-invertible Polynomials. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:62-70 [Conf]
  7. S. C. Samuel, D. G. Thomas, P. J. Abisha, K. G. Subramanian
    Tree Replacement and Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:71-78 [Conf]
  8. Olaf Müller, Michael Nüsken
    Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:79-92 [Conf]
  9. B. Prabhu, K. Srinathan, C. Pandu Rangan
    Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:93-107 [Conf]
  10. Ravi Mukkamala
    QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:108-121 [Conf]
  11. Kapali Viswanathan, Ashutosh Saxena
    Towards Logically and Physically Secure Public-Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:122-134 [Conf]
  12. Tanmoy Kanti Das, Subhamoy Maitra
    Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:135-148 [Conf]
  13. Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang
    A 2-Secure Code with Efficient Tracing Algorithm. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:149-162 [Conf]
  14. Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati
    Reed Solomon Codes for Digital Fingerprinting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:163-175 [Conf]
  15. Douglas Wikström
    A Note on the Malleability of the El Gamal Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:176-184 [Conf]
  16. Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk
    Authentication of Concast Communication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:185-198 [Conf]
  17. Byoungcheon Lee, Kwangjo Kim
    Self-certified Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:199-214 [Conf]
  18. K. C. Reddy, Divya Nalla
    Identity Based Authenticated Group Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:215-233 [Conf]
  19. Soumen Maity, Thomas Johansson
    Construction of Cryptographically Important Boolean Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:234-245 [Conf]
  20. John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan
    Evolving Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:246-259 [Conf]
  21. Sugata Gangopadhyay, Subhamoy Maitra
    Further Results Related to Generalized Nonlinearity. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:260-274 [Conf]
  22. Jean-Claude Bajard, Laurent Imbert, Christophe Nègre
    Modular Multiplication in GF(pk) Using Lagrange Representation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:275-284 [Conf]
  23. YoungJu Choie, Jong Won Lee
    Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:285-295 [Conf]
  24. Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi
    Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:296-313 [Conf]
  25. Jong-Phil Yang, Kyung Hyune Rhee
    The Design and Implementation of Improved Secure Cookies Based on Certificate. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:314-325 [Conf]
  26. Kenji Imamoto, Kouichi Sakurai
    A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:326-338 [Conf]
  27. Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya
    Spending Offline Divisible Coins with Combining Capability. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:339-353 [Conf]
  28. Yongdong Wu, Di Ma, Changsheng Xu
    Efficient Object-Based Stream Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:354-367 [Conf]
  29. Douglas Wikström
    The Security of a Mix-Center Based on a Semantically Secure Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:368-381 [Conf]
  30. Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee
    New Identity Escrow Scheme for Anonymity Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:382-394 [Conf]
  31. Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
    On Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:395-408 [Conf]
  32. K. Srinathan, N. Tharani Rajan, C. Pandu Rangan
    Non-perfect Secret Sharing over General Access Structures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:409-421 [Conf]
  33. Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle
    On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:422-436 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002