


default search action
INDOCRYPT 2003: New Delhi, India
- Thomas Johansson, Subhamoy Maitra:

Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2904, Springer 2003, ISBN 3-540-20609-4
Invited Talks
- Harald Niederreiter:

Linear Complexity and Related Complexity Measures for Sequences. 1-17 - Xiang Li

, Jennifer Seberry:
Forensic Computing. 18-35
Stream Cipher
- Palash Sarkar:

Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation. 36-51 - Souradyuti Paul, Bart Preneel:

Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. 52-67
Block Cipher
- Hamdi Murat Yildirim

:
Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA. 68-81 - Jongsung Kim, Seokhie Hong, Jaechul Sung

, Changhoon Lee, Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures. 82-96 - Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee

, Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2. 97-106
Boolean Function
- Kishan Chand Gupta, Palash Sarkar:

Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract). 107-120 - Selçuk Kavut, Melek D. Yücel:

Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria. 121-134
Secret Sharing
- Ventzislav Nikov, Svetla Nikova, Bart Preneel:

On Multiplicative Linear Secret Sharing Schemes. 135-147 - Avishek Adhikari, Somnath Sikdar:

A New (2, n)-Visual Threshold Scheme for Color Images. 148-161 - Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim:

On the Power of Computational Secret Sharing. 162-176
Bilinear Pairing
- Yi Mu, Willy Susilo

, Yan-Xia Lin:
Identity-Based Broadcasting. 177-190 - Fangguo Zhang

, Reihaneh Safavi-Naini, Willy Susilo
:
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. 191-204 - Rana Barua, Ratna Dutta, Palash Sarkar:

Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). 205-217
Public Key
- P. J. Abisha, D. Gnanaraj Thomas, K. G. Subramanian:

Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. 218-227 - Ikkwon Yie, Seongan Lim, Seungjoo Kim

, Dongryeol Kim:
Prime Numbers of Diffie-Hellman Groups for IKE-MODP. 228-234 - Françoise Levy-dit-Vehel, Ludovic Perret:

Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems. 235-251
Signature Scheme
- Guilin Wang:

Security Analysis of Several Group Signature Schemes. 252-265 - Javier Herranz, Germán Sáez:

Forking Lemmas for Ring Signature Schemes. 266-279
Protocol
- Jordi Castellà-Roca

, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell:
Practical Mental Poker Without a TTP Based on Homomorphic Encryption. 280-294 - Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:

Lightweight Mobile Credit-Card Payment Protocol. 295-308
Elliptic Curve & Algebraic Geometry
- Elisavet Konstantinou, Yannis C. Stamatiou

, Christos D. Zaroliagis
:
On the Construction of Prime Order Elliptic Curves. 309-322 - Farzali A. Izadi, V. Kumar Murty:

Counting Points on an Abelian Variety over a Finite Field. 323-333
Implementation & Digital Watermarking
- Katsuyuki Okeya, Dong-Guk Han:

Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. 334-348 - Guido Bertoni

, Jorge Guajardo, Gerardo Orlando:
Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm). 349-362 - Tanmoy Kanti Das:

Cryptanalysis of Block Based Spatial Domain Watermarking Schemes. 363-374
Authentication
- Duncan S. Wong, Agnes Hui Chan, Feng Zhu:

More Efficient Password Authenticated Key Exchange Based on RSA. 375-387 - Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague:

A Password-Based Authenticator: Security Proof and Applications. 388-401 - Tetsu Iwata, Kaoru Kurosawa:

Stronger Security Bounds for OMAC, TMAC, and XCBC. 402-415 - Marc Fischlin:

Progressive Verification: The Case of Message Authentication: (Extended Abstract). 416-429

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














