The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "INDOCRYPT"( http://dblp.L3S.de/Venues/INDOCRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/indocrypt

Publication years (Num. hits)
2000 (26) 2001 (33) 2002 (34) 2003 (32) 2004 (33) 2005 (33) 2006 (32) 2007 (34) 2008 (34) 2009 (29) 2010 (25) 2011 (29) 2012 (32) 2013 (22) 2014 (26) 2015 (20) 2016 (24) 2017 (21) 2018 (21) 2019 (29) 2020 (40) 2021 (28) 2022 (32)
Publication types (Num. hits)
inproceedings(646) proceedings(23)
Venues (Conferences, Journals, ...)
INDOCRYPT(669)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 500 occurrences of 277 keywords

Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Deike Priemuth-Schmid, Alex Biryukov Slid Pairs in Salsa20 and Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium
1Subhamoy Maitra, Goutam Paul 0001 Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF KSA, PRGA, Cryptography, Stream Cipher, Bias, RC4, Secret Key, Keystream
1Michael Gorski, Stefan Lucks New Related-Key Boomerang Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
1Laila El Aimani Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pairing-based signatures, Undeniable signatures, Generic construction
1Jun Furukawa 0001, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low error rate, biometrics, Fuzzy, identity-based
1Kamer Kaya, Ali Aydin Selçuk A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability
1Subhamoy Maitra, Santanu Sarkar 0001 A New Class of Weak Encryption Exponents in RSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Lattice, Factorization, LLL Algorithm
1Sébastien Canard, Amandine Jambert Group Key Management: From a Non-hierarchical to a Hierarchical Structure. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Access Control, Key Management, Hierarchy
1Orhun Kara Reflection Cryptanalysis of Some Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack
1Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis
1Dmitry Khovratovich Two Attacks on RadioGatún. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sponge, cryptanalysis, hash functions
1Qiang Tang 0001 Type-Based Proxy Re-encryption and Its Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Markku-Juhani Olavi Saarinen A Meet-in-the-Middle Collision Attack Against the New FORK-256. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack
1François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, software design, FCSRs
1Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang Proxy Re-signature Schemes Without Random Oracles. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy re-signature, existential unforgeability, standard model, bilinear maps, ID-based
1Ramakanth Kavuluru, Andrew Klapper On the k -Operation Linear Complexity of Periodic Sequences. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF k symbol insertion, k symbol deletion, linear complexity, Periodic sequence, k-error linear complexity
1Orr Dunkelman, Gautham Sekar, Bart Preneel Improved Meet-in-the-Middle Attacks on Reduced-Round DES. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang Transitive Signatures from Braid Groups. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Transitive signature, one-more matching conjugate problem, provable security, random oracle model, braid group
1Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Linear Feed Back Shift Registers, Dynamic Power Dissipation, Side Channel Attacks, Power Analysis, Hamming Distance
1Håkan Englund, Thomas Johansson 0001, Meltem Sönmez Turan A Framework for Chosen IV Statistical Analysis of Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1K. Srinathan, C. Pandu Rangan, Moti Yung (eds.) Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1V. N. Muralidhara, Sandeep Sen A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy cryptosystem, certificate-based encryption (CBE), pairing
1Duo Lei, Chao Li Extended Multi-Property-Preserving and ECM-Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, almost uniform distribution, Hash functions, random oracle, pseudo random function, collision resistance
1Kazuhiko Minematsu, Toshiyasu Matsushima Tweakable Enciphering Schemes from Hash-Sum-Expansion. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HCTR, HCH, Weak Pseudorandom Function, Mode of operation
1Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois First-Order Differential Power Analysis on the Duplication Method. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF zero attack, differential power analysis, spectral analysis, Side-channel analysis
1Pradeep Kumar Mishra, Vassil S. Dimitrov A Graph Theoretic Analysis of Double Base Number Systems. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DBNS-graphs, MB-graphs, Double base number system
1Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
1Daniel J. Bernstein, Peter Birkner, Tanja Lange 0001, Christiane Peters Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Edwards curves, double-base chains, quintupling, scalar multiplication, addition chains, double-base number systems, tripling
1Markku-Juhani Olavi Saarinen Linearization Attacks Against Syndrome Based Hashes. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack
1Frédéric Didier Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low weight multiples, Boolean functions, Stream cipher, autocorrelation, filter generator
1Giovanni Di Crescenzo, Vishal Saraswat Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption
1David Jao, Dimitar Jetchev, Ramarathnam Venkatesan On the Bits of Elliptic Curve Diffie-Hellman Keys. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Muxiang Zhang Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Probabilistic Reliability, Fault Tolerance, Information Theoretic Security
1Wen Ji, Lei Hu New Description of SMS4 by an Embedding overGF(28). Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMS4, ESMS4, XSL algorithm, block cipher, algebraic equation
1K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao Solving Discrete Logarithms from Partial Knowledge of the Key. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Generic Groups, Side Channel Attacks, Discrete Logarithm Problem
1Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Design of a Differential Power Analysis Resistant Masked AES S-Box. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shlomi Dolev, Limor Lahiani, Moti Yung Secret Swarm UnitReactive k-Secret Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile computing, secret sharing
1Gautham Sekar, Souradyuti Paul, Bart Preneel Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng Related-Key Differential-Linear Attacks on Reduced AES-192. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF related-key, differential-linear attack, cryptanalysis, AES
1Hüseyin Hisil, Gary Carter, Ed Dawson New Formulae for Efficient Elliptic Curve Arithmetic. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF efficient point multiplication, DBNS, Elliptic curve, tripling, doubling
1Rana Barua, Sumit Kumar Pandey, Ravi Pankaj Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai Trade-Off Traitor Tracing. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kan Yasuda Multilane HMAC - Security beyond the Birthday Limit. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack
1Johannes Buchmann 0001, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich CMSS - An Improved Merkle Signature Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Java Cryptography Architecture, Post-Quantum Signatures, Tree Authentication, One-Time-Signatures, Merkle Signatures
1Isamu Teranishi, Takuro Oyama, Wakaha Ogata General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Peng Wang 0009, Dengguo Feng, Wenling Wu Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher
1Manuel Barbosa, Pooya Farshim Secure Cryptographic Workflow in the Standard Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption
1Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anonymity, Revocable, Ring Signature, Linkable
1Valery Pryamikov Enciphering with Arbitrary Small Finite Domains. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Block Ciphers, Modes of Operations, Symmetric Encryption, Pseudorandom Permutations
1Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Salsa20, TSC-4, Chosen IV Attack, Stream Cipher, eSTREAM
1Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe Update on Tiger. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Weijia Wang, Lei Hu Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password, key distribution, authenticated key exchange, multi-party protocol
1Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm
1Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure
1James L. Massey Whither Cryptography? Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Arpita Patra, Ashish Choudhary, K. Srinathan, C. Pandu Rangan Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Reliable and Secure Communication, Information Theoretic Security, Communication Efficiency
1Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
1Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Differential and Rectangle Attacks on Reduced-Round SHACAL-1. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHACAL-1, Amplified boomerang attack, Block cipher, Differential cryptanalysis, Rectangle attack
1Ian F. Blake, Aldar C.-F. Chan Conditionally Verifiable Signature. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Boolean Functions, Nonlinearity, Reed-Muller Code, Covering Radius, Walsh Transform, Idempotents, Rotational Symmetry
1Debrup Chakraborty, Palash Sarkar 0001 HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks
1Matthew Darnall, Doug Kuhlman AES Software Implementations on ARM7TDMI. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Christophe Doche, Laurent Imbert Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Elliptic curve cryptography, Double-base number system
1Ryo Nojima, Kazukuni Kobara, Hideki Imai Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
1Antoine Joux, Pascal Delaunay Galois LFSR, Embedded Devices and Side Channel Weaknesses. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Alfred Menezes, Berkant Ustaoglu On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Rana Barua, Tanja Lange 0001 (eds.) Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Palash Sarkar 0001 Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-receiver encryption, bilinear pairing, identity based encryption
1Markku-Juhani Olavi Saarinen Security of VSH in the Real World. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mridul Nandi A Simple and Unified Method of Proving Indistinguishability. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kenneth Koon-Ho Wong, Bernard D. Colbert, Lynn Margaret Batten, Sultan Al-Hinai Algebraic Attacks on Clock-Controlled Cascade Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Neal Koblitz, Alfred Menezes Another Look at "Provable Security". II. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Frédéric Didier Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast algebraic attacks, Wiedemann’s algorithm, algebraic attacks, algebraic immunity
1Subhamoy Maitra, C. E. Veni Madhavan, Ramarathnam Venkatesan (eds.) Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Coglianese, Bok-Min Goi MaTRU: A New NTRU-Based Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF lattice attacks, partial polynomial evaluation, Public key cryptosystems, NTRU, lattice based cryptography
1Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 How to Construct Universal One-Way Hash Functions of Order r. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function
1Frederik Armknecht, Matthias Krause 0001, Dirk Stegemann Design Principles for Combiners with Memory. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF combiners with memory, Bluetooth E0, Stream cipher, algebraic attacks, correlation attacks
1Man Ho Au, Sherman S. M. Chow, Willy Susilo Short E-Cash. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Coin-traceability, Bilinear Pairing, E-cash
1Harald Niederreiter, Li-Ping Wang 0001 Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Word-based stream ciphers, multisequences, joint linear complexity, joint linear complexity profile
1Domingo Gómez, Jaime Gutierrez 0001, Álvar Ibeas Cryptanalysis of the Quadratic Generator. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Akhilesh Tyagi Energy-Privacy Trade-Offs in VLSI Computations. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Chang Han Kim, Yongtae Kim, Nam Su Chang, IlHwan Park Modified Serial Multipliers for Type-IV Gaussian Normal Bases. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF serial multiplier, Finite fields, ECC, Massey-Omura multiplier, Gaussian Normal Basis
1Michael Scott Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tate pairing implementation, pairing-based cryptosystems
1Heiko Stamer Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems
1Fabien Laguillaumie, Damien Vergnaud Short Undeniable Signatures Without Random Oracles: The Missing Link. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jin Hong 0001 Period of Streamcipher Edon80. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Edon80, streamcipher, period
1Souradyuti Paul, Bart Preneel Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Claude Carlet On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1An Braeken, Bart Preneel On the Algebraic Immunity of Symmetric Boolean Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jin Hong 0001, Woo-Hwan Kim TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MICKEY, time memory data tradeoff, internal state entropy, stream cipher, weak key
1Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation
1Håkan Englund, Alexander Maximov Attack the Dragon. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tanja Lange 0001, Pradeep Kumar Mishra SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Pascal Junod, Philippe Oechslin Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, precomputation, Time-memory trade-off
1Christophe Nègre Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF small characteristic, cryptography, Elliptic curve, scalar multiplication
Displaying result #401 - #500 of 669 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license