default search action
Search dblp for Publications
export results for "toc:db/conf/sacrypt/sacrypt2002.bht:"
@proceedings{DBLP:conf/sacrypt/2002, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36492-7}, doi = {10.1007/3-540-36492-7}, isbn = {3-540-00622-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BlackRS02, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Encryption-Scheme Security in the Presence of Key-Dependent Messages}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {62--75}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_6}, doi = {10.1007/3-540-36492-7\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BlackRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BlundoDSS02, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Douglas R. Stinson}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {New Results on Unconditionally Secure Distributed Oblivious Transfer}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {291--309}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_19}, doi = {10.1007/3-540-36492-7\_19}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BlundoDSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BressonCP02, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {The Group Diffie-Hellman Problems}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {325--338}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_21}, doi = {10.1007/3-540-36492-7\_21}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BressonCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CamionMI02, author = {Paul Camion and Miodrag J. Mihaljevic and Hideki Imai}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Two Alerts for Design of Certain Stream Ciphers: Trapped {LFSR} and Weak Resilient Function over GF(q)}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {196--213}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_14}, doi = {10.1007/3-540-36492-7\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CamionMI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ChangSSLL02, author = {Donghoon Chang and Jaechul Sung and Soo Hak Sung and Sangjin Lee and Jongin Lim}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {160--174}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_12}, doi = {10.1007/3-540-36492-7\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ChangSSLL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CharpinP02, author = {Pascale Charpin and Enes Pasalic}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {On Propagation Characteristics of Resilient Functions}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {175--195}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_13}, doi = {10.1007/3-540-36492-7\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CharpinP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ChowEJO02, author = {Stanley Chow and Philip A. Eisen and Harold Johnson and Paul C. van Oorschot}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {White-Box Cryptography and an {AES} Implementation}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {250--270}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_17}, doi = {10.1007/3-540-36492-7\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ChowEJO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Demirci02, author = {H{\"{u}}seyin Demirci}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Square-like Attacks on Reduced Rounds of {IDEA}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {147--159}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_11}, doi = {10.1007/3-540-36492-7\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Demirci02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/EkdahlJ02, author = {Patrik Ekdahl and Thomas Johansson}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {A New Version of the Stream Cipher {SNOW}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {47--61}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_5}, doi = {10.1007/3-540-36492-7\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/EkdahlJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FuruyaS02, author = {Soichi Furuya and Kouichi Sakurai}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Single-Path Authenticated-Encryption Scheme Based on Universal Hashing}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {94--109}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_8}, doi = {10.1007/3-540-36492-7\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/FuruyaS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HanYPKL02, author = {Dong{-}Guk Han and Ki Soon Yoon and Young{-}Ho Park and Chang Han Kim and Jongin Lim}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Optimal Extension Fields for {XTR}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {369--384}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_24}, doi = {10.1007/3-540-36492-7\_24}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/HanYPKL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HatanoSK02, author = {Yasuo Hatano and Hiroki Sekine and Toshinobu Kaneko}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Higher Order Differential Attack of Camellia {(II)}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {129--146}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_10}, doi = {10.1007/3-540-36492-7\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HatanoSK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HawkesR02, author = {Philip Hawkes and Gregory G. Rose}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Guess-and-Determine Attacks on {SNOW}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {37--46}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_4}, doi = {10.1007/3-540-36492-7\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HawkesR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Hess02, author = {Florian Hess}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Efficient Identity Based Signature Schemes Based on Pairings}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {310--324}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_20}, doi = {10.1007/3-540-36492-7\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Hess02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HinekLT02, author = {M. Jason Hinek and Mo King Low and Edlyn Teske}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {On Some Attacks on Multi-prime {RSA}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {385--404}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_25}, doi = {10.1007/3-540-36492-7\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HinekLT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Hirose02, author = {Shoichi Hirose}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {339--352}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_22}, doi = {10.1007/3-540-36492-7\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Hirose02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Jonsson02, author = {Jakob Jonsson}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {On the Security of {CTR} + {CBC-MAC}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {76--93}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_7}, doi = {10.1007/3-540-36492-7\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Jonsson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KimL02, author = {Dongryeol Kim and Seongan Lim}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {13--20}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_2}, doi = {10.1007/3-540-36492-7\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KimL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LeveillerZGB02, author = {Sabine Leveiller and Gilles Z{\'{e}}mor and Philippe Guillot and Joseph Boutros}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {232--249}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_16}, doi = {10.1007/3-540-36492-7\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LeveillerZGB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MaitraGV02, author = {Subhamoy Maitra and Kishan Chand Gupta and Ayineedi Venkateswarlu}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Multiples of Primitive Polynomials and Their Products over {GF(2)}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {214--231}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_15}, doi = {10.1007/3-540-36492-7\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MaitraGV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Malone-LeeS02, author = {John Malone{-}Lee and Nigel P. Smart}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Modifications of {ECDSA}}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {1--12}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_1}, doi = {10.1007/3-540-36492-7\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Malone-LeeS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Patel02, author = {Sarvar Patel}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {An Efficient {MAC} for Short Messages}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {353--368}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_23}, doi = {10.1007/3-540-36492-7\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Patel02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PatelRS02, author = {Sarvar Patel and Zulfikar Ramzan and Ganapathy S. Sundaram}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Luby-Rackoff Ciphers: Why {XOR} Is Not So Exclusive}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {271--290}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_18}, doi = {10.1007/3-540-36492-7\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PatelRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ReichardtW02, author = {Ben Reichardt and David A. Wagner}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Markov Truncated Differential Cryptanalysis of Skipjack}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {110--128}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_9}, doi = {10.1007/3-540-36492-7\_9}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ReichardtW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SicaCQ02, author = {Francesco Sica and Mathieu Ciet and Jean{-}Jacques Quisquater}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {21--36}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_3}, doi = {10.1007/3-540-36492-7\_3}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SicaCQ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.