


default search action
INDOCRYPT 2004: Chennai, India
- Anne Canteaut, Kapalee Viswanathan:

Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings. Lecture Notes in Computer Science 3348, Springer 2004, ISBN 3-540-24130-2
Invited Talks
- Colin Boyd:

Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. 1-13 - Amit Sahai:

Secure Protocols for Complex Tasks in Complex Environments. 14-16
Cryptographic Protocols
- Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto:

Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. 17-32 - Audrey Montreuil, Jacques Patarin:

The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations. 33-47
Applications
- Guilin Wang, Feng Bao, Jianying Zhou:

On the Security of a Certified E-Mail Scheme. 48-60 - Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:

Multiplicative Homomorphic E-Voting. 61-72
Stream Ciphers
- Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:

Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. 73-83 - Lynn Margaret Batten:

Algebraic Attacks Over GF(q). 84-91
Cryptographic Boolean Functions
- Deepak Kumar Dalai

, Kishan Chand Gupta, Subhamoy Maitra:
Results on Algebraic Immunity for Cryptographically Significant Boolean Functions. 92-106 - Laurent Poinsot, Sami Harari:

Generalized Boolean Bent Functions. 107-119 - An Braeken

, Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Boolean Functions with Generalized Cryptographic Properties. 120-135
Foundations
- Poorvi L. Vora:

Information Theory and the Security of Binary Data Perturbation. 136-147 - Luke McAven, Reihaneh Safavi-Naini, Moti Yung:

Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. 148-161
Block Ciphers
- Jorge Nakahara Jr.:

Faster Variants of the MESH Block Ciphers. 162-174 - Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song:

Related-Key Attacks on Reduced Rounds of SHACAL-2. 175-190 - Youngdai Ko, Changhoon Lee

, Seokhie Hong, Jaechul Sung
, Sangjin Lee:
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. 191-205 - Jorge Nakahara Jr., Daniel Santana de Freitas:

Cryptanalysis of Ake98. 206-217
Public Key Encryption
- Thierry P. Berger, Pierre Loidreau:

Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes. 218-229 - Palash Sarkar:

HEAD: Hybrid Encryption with Delegated Decryption Capability. 230-244 - David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar

:
A Provably Secure Elliptic Curve Scheme with Fast Encryption. 245-259
Efficient Representations
- Gildas Avoine, Jean Monnerat, Thomas Peyrin:

Advances in Alternative Non-adjacent Form Representations. 260-274
Public Key Cryptanalysis
- Françoise Levy-dit-Vehel, Ludovic Perret:

Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. 275-289 - Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi:

Exact Analysis of Montgomery Multiplication. 290-304 - H. Gopalkrishna Gadiyar, K. M. Sangeeta Maini, R. Padma:

Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem. 305-314
Modes of Operation
- Shai Halevi:

EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data. 315-327 - Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung

, Sangjin Lee, Soo Hak Sung:
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. 328-342 - David A. McGrew, John Viega:

The Security and Performance of the Galois/Counter Mode (GCM) of Operation. 343-355
Signatures
- Javier Herranz, Germán Sáez:

Revisiting Fully Distributed Proxy Signature Schemes. 356-370 - Xiaofeng Chen, Fangguo Zhang

, Divyan M. Konidala, Kwangjo Kim:
New ID-Based Threshold Signature Scheme from Bilinear Pairings. 371-383 - Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:

Separable Linkable Threshold Ring Signatures. 384-398
Traitor Tracing and Visual Cryptography
- Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy:

A New Black and White Visual Cryptographic Scheme for General Access Structures. 399-413 - Marcel Fernandez, Miguel Soriano:

Identification Algorithms for Sequential Traitor Tracing. 414-430

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














