Selected Areas in Cryptography B

26 papers

YearTitle / Authors
2003Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers
Kaisa Nyberg, Howard M. Heys
2002A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function.
Sabine Leveiller, Gilles Zémor, Philippe Guillot, Joseph Boutros
2002A New Version of the Stream Cipher SNOW.
Patrik Ekdahl, Thomas Johansson
2002An Efficient MAC for Short Messages.
Sarvar Patel
2002Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.
Francesco Sica, Mathieu Ciet, Jean-Jacques Quisquater
2002Efficient Identity Based Signature Schemes Based on Pairings.
Florian Hess
2002Encryption-Scheme Security in the Presence of Key-Dependent Messages.
John Black, Phillip Rogaway, Thomas Shrimpton
2002Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.
Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim
2002Guess-and-Determine Attacks on SNOW.
Philip Hawkes, Gregory G. Rose
2002Higher Order Differential Attack of Camellia (II).
Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko
2002Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves.
Dongryeol Kim, Seongan Lim
2002Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive.
Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
2002Markov Truncated Differential Cryptanalysis of Skipjack.
Ben Reichardt, David A. Wagner
2002Modifications of ECDSA.
John Malone-Lee, Nigel P. Smart
2002Multiples of Primitive Polynomials and Their Products over GF(2).
Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu
2002New Results on Unconditionally Secure Distributed Oblivious Transfer.
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson
2002On Propagation Characteristics of Resilient Functions.
Pascale Charpin, Enes Pasalic
2002On Some Attacks on Multi-prime RSA.
M. Jason Hinek, Mo King Low, Edlyn Teske
2002On the Security of CTR + CBC-MAC.
Jakob Jonsson
2002Optimal Extension Fields for XTR.
Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim
2002Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model.
Shoichi Hirose
2002Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.
Soichi Furuya, Kouichi Sakurai
2002Square-like Attacks on Reduced Rounds of IDEA.
Hüseyin Demirci
2002The Group Diffie-Hellman Problems.
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
2002Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).
Paul Camion, Miodrag J. Mihaljevic, Hideki Imai
2002White-Box Cryptography and an AES Implementation.
Stanley Chow, Philip A. Eisen, Harold Johnson, Paul C. van Oorschot