


default search action
INDOCRYPT 2000: Calcutta, India
- Bimal K. Roy, Eiji Okamoto:

Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings. Lecture Notes in Computer Science 1977, Springer 2000, ISBN 3-540-41452-5
Stream Ciphers and Boolean Functions
- Dingyi Pei, Wenliang Qin:

The Correlation of a Boolean Function with Its Variables. 1-8 - Jambunathan K:

On Choice of Connection-Polynominals for LFSR-Based Stream Ciphers. 9-18 - Yuriy V. Tarannikov

:
On Resilient Boolean Functions with Maximal Possible Nonlinearity. 19-30
Cryptanalysis 1: Stream Ciphers
- Eric Filiol

:
Decimation Attack of Stream Ciphers. 31-42 - Eli Biham, Orr Dunkelman

:
Cryptanalysis of the A5/1 GSM Stream Cipher. 43-51
Cryptanalysis 2: Block Ciphers
- Ali Aydin Selçuk:

On Bias Estimation in Linear Cryptanalysis. 52-66 - John O. Pliam:

On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. 67-79 - Eli Biham, Vladimir Furman:

Improved Impossible Differentials on Twofish. 80-92
Electronic Cash & Muliparty Computation
- R. Sai Anand, C. E. Veni Madhavan:

An Online, Transferable E-Cash Payment System. 93-103 - Ik Rae Jeong, Dong Hoon Lee:

Anonymity Control in Multi-bank E-Cash System. 104-116 - K. Srinathan, C. Pandu Rangan:

Efficient Asynchronous Secure Multiparty Distributed Computation. 117-129 - K. Srinathan, C. Pandu Rangan:

Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. 130-142
Digital Signatures
- Jaroslaw Pastuszak, Josef Pieprzyk

, Jennifer Seberry:
Codes Identifying Bad Signature in Batches. 143-154 - Yi Mu, Vijay Varadharajan:

Distributed Signcryption. 155-164 - Reihaneh Safavi-Naini, Willy Susilo

, Huaxiong Wang:
Fail-Stop Signature for Long Messages. 165-177
Elliptic Curves
- Katsuyuki Okeya, Kouichi Sakurai:

Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. 178-190 - Johannes Buchmann, Harald Baier:

Efficient Construction of Cryptographically Strong Elliptic Curves. 191-202
Fast Arithmetic
- Julio López, Ricardo Dahab:

High-Speed Software Multiplication in F2m. 203-212 - Arash Reyhani-Masoleh, M. Anwarul Hasan:

On Efficient Normal Basis Multiplication. 213-224
Cryptographic Protocols
- Sanjeev Kumar Mishra, Palash Sarkar:

Symmetrically Private Information Retrieval. 225-236 - Boyeon Song, Kwangjo Kim:

Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. 237-249 - Reihaneh Safavi-Naini, Yejing Wang:

Anonymous Traceability Schemes with Unconditional Security. 250-261
Block Ciphers & Public Key Cryptography
- Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee:

New Block Cipher DONUT Using Pairwise Perfect Decorrelation. 262-270 - Dan Boneh, Nagendra Modadugu, Michael Kim:

Generating RSA Keys on a Handheld Using an Untrusted Server. 271-282 - Seongan Lim, Seungjoo Kim

, Ikkwon Yie, Hongsub Lee:
A Generalized Takagi-Cryptosystem with a modulus of the form prqs. 283-294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














