


default search action
INDOCRYPT 2001: Chennai, India
- C. Pandu Rangan, Cunsheng Ding:

Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings. Lecture Notes in Computer Science 2247, Springer 2001, ISBN 3-540-43010-5
Invited Lecture
- Anne Canteaut:

Cryptographic Functions and Design Criteria for Block Ciphers. 1-16
Hashing
- Josep Domingo-Ferrer:

Mobile Agent Route Protection through Hash-Based Mechanisms. 17-29 - Minoru Kuribayashi

, Hatsukazu Tanaka:
A New Anonymous Fingerprinting Scheme with High Enciphering Rate. 30-39 - Palash Sarkar, Paul J. Schellenberg:

A Parallel Algorithm for Extending Cryptographic Hash Functions. 40-49 - Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah

:
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. 50-61
Algebraic Schemes
- Kishan Chand Gupta, Subhamoy Maitra:

Multiples of Primitive Polynomials over GF(2). 62-72 - Jaemoon Kim, Ikkwon Yie, Seung Ik Oh, Hyung-Don Kim, Jado Ryu:

Fast Generation of Cubic Irreducible Polynomials for XTR. 73-78 - Josef Pieprzyk

, Xian-Mo Zhang:
Cheating Prevention in Secret Sharing over GF(pt). 79-90
Elliptic Curves
- S. Ali Miri, V. Kumar Murty:

An Application of Sieve Methods to Elliptic Curves. 91-98 - Harald Baier:

Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. 99-107 - Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica

:
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. 108-116
Coding Theory
- Palash Sarkar, Douglas R. Stinson:

Frameproof and IPP Codes. 117-126 - Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing

:
Linear Authentication Codes: Bounds and Constructions. 127-135
Applications - I
- Steve Kremer, Olivier Markowitch:

Selective Receipt in Certified E-mail. 136-148 - Subhamoy Maitra, Dipti Prasad Mukherjee:

Spatial Domain Digital Watermarking with Buyer Authentication. 149-161 - Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma:

Efficient Public Auction with One-Time Registration and Public Verifiability. 162-174 - Kapali Viswanathan, Colin Boyd, Ed Dawson:

An Analysis of Integrity Services in Protocols. 175-187
Cryptanalysis
- S. S. Bedi, N. Rajesh Pillai:

Cryptanalysis of the Nonlinear FeedForward Generator. 188-194 - Markus Maurer, Alfred Menezes, Edlyn Teske:

Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. 195-213 - Amr M. Youssef, Guang Gong:

Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. 214-222
Distributed Cryptography
- Yi Mu, Vijay Varadharajan:

Robust and Secure Broadcasting. 223-231 - K. Srinathan, C. Pandu Rangan, V. Kamakoti:

Toward Optimal Player Weights in Secure Distributed Protocols. 232-241
Boolean Functions
- Subhamoy Maitra:

Autocorrelation Properties of Correlation Immune Boolean Functions. 242-253 - Maria Fedorova

, Yuriy V. Tarannikov
:
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices. 254-266
Digital Signatures
- D. Ramesh:

A Twin Algorithm for Efficient Generation of Digital Signatures. 267-274 - Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji

:
Efficient "on the Fly" Signature Schemes Based on Integer Factoring. 275-286 - Alexander Kholosha:

Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator. 287-296 - Sandeepan Chowdhury, Subhamoy Maitra:

Efficient Software Implementation of Linear Feedback Shift Registers. 297-307 - Seongan Lim, Seungjoo Kim

, Ikkwon Yie, Jaemoon Kim:
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. 308-315
Applications - II
- Shujun Li, Xuanqin Mou, Yuanlong Cai:

Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. 316-329 - Gideon Samid:

Re-dividing Complexity between Algorithms and Keys. 330-338 - Eike Kiltz

:
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. 339-350

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














