


default search action
INDOCRYPT 2002: Hyderabad, India
- Alfred Menezes, Palash Sarkar:

Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002. Lecture Notes in Computer Science 2551, Springer 2002, ISBN 3-540-00263-4
Invited Talks
- Joan Daemen, Vincent Rijmen:

Security of a Wide Trail Design. 1-11 - Guozhen Xiao, Shimin Wei:

Fast Algorithms for Determining the Linear Complexity of Period Sequences. 12-21
Symmetric Ciphers
- François Arnault, Thierry P. Berger, Abdelkader Necer:

A New Class of Stream Ciphers Combining LFSR and FCSR Architectures. 22-33 - Selçuk Kavut, Melek D. Yücel:

Slide Attack on Spectr-H64. 34-47 - Helger Lipmaa:

On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. 48-61
New Public-Key Schemes
- William D. Banks, Igor E. Shparlinski

:
A Variant of NTRU with Non-invertible Polynomials. 62-70 - S. C. Samuel, D. Gnanaraj Thomas, P. J. Abisha, K. G. Subramanian:

Tree Replacement and Public Key Cryptosystem. 71-78
Foundations
- Olaf Müller, Michael Nüsken:

Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System. 79-92 - B. Prabhu, K. Srinathan, C. Pandu Rangan:

Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. 93-107
Public-Key Infrastructures
- Ravi Mukkamala:

QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). 108-121 - Kapali Viswanathan, Ashutosh Saxena:

Towards Logically and Physically Secure Public-Key Infrastructures. 122-134
Fingerprinting and Watermarking
- Tanmoy Kanti Das, Subhamoy Maitra:

Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. 135-148 - Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang:

A 2-Secure Code with Efficient Tracing Algorithm. 149-162 - Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati:

Reed Solomon Codes for Digital Fingerprinting. 163-175
Public-Key Protocols
- Douglas Wikström:

A Note on the Malleability of the El Gamal Cryptosystem. 176-184 - Mohamed Al-Ibrahim

, Hossein Ghodosi, Josef Pieprzyk
:
Authentication of Concast Communication. 185-198 - Byoungcheon Lee, Kwangjo Kim:

Self-certified Signatures. 199-214 - K. C. Reddy, Divya Nalla:

Identity Based Authenticated Group Key Agreement Protocol. 215-233
Boolean Functions
- Soumen Maity, Thomas Johansson

:
Construction of Cryptographically Important Boolean Functions. 234-245 - John A. Clark, Jeremy L. Jacob, Susan Stepney

, Subhamoy Maitra, William Millan:
Evolving Boolean Functions Satisfying Multiple Criteria. 246-259 - Sugata Gangopadhyay, Subhamoy Maitra:

Further Results Related to Generalized Nonlinearity. 260-274
Efficient and Secure Implementations
- Jean-Claude Bajard, Laurent Imbert, Christophe Nègre:

Modular Multiplication in GF(pk) Using Lagrange Representation. 275-284 - YoungJu Choie, Jong Won Lee:

Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map. 285-295 - Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi:

Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. 296-313
Applications
- Jong-Phil Yang, Kyung Hyune Rhee:

The Design and Implementation of Improved Secure Cookies Based on Certificate. 314-325 - Kenji Imamoto, Kouichi Sakurai:

A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. 326-338 - Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya:

Spending Offline Divisible Coins with Combining Capability. 339-353 - Yongdong Wu, Di Ma

, Changsheng Xu:
Efficient Object-Based Stream Authentication. 354-367
Anonymity
- Douglas Wikström:

The Security of a Mix-Center Based on a Semantically Secure Cryptosystem. 368-381 - Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee:

New Identity Escrow Scheme for Anonymity Authentication. 382-394
Secret Sharing and Oblivious Transfer
- Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:

On Unconditionally Secure Distributed Oblivious Transfer. 395-408 - K. Srinathan, N. Tharani Rajan, C. Pandu Rangan:

Non-perfect Secret Sharing over General Access Structures. 409-421 - Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. 422-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














