|
Conferences in DBLP
- Colin Boyd
Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:1-13 [Conf]
- Amit Sahai
Secure Protocols for Complex Tasks in Complex Environments. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:14-16 [Conf]
- Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:17-32 [Conf]
- Audrey Montreuil, Jacques Patarin
The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:33-47 [Conf]
- Guilin Wang, Feng Bao, Jianying Zhou
On the Security of a Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:48-60 [Conf]
- Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
Multiplicative Homomorphic E-Voting. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:61-72 [Conf]
- Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:73-83 [Conf]
- Lynn Margaret Batten
Algebraic Attacks Over GF(q). [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:84-91 [Conf]
- Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
Results on Algebraic Immunity for Cryptographically Significant Boolean Functions. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:92-106 [Conf]
- Laurent Poinsot, Sami Harari
Generalized Boolean Bent Functions. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:107-119 [Conf]
- An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
On Boolean Functions with Generalized Cryptographic Properties. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:120-135 [Conf]
- Poorvi L. Vora
Information Theory and the Security of Binary Data Perturbation. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:136-147 [Conf]
- Luke McAven, Reihaneh Safavi-Naini, Moti Yung
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:148-161 [Conf]
- Jorge Nakahara Jr.
Faster Variants of the MESH Block Ciphers. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:162-174 [Conf]
- Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song
Related-Key Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:175-190 [Conf]
- Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:191-205 [Conf]
- Jorge Nakahara Jr., Daniel Santana de Freitas
Cryptanalysis of Ake98. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:206-217 [Conf]
- Thierry P. Berger, Pierre Loidreau
Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:218-229 [Conf]
- Palash Sarkar
HEAD: Hybrid Encryption with Delegated Decryption Capability. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:230-244 [Conf]
- David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar
A Provably Secure Elliptic Curve Scheme with Fast Encryption. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:245-259 [Conf]
- Gildas Avoine, Jean Monnerat, Thomas Peyrin
Advances in Alternative Non-adjacent Form Representations. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:260-274 [Conf]
- Françoise Levy-dit-Vehel, Ludovic Perret
Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:275-289 [Conf]
- Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
Exact Analysis of Montgomery Multiplication. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:290-304 [Conf]
- H. Gopalkrishna Gadiyar, K. M. Sangeeta Maini, R. Padma
Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:305-314 [Conf]
- Shai Halevi
EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:315-327 [Conf]
- Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:328-342 [Conf]
- David A. McGrew, John Viega
The Security and Performance of the Galois/Counter Mode (GCM) of Operation. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:343-355 [Conf]
- Javier Herranz, Germán Sáez
Revisiting Fully Distributed Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:356-370 [Conf]
- Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim
New ID-Based Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:371-383 [Conf]
- Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:384-398 [Conf]
- Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy
A New Black and White Visual Cryptographic Scheme for General Access Structures. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:399-413 [Conf]
- Marcel Fernandez, Miguel Soriano
Identification Algorithms for Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:414-430 [Conf]
|