The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "INDOCRYPT"( http://dblp.L3S.de/Venues/INDOCRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/indocrypt

Publication years (Num. hits)
2000 (26) 2001 (33) 2002 (34) 2003 (32) 2004 (33) 2005 (33) 2006 (32) 2007 (34) 2008 (34) 2009 (29) 2010 (25) 2011 (29) 2012 (32) 2013 (22) 2014 (26) 2015 (20) 2016 (24) 2017 (21) 2018 (21) 2019 (29) 2020 (40) 2021 (28) 2022 (32)
Publication types (Num. hits)
inproceedings(646) proceedings(23)
Venues (Conferences, Journals, ...)
INDOCRYPT(669)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 500 occurrences of 277 keywords

Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk Authentication of Concast Communication. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Soumen Maity, Thomas Johansson 0001 Construction of Cryptographically Important Boolean Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Perfectly nonlinear function, Boolean function, Stream cipher, Resiliency, Nonlinearity, Combinatorial problems, Balancedness, Correlation immunity, Bent function, Algebraic degree
1Douglas Wikström A Note on the Malleability of the El Gamal Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Alfred Menezes, Palash Sarkar 0001 (eds.) Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1K. Srinathan, N. Tharani Rajan, C. Pandu Rangan Non-perfect Secret Sharing over General Access Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF non-threshold secret sharing, non-perfect secret sharing
1Tanmoy Kanti Das, Subhamoy Maitra Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptanalysis, Discrete Cosine Transform, Digital Watermarking, Subset Sum
1Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati Reed Solomon Codes for Digital Fingerprinting. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ravi Mukkamala QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Selçuk Kavut, Melek D. Yücel Slide Attack on Spectr-H64. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Avalanche Weight Distribution (AWD), Slide attack, Spectr-H64
1Helger Lipmaa On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF differential probability, Pseudo-Hadamard Transform, Twofish, linear functions
1Kishan Chand Gupta, Subhamoy Maitra Multiples of Primitive Polynomials over GF(2). Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Galois Field, Primitive Polynomials, Polynomial Multiples
1Harald Baier Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptography, elliptic curve, complex multiplication, Optimal Extension Field
1Palash Sarkar 0001, Paul J. Schellenberg A Parallel Algorithm for Extending Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Merkle-Damgard construction, parallel algorithm, cryptographic hash function, collision resistance
1Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Secret Sharing over GF(pt). Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing
1Alexander Kholosha Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF key-stream generator, clock-controlled shift register, Geffe generator, cryptography
1Anne Canteaut Cryptographic Functions and Design Criteria for Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Weil descent, fast performance, Finite fields, elliptic curve cryptography
1Shujun Li, Xuanqin Mou, Yuanlong Cai Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Dipti Prasad Mukherjee Spatial Domain Digital Watermarking with Buyer Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Buyer Key, Image Key, Error Correcting Code, Digital Watermarking
1Subhamoy Maitra Autocorrelation Properties of Correlation Immune Boolean Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Global Avalanche Characteristics, Boolean Function, Resiliency, Autocorrelation, Correlation Immunity
1Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma Efficient Public Auction with One-Time Registration and Public Verifiability. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF public auction, English auction, one-time registration, signature of knowledge, anonymous signature scheme, anonymity, hash chain, public verifiability
1S. Ali Miri, V. Kumar Murty An Application of Sieve Methods to Elliptic Curves. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1C. Pandu Rangan, Cunsheng Ding (eds.) Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Kapali Viswanathan, Colin Boyd, Ed Dawson An Analysis of Integrity Services in Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF representation of cryptologic goals, integrity, Confidentiality
1Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing Linear Authentication Codes: Bounds and Constructions. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Linear Authentication Codes, Distributed Authentication Codes, Authentication Codes
1Sandeepan Chowdhury, Subhamoy Maitra Efficient Software Implementation of Linear Feedback Shift Registers. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Block Oriented LFSR, Connection Polynomials, Stream Cipher
1S. S. Bedi, N. Rajesh Pillai Cryptanalysis of the Nonlinear FeedForward Generator. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Yi Mu 0001, Vijay Varadharajan Robust and Secure Broadcasting. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001, Douglas R. Stinson Frameproof and IPP Codes. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Amr M. Youssef, Guang Gong Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Imai and Matsumoto asymmetric cryptosystems, cryptanalysis, Public-key cryptosystems
1Jaemoon Kim, Ikkwon Yie, Seung Ik Oh, Hyung-Don Kim, Jado Ryu Fast Generation of Cubic Irreducible Polynomials for XTR. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Gideon Samid Re-dividing Complexity between Algorithms and Keys. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji Efficient "on the Fly" Signature Schemes Based on Integer Factoring. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Maria Fedorova, Yuriy V. Tarannikov On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF nonlinear combining function, special matrices, Boolean function, stream cipher, resiliency, nonlinearity, correlation-immunity
1Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Incremental Cryptography, Cryptography, Hash Function
1Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Trace Projection, LFSR, digital signature scheme, XTR
1Steve Kremer, Olivier Markowitch Selective Receipt in Certified E-mail. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Markus Maurer, Alfred Menezes, Edlyn Teske Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1K. Srinathan, C. Pandu Rangan, V. Kamakoti 0001 Toward Optimal Player Weights in Secure Distributed Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Eike Kiltz A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Josep Domingo-Ferrer Mobile Agent Route Protection through Hash-Based Mechanisms. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF agent route protection, Mobile agent security, Merkle trees, hash collisions
1D. Ramesh A Twin Algorithm for Efficient Generation of Digital Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF personnel identification, interlocking equations, Cryptography, digital signature, data authentication
1Minoru Kuribayashi, Hatsukazu Tanaka A New Anonymous Fingerprinting Scheme with High Enciphering Rate. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Sanjeev Kumar Mishra, Palash Sarkar 0001 Symmetrically Private Information Retrieval. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Private Information retrieval (PIR), Symmetrically Private Information Retrieval (SPIR), Quadratic Residuacity Assumption (QRA), Cryptographic Protocols, Probabilistic Encryption
1Yi Mu 0001, Vijay Varadharajan Distributed Signcryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Public-key Cryptography, Signcryption
1Jaroslaw Pastuszak, Josef Pieprzyk, Jennifer Seberry Codes Identifying Bad Signature in Batches. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Identification Codes, Digital Signatures, Batch Verification
1K. Srinathan, C. Pandu Rangan Efficient Asynchronous Secure Multiparty Distributed Computation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ik Rae Jeong, Dong Hoon Lee 0001 Anonymity Control in Multi-bank E-Cash System. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1K. Srinathan, C. Pandu Rangan Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Boyeon Song, Kwangjo Kim Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang Fail-Stop Signature for Long Messages. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Kouichi Sakurai Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Montgomery-form, Scalar Multiplication Algorithm, Elliptic Curve Cryptosystem, Power Analysis, Timing Attack, Efficient Implementation
1Eli Biham, Vladimir Furman Improved Impossible Differentials on Twofish. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Twofish, cryptanalysis, impossible differential
1Yuriy V. Tarannikov On Resilient Boolean Functions with Maximal Possible Nonlinearity. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF nonlinear combining function, Siegenthaler's Inequality, Boolean function, Stream cipher, resiliency, nonlinearity, hardware implementation, pseudorandom generator, correlation-immunity, algebraic degree
1Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee A Generalized Takagi-Cryptosystem with a modulus of the form prqs. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Arash Reyhani-Masoleh, M. Anwarul Hasan On Efficient Normal Basis Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Eli Biham, Orr Dunkelman Cryptanalysis of the A5/1 GSM Stream Cipher. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ali Aydin Selçuk On Bias Estimation in Linear Cryptanalysis. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Julio César López-Hernández, Ricardo Dahab High-Speed Software Multiplication in F2m. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Multiplication in $ bbbf_{2^m}$, Elliptic Curve Cryptography, Polynomial Basis
1Reihaneh Safavi-Naini, Yejing Wang Anonymous Traceability Schemes with Unconditional Security. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF traceability schemes, anonymity, unlinkability, authentication codes, Digital fingerprint
1R. Sai Anand, C. E. Veni Madhavan An Online, Transferable E-Cash Payment System. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Double Spending, Anonymity, Fairness, Transferability, E-cash
1Bimal K. Roy, Eiji Okamoto (eds.) Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Eric Filiol Decimation Attack of Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF sequence decimation, multiple clocking, Stream cipher, linear feedback shift register, correlation attack, fast correlation attack
1Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee New Block Cipher DONUT Using Pairwise Perfect Decorrelation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation
1John O. Pliam On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Harald Baier Efficient Construction of Cryptographically Strong Elliptic Curves. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF class field theory, factoring polynomials, cryptography, finite field, elliptic curve, complex multiplication
1Dingyi Pei, Wenliang Qin The Correlation of a Boolean Function with Its Variables. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Boolean function, stream cipher, correlation, Walsh transformation
1Dan Boneh, Nagendra Modadugu, Michael Kim Generating RSA Keys on a Handheld Using an Untrusted Server. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jambunathan K On Choice of Connection-Polynominals for LFSR-Based Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #669 of 669 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license