Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Manuel Barbosa, Pooya Farshim |
Efficient Identity-Based Key Encapsulation to Multiple Parties. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Key Encapsulation Mechanism (KEM), Provable Security, Identity Based Cryptography, Hybrid Encryption |
1 | Neal Koblitz, Alfred Menezes |
Pairing-Based Cryptography at High Security Levels. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Cid, Sean Murphy, Matthew J. B. Robshaw |
An Algebraic Framework for Cipher Embeddings. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Chris J. Mitchell |
Partial Key Recovery Attacks on XCBC, TMAC and OMAC. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Canhui Cai, Jing Chen 0001 |
Tessellation Based Multiple Description Coding. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Brown 0003, Lorenz Minder, Amin Shokrollahi |
Improved Decoding of Interleaved AG Codes. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Woo Tae Kim, Se H. Kang, Eon Kyeong Joo |
Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | An Braeken, Bart Preneel |
Probabilistic Algebraic Attacks. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Walsh spectrum, combination and filter generator, Algebraic attack, algebraic immunity, annihilator |
1 | Jintai Ding, Jason E. Gower, Dieter Schmidt, Christopher Wolf, Zhijun Yin |
Complexity Estimates for the F4 Attack on the Perturbed Matsumoto-Imai Cryptosystem. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Gröbner basis, public-key, perturbation, multivariate, quadratic polynomials |
1 | Ueli M. Maurer, Johan Sjödin |
Domain Expansion of MACs: Alternative Uses of the FIL-MAC. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
arbitrary-input-length (AIL), variable-input-length (VIL), fixed-input-length (FIL), Message authentication code (MAC) |
1 | Steven D. Galbraith, James F. McKee |
Pairings on Elliptic Curves over Finite Commutative Rings. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Germán Sáez |
On Threshold Self-healing Key Distribution Schemes. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | C. Dods, Nigel P. Smart, Martijn Stam |
Hash Based Digital Signature Schemes. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kamel Bentahar |
The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
DHP-DLP equivalence, Elliptic Curve Cryptosystems |
1 | Liqun Chen 0002, Zhaohui Cheng |
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Exploiting Coding Theory for Collision Attacks on SHA-1. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
low-weight vector, cryptanalysis, hash function, collision, Linear code, SHA-1 |
1 | Goce Jakimoski |
Unconditionally Secure Information Authentication in Presence of Erasures. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
erasure- resilient codes, erasure-tolerant authentication, message authentication, authentication codes |
1 | An Braeken, Christopher Wolf, Bart Preneel |
Normality of Vectorial Functions. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
propagation characteristics, APN, algorithm, Cryptography, AES, normality, S-box |
1 | Andrey Sidorenko, Berry Schoenmakers |
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mustapha Hedabou |
Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
?–adic method, precomputed table, Side Channel Attacks, Elliptic curve, scalar multiplication, Frobenius map |
1 | Hans Georg Schaathun, Gérard D. Cohen |
A Trellis-Based Bound on (2, 1)-Separating Codes. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
coding bounds, separating codes, Trellis |
1 | Manuel Barbosa, Dan Page |
On the Automatic Construction of Indistinguishable Operations. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Indistinguishable Operations, Countermeasures, Simple Power Analysis, Side-channel Cryptanalysis |
1 | Alexander W. Dent |
A Designer's Guide to KEMs. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Eike Kiltz, John Malone-Lee |
A General Construction of IND-CCA2 Secure Public Key Encryption. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Geraint Price |
A General Attack Model on Hash-Based Client Puzzles. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Dae Hyun Yum, Pil Joong Lee |
Efficient Key Updating Signature Schemes Based on IBS. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
Key insulated signature, intrusion resilient siganture, identity based signature |
1 | George Petrides |
Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Guy Farrell |
Recent Developments in Array Error-Control Codes: (Invited Paper). |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Werner Schindler |
A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
True (physical) random number generator, AIS 31, entropy, stochastical model |
1 | Werner Schindler, Colin D. Walter |
More Detail for a Combined Timing and Power Attack against Implementations of RSA. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
statistical decision problem, power analysis, exponentiation, timing attack, RSA cryptosystem, side channel leakage, Montgomery modular multiplication |
1 | Eirik Rosnes, Øyvind Ytrehus |
High Rate Convolutional Codes with Optimal Cycle Weights. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Enes Pasalic |
Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
Boolean Function, Resiliency, Nonlinearity, Algebraic Degree |
1 | Håvard Molland, John Erik Mathiassen, Tor Helleseth |
Improved Fast Correlation Attack Using Low Rate Codes. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tetsu Iwata, Kaoru Kurosawa |
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida |
Analysis of Double Block Length Hash Functions. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel |
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Kathy J. Horadam |
Differential Uniformity for Arrays. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Harald Niederreiter, Igor E. Shparlinski |
Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Katharina Geißler, Nigel P. Smart |
Computing the M = U Ut Integer Matrix Decomposition. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
NTRU, Lattice based cryptography |
1 | Andreas J. Winter 0002, Anderson C. A. Nascimento, Hideki Imai |
Commitment Capacity of Discrete Memoryless Channels. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Andrew J. Holt, James H. Davenport |
Resolving Large Prime(s) Variants for Discrete Logarithm Computation. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Robert Granger |
Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson (eds.) |
Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Simon R. Blackburn, Domingo Gómez-Pérez, Jaime Gutierrez 0001, Igor E. Shparlinski |
Predicting the Inversive Generator. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sattam S. Al-Riyami, Kenneth G. Paterson |
Tripartite Authenticated Key Agreement Protocols from Pairings. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Hans Georg Schaathun, Tor Helleseth |
Separating and Intersecting Properties of BCH and Kasami Codes. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
