


default search action
INDOCRYPT 2000: Calcutta, India
- Bimal K. Roy, Eiji Okamoto:
Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings. Lecture Notes in Computer Science 1977, Springer 2000, ISBN 3-540-41452-5
Stream Ciphers and Boolean Functions
- Dingyi Pei, Wenliang Qin:
The Correlation of a Boolean Function with Its Variables. 1-8 - Jambunathan K:
On Choice of Connection-Polynominals for LFSR-Based Stream Ciphers. 9-18 - Yuriy V. Tarannikov
:
On Resilient Boolean Functions with Maximal Possible Nonlinearity. 19-30
Cryptanalysis 1: Stream Ciphers
- Eric Filiol
:
Decimation Attack of Stream Ciphers. 31-42 - Eli Biham, Orr Dunkelman
:
Cryptanalysis of the A5/1 GSM Stream Cipher. 43-51
Cryptanalysis 2: Block Ciphers
- Ali Aydin Selçuk:
On Bias Estimation in Linear Cryptanalysis. 52-66 - John O. Pliam:
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks. 67-79 - Eli Biham, Vladimir Furman:
Improved Impossible Differentials on Twofish. 80-92
Electronic Cash & Muliparty Computation
- R. Sai Anand, C. E. Veni Madhavan:
An Online, Transferable E-Cash Payment System. 93-103 - Ik Rae Jeong, Dong Hoon Lee:
Anonymity Control in Multi-bank E-Cash System. 104-116 - K. Srinathan, C. Pandu Rangan:
Efficient Asynchronous Secure Multiparty Distributed Computation. 117-129 - K. Srinathan, C. Pandu Rangan:
Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. 130-142
Digital Signatures
- Jaroslaw Pastuszak, Josef Pieprzyk
, Jennifer Seberry:
Codes Identifying Bad Signature in Batches. 143-154 - Yi Mu, Vijay Varadharajan:
Distributed Signcryption. 155-164 - Reihaneh Safavi-Naini, Willy Susilo
, Huaxiong Wang:
Fail-Stop Signature for Long Messages. 165-177
Elliptic Curves
- Katsuyuki Okeya, Kouichi Sakurai:
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. 178-190 - Johannes Buchmann, Harald Baier:
Efficient Construction of Cryptographically Strong Elliptic Curves. 191-202
Fast Arithmetic
- Julio López, Ricardo Dahab:
High-Speed Software Multiplication in F2m. 203-212 - Arash Reyhani-Masoleh, M. Anwarul Hasan:
On Efficient Normal Basis Multiplication. 213-224
Cryptographic Protocols
- Sanjeev Kumar Mishra, Palash Sarkar:
Symmetrically Private Information Retrieval. 225-236 - Boyeon Song, Kwangjo Kim:
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. 237-249 - Reihaneh Safavi-Naini, Yejing Wang:
Anonymous Traceability Schemes with Unconditional Security. 250-261
Block Ciphers & Public Key Cryptography
- Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee:
New Block Cipher DONUT Using Pairwise Perfect Decorrelation. 262-270 - Dan Boneh, Nagendra Modadugu, Michael Kim:
Generating RSA Keys on a Handheld Using an Untrusted Server. 271-282 - Seongan Lim, Seungjoo Kim
, Ikkwon Yie, Hongsub Lee:
A Generalized Takagi-Cryptosystem with a modulus of the form prqs. 283-294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.