![](https://dblp1.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
INDOCRYPT 2001: Chennai, India
- C. Pandu Rangan, Cunsheng Ding:
Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings. Lecture Notes in Computer Science 2247, Springer 2001, ISBN 3-540-43010-5
Invited Lecture
- Anne Canteaut:
Cryptographic Functions and Design Criteria for Block Ciphers. 1-16
Hashing
- Josep Domingo-Ferrer:
Mobile Agent Route Protection through Hash-Based Mechanisms. 17-29 - Minoru Kuribayashi
, Hatsukazu Tanaka:
A New Anonymous Fingerprinting Scheme with High Enciphering Rate. 30-39 - Palash Sarkar, Paul J. Schellenberg:
A Parallel Algorithm for Extending Cryptographic Hash Functions. 40-49 - Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah:
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. 50-61
Algebraic Schemes
- Kishan Chand Gupta, Subhamoy Maitra:
Multiples of Primitive Polynomials over GF(2). 62-72 - Jaemoon Kim, Ikkwon Yie, Seung Ik Oh, Hyung-Don Kim, Jado Ryu:
Fast Generation of Cubic Irreducible Polynomials for XTR. 73-78 - Josef Pieprzyk
, Xian-Mo Zhang:
Cheating Prevention in Secret Sharing over GF(pt). 79-90
Elliptic Curves
- S. Ali Miri, V. Kumar Murty:
An Application of Sieve Methods to Elliptic Curves. 91-98 - Harald Baier:
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography. 99-107 - Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica
:
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. 108-116
Coding Theory
- Palash Sarkar, Douglas R. Stinson:
Frameproof and IPP Codes. 117-126 - Reihaneh Safavi-Naini, Huaxiong Wang, Chaoping Xing:
Linear Authentication Codes: Bounds and Constructions. 127-135
Applications - I
- Steve Kremer, Olivier Markowitch:
Selective Receipt in Certified E-mail. 136-148 - Subhamoy Maitra, Dipti Prasad Mukherjee:
Spatial Domain Digital Watermarking with Buyer Authentication. 149-161 - Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma:
Efficient Public Auction with One-Time Registration and Public Verifiability. 162-174 - Kapali Viswanathan, Colin Boyd, Ed Dawson:
An Analysis of Integrity Services in Protocols. 175-187
Cryptanalysis
- S. S. Bedi, N. Rajesh Pillai:
Cryptanalysis of the Nonlinear FeedForward Generator. 188-194 - Markus Maurer, Alfred Menezes, Edlyn Teske:
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. 195-213 - Amr M. Youssef, Guang Gong:
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. 214-222
Distributed Cryptography
- Yi Mu, Vijay Varadharajan:
Robust and Secure Broadcasting. 223-231 - K. Srinathan, C. Pandu Rangan, V. Kamakoti:
Toward Optimal Player Weights in Secure Distributed Protocols. 232-241
Boolean Functions
- Subhamoy Maitra:
Autocorrelation Properties of Correlation Immune Boolean Functions. 242-253 - Maria Fedorova
, Yuriy V. Tarannikov
:
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices. 254-266
Digital Signatures
- D. Ramesh:
A Twin Algorithm for Efficient Generation of Digital Signatures. 267-274 - Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
:
Efficient "on the Fly" Signature Schemes Based on Integer Factoring. 275-286 - Alexander Kholosha:
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator. 287-296 - Sandeepan Chowdhury, Subhamoy Maitra:
Efficient Software Implementation of Linear Feedback Shift Registers. 297-307 - Seongan Lim, Seungjoo Kim
, Ikkwon Yie, Jaemoon Kim:
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. 308-315
Applications - II
- Shujun Li, Xuanqin Mou, Yuanlong Cai:
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography. 316-329 - Gideon Samid:
Re-dividing Complexity between Algorithms and Keys. 330-338 - Eike Kiltz
:
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. 339-350
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.