separating systems, Kasami codes, fingerprinting, BCH codes |
1 | Lina Fagoonee, Bahram Honary |
A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Richard Walton |
Uses and Abuses of Cryptography (Invited Paper). |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Valtteri Niemi |
Cryptography in Wireless Standards: (Invited Paper). |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Johansson 0001 |
Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Chris J. Mitchell |
Remote User Authentication Using Public Information. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Adam Barnett, Nigel P. Smart |
Mental Poker Revisited. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption |
1 | Konstantinos Rantos, Chris J. Mitchell |
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
interoperability, Key recovery, negotiation protocol |
1 | Matthew Geoffrey Parker |
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Marc Joye, Jean-Jacques Quisquater |
On Rabin-Type Signatures. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
Rabin-type systems, signature forgeries, digital signatures, factorization |
1 | Maki Yoshida, Toru Fujiwara |
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Willi Geiselmann, Rainer Steinwandt, Thomas Beth |
Attacking the Affine Parts of SFLASH. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou, Yuanlong Cai |
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Werner Schindler, François Koeune, Jean-Jacques Quisquater |
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
Error detection, error correction, timing attack, power attack |
1 | Jort van Mourik, David Saad, Yoshiyuki Kabashima |
Weight vs. Magnetization Enumerator for Gallager Codes. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Clifford C. Cocks |
An Identity Based Encryption Scheme Based on Quadratic Residues. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Lee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Keeyoung |
A New Undeniable Signature Scheme Using Smart Cards. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Bahram Honary (eds.) |
Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Alexandr Y. Lev, Yuliy A. Lev, Vyacheslav N. Okhrymenko |
Non-binary Block Inseparable Errors Control Codes. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Lejla Batina, Geeke Muurling |
Another Way of Doing RSA Cryptography in Hardware. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
MultiPrime, scalability, performance model, systolic array, Chinese Remainder Theorem, Montgomery multiplication, modular exponentiation |
1 | Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera |
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Cyril Prissette |
Unconditionally Secure Key Agreement Protocol. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | J. T. Paire, Paul Coulton, Patrick Guy Farrell |
Graph Configurations and Decoding Performance. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | F. Javier Galán-Simón, Edgar Martínez-Moro, Juan Tena Ayuso |
Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Lange 0001, Andreas Ahrens |
On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Simon Hirst, Bahram Honary |
A Simple Soft-Input/Soft-Output Decoder for Hamming Codes. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Joan Daemen, Vincent Rijmen |
The Wide Trail Design Strategy. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Viktoriya Masol |
Investigation of Linear Codes Possessing Some Extra Properties. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Nigel P. Smart |
The Exact Security of ECIES in the Generic Group Model. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Eric Filiol, Caroline Fontaine |
A New Ultrafast Stream Cipher Design: COS Ciphers. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register |
1 | Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda |
A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Crouch, James H. Davenport |
Lattice Attacks on RSA-Encrypted IP and TCP. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor |
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
Boolean functions, stream ciphers, Fourier transform, Viterbi algorithm, filter generator |
1 | Manfred von Willich |
A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Irfan Siap |
The Complete Weight Enumerator for Codes over Mn×s(Fq). |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Niklas Borselius, Chris J. Mitchell, Aaron Wilson |
Undetachable Threshold Signatures. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | David Saad, Yoshiyuki Kabashima, Tatsuto Murayama, Renato Vicente |
Statistical Physics of Low Density Parity Check Error Correcting Codes. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Svetla Nikova, Ventzislav Nikov |
Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Phillip Benachour, Patrick Guy Farrell, Bahram Honary |
A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | David J. C. MacKay |
Almost-Certainly Runlength-Limiting Codes. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Karl Brincat, Chris J. Mitchell |
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
cryptographic API, cryptanalysis, Message Authentication Code |
1 | A. Kh. Al Jabri |
A Statistical Decoding Algorithm for General Linear Block Codes. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
General Linear Block Codes, McEliece System, Statistical, Decoding |
1 | Ahmed Al-Dabbagh, Michael Darnell |
The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | N. Komninos, Bahram Honary, Michael Darnell |
An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth J. Giuliani, Guang Gong |
Generating Large Instances of the Gong-Harn Cryptosystem. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jihye Gwak, Sooyoung Kim Shin, Hyung-Myung Kim |
Reduced Complexity Sliding Window BCJR Decoding Algorithms for Turbo Codes. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Steven D. Galbraith, Nigel P. Smart |
A Cryptographic Application of Weil Descent. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Helen Donelan, Timothy O'Farrell |
A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Svetla Nikova, Ventzislav Nikov |
Some Applications of Bounds for Designs to the Cryptography. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Min-seok Oh, Peter Sweeney |
Low Complexity Soft-Decision Sequential Decoding Using Hybrid Permutation for Reed-Solomon Codes. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yi Mu 0001, Vijay Varadharajan, Khanh Quoc Nguyen |
Delegated Decryption. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Thumrongrat Amornraksa, David R. B. Burgess, Peter Sweeney |
An Encoding Scheme for Dual Level Access to Broadcasting Networks. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Graham H. Norton, Ana Salagean |
On Efficient Decoding of Alternant Codes over a Commutative Ring. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Guy Farrell, Seyed H. Razavi |
Graph Decoding of Array Error-Correcting Codes. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|