default search action
INDOCRYPT 2003: New Delhi, India
- Thomas Johansson, Subhamoy Maitra:
Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings. Lecture Notes in Computer Science 2904, Springer 2003, ISBN 3-540-20609-4
Invited Talks
- Harald Niederreiter:
Linear Complexity and Related Complexity Measures for Sequences. 1-17 - Xiang Li, Jennifer Seberry:
Forensic Computing. 18-35
Stream Cipher
- Palash Sarkar:
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation. 36-51 - Souradyuti Paul, Bart Preneel:
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. 52-67
Block Cipher
- Hamdi Murat Yildirim:
Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA. 68-81 - Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures. 82-96 - Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2. 97-106
Boolean Function
- Kishan Chand Gupta, Palash Sarkar:
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract). 107-120 - Selçuk Kavut, Melek D. Yücel:
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria. 121-134
Secret Sharing
- Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Multiplicative Linear Secret Sharing Schemes. 135-147 - Avishek Adhikari, Somnath Sikdar:
A New (2, n)-Visual Threshold Scheme for Color Images. 148-161 - Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim:
On the Power of Computational Secret Sharing. 162-176
Bilinear Pairing
- Yi Mu, Willy Susilo, Yan-Xia Lin:
Identity-Based Broadcasting. 177-190 - Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo:
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings. 191-204 - Rana Barua, Ratna Dutta, Palash Sarkar:
Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). 205-217
Public Key
- P. J. Abisha, D. Gnanaraj Thomas, K. G. Subramanian:
Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. 218-227 - Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim:
Prime Numbers of Diffie-Hellman Groups for IKE-MODP. 228-234 - Françoise Levy-dit-Vehel, Ludovic Perret:
Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems. 235-251
Signature Scheme
- Guilin Wang:
Security Analysis of Several Group Signature Schemes. 252-265 - Javier Herranz, Germán Sáez:
Forking Lemmas for Ring Signature Schemes. 266-279
Protocol
- Jordi Castellà-Roca, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell:
Practical Mental Poker Without a TTP Based on Homomorphic Encryption. 280-294 - Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le:
Lightweight Mobile Credit-Card Payment Protocol. 295-308
Elliptic Curve & Algebraic Geometry
- Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis:
On the Construction of Prime Order Elliptic Curves. 309-322 - Farzali A. Izadi, V. Kumar Murty:
Counting Points on an Abelian Variety over a Finite Field. 323-333
Implementation & Digital Watermarking
- Katsuyuki Okeya, Dong-Guk Han:
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. 334-348 - Guido Bertoni, Jorge Guajardo, Gerardo Orlando:
Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm). 349-362 - Tanmoy Kanti Das:
Cryptanalysis of Block Based Spatial Domain Watermarking Schemes. 363-374
Authentication
- Duncan S. Wong, Agnes Hui Chan, Feng Zhu:
More Efficient Password Authenticated Key Exchange Based on RSA. 375-387 - Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague:
A Password-Based Authenticator: Security Proof and Applications. 388-401 - Tetsu Iwata, Kaoru Kurosawa:
Stronger Security Bounds for OMAC, TMAC, and XCBC. 402-415 - Marc Fischlin:
Progressive Verification: The Case of Message Authentication: (Extended Abstract). 416-429
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.