The SCEAS System
Navigation Menu

Conferences in DBLP

INDOCRYPT (indocrypt)
2004 (conf/indocrypt/2004)

  1. Colin Boyd
    Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:1-13 [Conf]
  2. Amit Sahai
    Secure Protocols for Complex Tasks in Complex Environments. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:14-16 [Conf]
  3. Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
    Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:17-32 [Conf]
  4. Audrey Montreuil, Jacques Patarin
    The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:33-47 [Conf]
  5. Guilin Wang, Feng Bao, Jianying Zhou
    On the Security of a Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:48-60 [Conf]
  6. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Multiplicative Homomorphic E-Voting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:61-72 [Conf]
  7. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:73-83 [Conf]
  8. Lynn Margaret Batten
    Algebraic Attacks Over GF(q). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:84-91 [Conf]
  9. Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
    Results on Algebraic Immunity for Cryptographically Significant Boolean Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:92-106 [Conf]
  10. Laurent Poinsot, Sami Harari
    Generalized Boolean Bent Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:107-119 [Conf]
  11. An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel
    On Boolean Functions with Generalized Cryptographic Properties. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:120-135 [Conf]
  12. Poorvi L. Vora
    Information Theory and the Security of Binary Data Perturbation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:136-147 [Conf]
  13. Luke McAven, Reihaneh Safavi-Naini, Moti Yung
    Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:148-161 [Conf]
  14. Jorge Nakahara Jr.
    Faster Variants of the MESH Block Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:162-174 [Conf]
  15. Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song
    Related-Key Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:175-190 [Conf]
  16. Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee
    Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:191-205 [Conf]
  17. Jorge Nakahara Jr., Daniel Santana de Freitas
    Cryptanalysis of Ake98. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:206-217 [Conf]
  18. Thierry P. Berger, Pierre Loidreau
    Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:218-229 [Conf]
  19. Palash Sarkar
    HEAD: Hybrid Encryption with Delegated Decryption Capability. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:230-244 [Conf]
  20. David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar
    A Provably Secure Elliptic Curve Scheme with Fast Encryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:245-259 [Conf]
  21. Gildas Avoine, Jean Monnerat, Thomas Peyrin
    Advances in Alternative Non-adjacent Form Representations. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:260-274 [Conf]
  22. Françoise Levy-dit-Vehel, Ludovic Perret
    Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:275-289 [Conf]
  23. Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
    Exact Analysis of Montgomery Multiplication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:290-304 [Conf]
  24. H. Gopalkrishna Gadiyar, K. M. Sangeeta Maini, R. Padma
    Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:305-314 [Conf]
  25. Shai Halevi
    EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:315-327 [Conf]
  26. Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung
    Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:328-342 [Conf]
  27. David A. McGrew, John Viega
    The Security and Performance of the Galois/Counter Mode (GCM) of Operation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:343-355 [Conf]
  28. Javier Herranz, Germán Sáez
    Revisiting Fully Distributed Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:356-370 [Conf]
  29. Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim
    New ID-Based Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:371-383 [Conf]
  30. Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
    Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:384-398 [Conf]
  31. Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy
    A New Black and White Visual Cryptographic Scheme for General Access Structures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:399-413 [Conf]
  32. Marcel Fernandez, Miguel Soriano
    Identification Algorithms for Sequential Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:414-430 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002