- 2007
- François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier:
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. INDOCRYPT 2007: 341-350 - Rana Barua, Sumit Kumar Pandey, Ravi Pankaj:
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. INDOCRYPT 2007: 351-360 - Daniel J. Bernstein, Peter Birkner, Tanja Lange, Christiane Peters:
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication. INDOCRYPT 2007: 167-182 - Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan:
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. INDOCRYPT 2007: 384-392 - Giovanni Di Crescenzo, Vishal Saraswat:
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. INDOCRYPT 2007: 282-296 - Frédéric Didier:
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function. INDOCRYPT 2007: 404-413 - Shlomi Dolev, Limor Lahiani, Moti Yung:
Secret Swarm UnitReactive k-Secret Sharing. INDOCRYPT 2007: 123-137 - Orr Dunkelman, Gautham Sekar, Bart Preneel:
Improved Meet-in-the-Middle Attacks on Reduced-Round DES. INDOCRYPT 2007: 86-100 - Duo Lei, Chao Li:
Extended Multi-Property-Preserving and ECM-Construction. INDOCRYPT 2007: 361-372 - Håkan Englund, Thomas Johansson, Meltem Sönmez Turan:
A Framework for Chosen IV Statistical Analysis of Stream Ciphers. INDOCRYPT 2007: 268-281 - Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois:
First-Order Differential Power Analysis on the Duplication Method. INDOCRYPT 2007: 210-223 - Praveen Gauravaram, Katsuyuki Okeya:
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. INDOCRYPT 2007: 393-403 - K. Gopalakrishnan, Nicolas Thériault, Chui Zhi Yao:
Solving Discrete Logarithms from Partial Knowledge of the Key. INDOCRYPT 2007: 224-237 - Hüseyin Hisil, Gary Carter, Ed Dawson:
New Formulae for Efficient Elliptic Curve Arithmetic. INDOCRYPT 2007: 138-151 - David Jao, Dimitar Jetchev, Ramarathnam Venkatesan:
On the Bits of Elliptic Curve Diffie-Hellman Keys. INDOCRYPT 2007: 33-47 - Wen Ji, Lei Hu:
New Description of SMS4 by an Embedding overGF(28). INDOCRYPT 2007: 238-251 - Ramakanth Kavuluru, Andrew Klapper:
On the k -Operation Linear Complexity of Periodic Sequences. INDOCRYPT 2007: 322-330 - Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Design of a Differential Power Analysis Resistant Masked AES S-Box. INDOCRYPT 2007: 373-383 - Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez:
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. INDOCRYPT 2007: 414-424 - Kazuhiko Minematsu, Toshiyasu Matsushima:
Tweakable Enciphering Schemes from Hash-Sum-Expansion. INDOCRYPT 2007: 252-267 - Pradeep Kumar Mishra, Vassil S. Dimitrov:
A Graph Theoretic Analysis of Double Base Number Systems. INDOCRYPT 2007: 152-166 - V. N. Muralidhara, Sandeep Sen:
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography. INDOCRYPT 2007: 48-57 - Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai:
Trade-Off Traitor Tracing. INDOCRYPT 2007: 331-340 - Markku-Juhani Olavi Saarinen:
Linearization Attacks Against Syndrome Based Hashes. INDOCRYPT 2007: 1-9 - Markku-Juhani Olavi Saarinen:
A Meet-in-the-Middle Collision Attack Against the New FORK-256. INDOCRYPT 2007: 10-17 - Gautham Sekar, Souradyuti Paul, Bart Preneel:
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. INDOCRYPT 2007: 58-72 - Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang:
Proxy Re-signature Schemes Without Random Oracles. INDOCRYPT 2007: 197-209 - Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality. INDOCRYPT 2007: 101-122 - Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang:
Transitive Signatures from Braid Groups. INDOCRYPT 2007: 183-196 - Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311