Search dblp for Publications

export results for "toc:db/conf/sacrypt/sacrypt2002.bht:"

 download as .bib file

@proceedings{DBLP:conf/sacrypt/2002,
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36492-7},
  doi          = {10.1007/3-540-36492-7},
  isbn         = {3-540-00622-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BlackRS02,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Encryption-Scheme Security in the Presence of Key-Dependent Messages},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_6},
  doi          = {10.1007/3-540-36492-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BlackRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BlundoDSS02,
  author       = {Carlo Blundo and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {New Results on Unconditionally Secure Distributed Oblivious Transfer},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {291--309},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_19},
  doi          = {10.1007/3-540-36492-7\_19},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BlundoDSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BressonCP02,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {The Group Diffie-Hellman Problems},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_21},
  doi          = {10.1007/3-540-36492-7\_21},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BressonCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CamionMI02,
  author       = {Paul Camion and
                  Miodrag J. Mihaljevic and
                  Hideki Imai},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Two Alerts for Design of Certain Stream Ciphers: Trapped {LFSR} and
                  Weak Resilient Function over GF(q)},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {196--213},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_14},
  doi          = {10.1007/3-540-36492-7\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CamionMI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ChangSSLL02,
  author       = {Donghoon Chang and
                  Jaechul Sung and
                  Soo Hak Sung and
                  Sangjin Lee and
                  Jongin Lim},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Full-Round Differential Attack on the Original Version of the Hash
                  Function Proposed at PKC'98},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_12},
  doi          = {10.1007/3-540-36492-7\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ChangSSLL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CharpinP02,
  author       = {Pascale Charpin and
                  Enes Pasalic},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {On Propagation Characteristics of Resilient Functions},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {175--195},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_13},
  doi          = {10.1007/3-540-36492-7\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CharpinP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ChowEJO02,
  author       = {Stanley Chow and
                  Philip A. Eisen and
                  Harold Johnson and
                  Paul C. van Oorschot},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {White-Box Cryptography and an {AES} Implementation},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {250--270},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_17},
  doi          = {10.1007/3-540-36492-7\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ChowEJO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Demirci02,
  author       = {H{\"{u}}seyin Demirci},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Square-like Attacks on Reduced Rounds of {IDEA}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {147--159},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_11},
  doi          = {10.1007/3-540-36492-7\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Demirci02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/EkdahlJ02,
  author       = {Patrik Ekdahl and
                  Thomas Johansson},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {A New Version of the Stream Cipher {SNOW}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {47--61},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_5},
  doi          = {10.1007/3-540-36492-7\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/EkdahlJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FuruyaS02,
  author       = {Soichi Furuya and
                  Kouichi Sakurai},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Single-Path Authenticated-Encryption Scheme Based on Universal Hashing},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {94--109},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_8},
  doi          = {10.1007/3-540-36492-7\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FuruyaS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HanYPKL02,
  author       = {Dong{-}Guk Han and
                  Ki Soon Yoon and
                  Young{-}Ho Park and
                  Chang Han Kim and
                  Jongin Lim},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Optimal Extension Fields for {XTR}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {369--384},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_24},
  doi          = {10.1007/3-540-36492-7\_24},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HanYPKL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HatanoSK02,
  author       = {Yasuo Hatano and
                  Hiroki Sekine and
                  Toshinobu Kaneko},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Higher Order Differential Attack of Camellia {(II)}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_10},
  doi          = {10.1007/3-540-36492-7\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HatanoSK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HawkesR02,
  author       = {Philip Hawkes and
                  Gregory G. Rose},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Guess-and-Determine Attacks on {SNOW}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {37--46},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_4},
  doi          = {10.1007/3-540-36492-7\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HawkesR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Hess02,
  author       = {Florian Hess},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Efficient Identity Based Signature Schemes Based on Pairings},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {310--324},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_20},
  doi          = {10.1007/3-540-36492-7\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Hess02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HinekLT02,
  author       = {M. Jason Hinek and
                  Mo King Low and
                  Edlyn Teske},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {On Some Attacks on Multi-prime {RSA}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {385--404},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_25},
  doi          = {10.1007/3-540-36492-7\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HinekLT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Hirose02,
  author       = {Shoichi Hirose},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions
                  in the Preneel-Govaerts-Vandewalle Model},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {339--352},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_22},
  doi          = {10.1007/3-540-36492-7\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Hirose02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Jonsson02,
  author       = {Jakob Jonsson},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {On the Security of {CTR} + {CBC-MAC}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {76--93},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_7},
  doi          = {10.1007/3-540-36492-7\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Jonsson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KimL02,
  author       = {Dongryeol Kim and
                  Seongan Lim},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {13--20},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_2},
  doi          = {10.1007/3-540-36492-7\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KimL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LeveillerZGB02,
  author       = {Sabine Leveiller and
                  Gilles Z{\'{e}}mor and
                  Philippe Guillot and
                  Joseph Boutros},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {A New Cryptanalytic Attack for PN-generators Filtered by a Boolean
                  Function},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_16},
  doi          = {10.1007/3-540-36492-7\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LeveillerZGB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MaitraGV02,
  author       = {Subhamoy Maitra and
                  Kishan Chand Gupta and
                  Ayineedi Venkateswarlu},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Multiples of Primitive Polynomials and Their Products over {GF(2)}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {214--231},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_15},
  doi          = {10.1007/3-540-36492-7\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MaitraGV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Malone-LeeS02,
  author       = {John Malone{-}Lee and
                  Nigel P. Smart},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Modifications of {ECDSA}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_1},
  doi          = {10.1007/3-540-36492-7\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Malone-LeeS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Patel02,
  author       = {Sarvar Patel},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {An Efficient {MAC} for Short Messages},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {353--368},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_23},
  doi          = {10.1007/3-540-36492-7\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Patel02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PatelRS02,
  author       = {Sarvar Patel and
                  Zulfikar Ramzan and
                  Ganapathy S. Sundaram},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Luby-Rackoff Ciphers: Why {XOR} Is Not So Exclusive},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {271--290},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_18},
  doi          = {10.1007/3-540-36492-7\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PatelRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ReichardtW02,
  author       = {Ben Reichardt and
                  David A. Wagner},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Markov Truncated Differential Cryptanalysis of Skipjack},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {110--128},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_9},
  doi          = {10.1007/3-540-36492-7\_9},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ReichardtW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SicaCQ02,
  author       = {Francesco Sica and
                  Mathieu Ciet and
                  Jean{-}Jacques Quisquater},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient
                  Endomorphisms: Elliptic and Hyperelliptic Curves},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_3},
  doi          = {10.1007/3-540-36492-7\_3},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SicaCQ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}