Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2001
- Harald Baier:
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. INDOCRYPT 2001: 99-107 - S. S. Bedi, N. Rajesh Pillai:
Cryptanalysis of the Nonlinear FeedForward Generator. INDOCRYPT 2001: 188-194 - Anne Canteaut:
Cryptographic Functions and Design Criteria for Block Ciphers. INDOCRYPT 2001: 1-16 - Sandeepan Chowdhury, Subhamoy Maitra:
Efficient Software Implementation of Linear Feedback Shift Registers. INDOCRYPT 2001: 297-307 - Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica:
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. INDOCRYPT 2001: 108-116 - Josep Domingo-Ferrer:
Mobile Agent Route Protection through Hash-Based Mechanisms. INDOCRYPT 2001: 17-29 - Maria Fedorova, Yuriy V. Tarannikov:
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices. INDOCRYPT 2001: 254-266 - Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah:
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. INDOCRYPT 2001: 50-61 - Kishan Chand Gupta, Subhamoy Maitra:
Multiples of Primitive Polynomials over GF(2). INDOCRYPT 2001: 62-72 - Alexander Kholosha:
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator. INDOCRYPT 2001: 287-296 - Eike Kiltz:
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. INDOCRYPT 2001: 339-350 - Jaemoon Kim, Ikkwon Yie, Seung Ik Oh, Hyung-Don Kim, Jado Ryu:
Fast Generation of Cubic Irreducible Polynomials for XTR. INDOCRYPT 2001: 73-78 - Steve Kremer, Olivier Markowitch:
Selective Receipt in Certified E-mail. INDOCRYPT 2001: 136-148 - Minoru Kuribayashi, Hatsukazu Tanaka:
A New Anonymous Fingerprinting Scheme with High Enciphering Rate. INDOCRYPT 2001: 30-39 - Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma:
Efficient Public Auction with One-Time Registration and Public Verifiability. INDOCRYPT 2001: 162-174 - Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim:
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. INDOCRYPT 2001: 308-315 - Subhamoy Maitra:
Autocorrelation Properties of Correlation Immune Boolean Functions. INDOCRYPT 2001: 242-253 - Subhamoy Maitra, Dipti Prasad Mukherjee:
Spatial Domain Digital Watermarking with Buyer Authentication. INDOCRYPT 2001: 149-161 - Markus Maurer, Alfred Menezes, Edlyn Teske:
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. INDOCRYPT 2001: 195-213 - S. Ali Miri, V. Kumar Murty:
An Application of Sieve Methods to Elliptic Curves. INDOCRYPT 2001: 91-98 - Yi Mu, Vijay Varadharajan:
Robust and Secure Broadcasting. INDOCRYPT 2001: 223-231 - Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji:
Efficient "on the Fly" Signature Schemes Based on Integer Factoring. INDOCRYPT 2001: 275-286 - Josef Pieprzyk, Xian-Mo Zhang:
Cheating Prevention in Secret Sharing over GF(pt). INDOCRYPT 2001: 79-90 - D. Ramesh:
A Twin Algorithm for Efficient Generation of Digital Signatures. INDOCRYPT 2001: 267-274 - Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing:
Linear Authentication Codes: Bounds and Constructions. INDOCRYPT 2001: 127-135 - Gideon Samid:
Re-dividing Complexity between Algorithms and Keys. INDOCRYPT 2001: 330-338 - Palash Sarkar, Paul J. Schellenberg:
A Parallel Algorithm for Extending Cryptographic Hash Functions. INDOCRYPT 2001: 40-49 - Palash Sarkar, Douglas R. Stinson:
Frameproof and IPP Codes. INDOCRYPT 2001: 117-126 - Shujun Li, Xuanqin Mou, Yuanlong Cai:
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. INDOCRYPT 2001: 316-329 - K. Srinathan, C. Pandu Rangan, V. Kamakoti:
Toward Optimal Player Weights in Secure Distributed Protocols. INDOCRYPT 2001: 232-241
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 15:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint