The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "INDOCRYPT"( http://dblp.L3S.de/Venues/INDOCRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/indocrypt

Publication years (Num. hits)
2000 (26) 2001 (33) 2002 (34) 2003 (32) 2004 (33) 2005 (33) 2006 (32) 2007 (34) 2008 (34) 2009 (29) 2010 (25) 2011 (29) 2012 (32) 2013 (22) 2014 (26) 2015 (20) 2016 (24) 2017 (21) 2018 (21) 2019 (29) 2020 (40) 2021 (28) 2022 (32)
Publication types (Num. hits)
inproceedings(646) proceedings(23)
Venues (Conferences, Journals, ...)
INDOCRYPT(669)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 500 occurrences of 277 keywords

Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jens-Matthias Bohli, Jörn Müller-Quade, Stefan Röhrich Fairness and Correctness in Case of a Premature Abort. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hong Wang, Yuqing Zhang, Dengguo Feng Short Threshold Signature Schemes Without Random Oracles. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1V. Kumar Murty Abelian Varieties and Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mototsugu Nishioka Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Thierry P. Berger, Marine Minier Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream cipher, algebraic attack
1Mårten Trolin A Universally Composable Scheme for Electronic Cash. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Duong Viet, Akihiro Yamamura, Hidema Tanaka Anonymous Password-Based Authenticated Key Exchange. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password-based authenticated key exchange, Anonymous group authentication, Oblivious transfer
1Jose Antonio Onieva, Jianying Zhou 0001, Javier López 0001 Attacking an Asynchronous Multi-party Contract Signing Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-party contract signing, security protocol analysis, Secure electronic commerce
1Tanmoy Kanti Das, Jianying Zhou 0001 Cryptanalysis of Barni et al. Watermarking Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Watermark Recovery, Copy Attack, Cryptanalysis, Wavelet Transform
1Mridul Nandi Towards Optimal Double-Length Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sarang Aravamuthan, Sachin Lodha An Optimal Subset Cover for Broadcast Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Audrey Montreuil, Jacques Patarin The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Kapalee Viswanathan (eds.) Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Françoise Levy-dit-Vehel, Ludovic Perret Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Thue Systems, Finitely Presented Groups, Free Partially Commutative Monoids, Homomorphic Mappings, Word Problem, Public Key Cryptanalysis
1Poorvi L. Vora Information Theory and the Security of Binary Data Perturbation. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong Separable Linkable Threshold Ring Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lynn Margaret Batten Algebraic Attacks Over GF(q). Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF stream ciphers, finite fields, Algebraic attacks, annihilator
1Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 On the Security of a Certified E-Mail Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF non-repudiation, fair exchange, certified e-mail
1An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel On Boolean Functions with Generalized Cryptographic Properties. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1David A. McGrew, John Viega The Security and Performance of the Galois/Counter Mode (GCM) of Operation. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Javier Herranz, Germán Sáez Revisiting Fully Distributed Proxy Signature Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim New ID-Based Threshold Signature Scheme from Bilinear Pairings. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-based threshold signature, Bilinear pairings, Key escrow
1Luke McAven, Reihaneh Safavi-Naini, Moti Yung Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee Multiplicative Homomorphic E-Voting. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 2-adic expansion, Stream cipher, Self-synchronizing, Feedback shift register
1Jongsung Kim, Guil Kim, Sangjin Lee 0002, Jongin Lim 0001, Jung Hwan Song Related-Key Attacks on Reduced Rounds of SHACAL-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar A Provably Secure Elliptic Curve Scheme with Fast Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Marcel Fernandez, Miguel Soriano Identification Algorithms for Sequential Traitor Tracing. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Amit Sahai Secure Protocols for Complex Tasks in Complex Environments. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Colin Boyd Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra Results on Algebraic Immunity for Cryptographically Significant Boolean Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Walsh Spectra, Boolean Functions, Nonlinearity, Algebraic Attacks, Annihilators
1H. Gopalkrishna Gadiyar, K. M. Sangeeta Maini, R. Padma Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Laurent Poinsot, Sami Harari Generalized Boolean Bent Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jorge Nakahara Jr. Faster Variants of the MESH Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF byte-oriented block ciphers, smart cards, algebraic attacks, IDEA
1Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi Exact Analysis of Montgomery Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF randomization, elliptic curve cryptosystem, Montgomery multiplication, timing attack
1Thierry P. Berger, Pierre Loidreau Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001 HEAD: Hybrid Encryption with Delegated Decryption Capability. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, delegated decryption, public key encryption
1Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy A New Black and White Visual Cryptographic Scheme for General Access Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF visual secret sharing scheme, visual threshold scheme, general access structure, secret sharing scheme, visual cryptography
1Gildas Avoine, Jean Monnerat, Thomas Peyrin Advances in Alternative Non-adjacent Form Representations. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Shai Halevi EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002 Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CIKS-128, CIKS-128H, Related-Key Differential Attack, Block Cipher, Data-Dependent Operation
1Jorge Nakahara Jr., Daniel Santana de Freitas Cryptanalysis of Ake98. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6
1Xiang Li, Jennifer Seberry Forensic Computing. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
1Hamdi Murat Yildirim Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Selçuk Kavut, Melek D. Yücel Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF bent Boolean functions, Simulated annealing, nonlinearity, autocorrelation, Walsh-Hadamard transforms
1Ventzislav Nikov, Svetla Nikova, Bart Preneel On Multiplicative Linear Secret Sharing Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Souradyuti Paul, Bart Preneel Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague A Password-Based Authenticator: Security Proof and Applications. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF key agreement, password authentication, Key management protocols
1Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim Prime Numbers of Diffie-Hellman Groups for IKE-MODP. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1P. J. Abisha, D. Gnanaraj Thomas, K. G. Subramanian 0001 Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Finitely Presented Groups, Free Partially Commutative Monoids, Thue Systems, Public Key Cryptosystem, Word Problem, Zero Knowledge Protocol
1Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim On the Power of Computational Secret Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computationally bounded players, monotone P, Secret sharing, access structures
1Tetsu Iwata, Kaoru Kurosawa Stronger Security Bounds for OMAC, TMAC, and XCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Supakorn Kungpisdan, Bala Srinivasan 0002, Phu Dung Le Lightweight Mobile Credit-Card Payment Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Electronic commerce and payment, credit-card payment protocol, mobile commerce
1Guido Bertoni, Jorge Guajardo, Gerardo Orlando Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jordi Castellà-Roca, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell Practical Mental Poker Without a TTP Based on Homomorphic Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Françoise Levy-dit-Vehel, Ludovic Perret Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Thomas Johansson 0001, Subhamoy Maitra (eds.) Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Marc Fischlin Progressive Verification: The Case of Message Authentication: (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Cryptanalysis for Block Cipher Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Farzali A. Izadi, V. Kumar Murty Counting Points on an Abelian Variety over a Finite Field. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Harald Niederreiter Linear Complexity and Related Complexity Measures for Sequences. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Rana Barua, Ratna Dutta, Palash Sarkar 0001 Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF group key agreement, ID based cryptography, pairing based cryptography, authenticated key agreement
1Guilin Wang Security Analysis of Several Group Signature Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signature, group signature, forgery
1Tanmoy Kanti Das Cryptanalysis of Block Based Spatial Domain Watermarking Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Kishan Chand Gupta, Palash Sarkar 0001 Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF bilinear form, symplectic matrix, nonlinearity, S-box, bent function, symmetric ciphers, SAC
1Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis On the Construction of Prime Order Elliptic Curves. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Attack on 30-Round SHACAL-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Duncan S. Wong, Agnes Hui Chan, Feng Zhu More Efficient Password Authenticated Key Exchange Based on RSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Javier Herranz, Germán Sáez Forking Lemmas for Ring Signature Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Avishek Adhikari, Somnath Sikdar A New (2, n)-Visual Threshold Scheme for Color Images. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yi Mu 0001, Willy Susilo, Yan-Xia Lin Identity-Based Broadcasting. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001 Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stream cipher, cellular automata, self-synchronization
1William D. Banks, Igor E. Shparlinski A Variant of NTRU with Non-invertible Polynomials. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints
1Jean-Claude Bajard, Laurent Imbert, Christophe Nègre Modular Multiplication in GF(pk) Using Lagrange Representation. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptography, Finite fields, multiplication, fast implementation
1Jong-Phil Yang, Kyung Hyune Rhee The Design and Implementation of Improved Secure Cookies Based on Certificate. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF authentication, web security, cookie, public key certificate
1Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee New Identity Escrow Scheme for Anonymity Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kapali Viswanathan, Ashutosh Saxena Towards Logically and Physically Secure Public-Key Infrastructures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF critical keys, private keys, controlled use, PKI, backup
1Joan Daemen, Vincent Rijmen Security of a Wide Trail Design. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1François Arnault, Thierry P. Berger, Abdelkader Necer A New Class of Stream Ciphers Combining LFSR and FCSR Architectures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF 2-adic expansion, Self-synchronizing stream ciphers, Pseudorandom generators, Feedback shift registers
1S. C. Samuel, D. Gnanaraj Thomas, P. J. Abisha, K. G. Subramanian 0001 Tree Replacement and Public Key Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tree replacement system, Church-Rosser tree replacement system, public key cryptosystem (PKC), word problem
1Byoungcheon Lee, Kwangjo Kim Self-certified Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure
1Yongdong Wu, Di Ma, Changsheng Xu Efficient Object-Based Stream Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle On Unconditionally Secure Distributed Oblivious Transfer. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1K. C. Reddy, Divya Nalla Identity Based Authenticated Group Key Agreement Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing
1Douglas Wikström The Security of a Mix-Center Based on a Semantically Secure Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Sugata Gangopadhyay, Subhamoy Maitra Further Results Related to Generalized Nonlinearity. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Generalized Nonlinearity, Boolean Function, Nonlinearity, Algebraic Approach
1Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang A 2-Secure Code with Efficient Tracing Algorithm. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF frameproof codes, secure codes, secure frameproof codes, traceability codes, fingerprinting codes
1Kenji Imamoto, Kouichi Sakurai A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF receiver's selective protocols, electronic commerce, non-repudiation, certified e-mail
1B. Prabhu, K. Srinathan, C. Pandu Rangan Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Olaf Müller, Michael Nüsken Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya Spending Offline Divisible Coins with Combining Capability. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Offline divisible coins, Combining capability, Combined coin, Overspending prevention, Anonymity, Efficiency
1Guozhen Xiao, Shimin Wei Fast Algorithms for Determining the Linear Complexity of Period Sequences. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptography, fast algorithm, linear complexity, periodic sequence, k-error linear complexity
1John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan Evolving Boolean Functions Satisfying Multiple Criteria. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Heuristic Optimisation, Boolean Functions, Nonlinearity, Autocorrelation, Correlation Immunity
1YoungJu Choie, Jong Won Lee Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Hyperelliptic cryptosystem, Scalar multiplication, Frobenius map
Displaying result #501 - #600 of 669 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license