- 2002
- Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk:
Authentication of Concast Communication. INDOCRYPT 2002: 185-198 - François Arnault, Thierry P. Berger, Abdelkader Necer:
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures. INDOCRYPT 2002: 22-33 - Jean-Claude Bajard, Laurent Imbert, Christophe Nègre:
Modular Multiplication in GF(pk) Using Lagrange Representation. INDOCRYPT 2002: 275-284 - William D. Banks, Igor E. Shparlinski:
A Variant of NTRU with Non-invertible Polynomials. INDOCRYPT 2002: 62-70 - Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya:
Spending Offline Divisible Coins with Combining Capability. INDOCRYPT 2002: 339-353 - YoungJu Choie, Jong Won Lee:
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map. INDOCRYPT 2002: 285-295 - John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan:
Evolving Boolean Functions Satisfying Multiple Criteria. INDOCRYPT 2002: 246-259 - Joan Daemen, Vincent Rijmen:
Security of a Wide Trail Design. INDOCRYPT 2002: 1-11 - Tanmoy Kanti Das, Subhamoy Maitra:
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. INDOCRYPT 2002: 135-148 - Sugata Gangopadhyay, Subhamoy Maitra:
Further Results Related to Generalized Nonlinearity. INDOCRYPT 2002: 260-274 - Kenji Imamoto, Kouichi Sakurai:
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. INDOCRYPT 2002: 326-338 - Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi:
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. INDOCRYPT 2002: 296-313 - Selçuk Kavut, Melek D. Yücel:
Slide Attack on Spectr-H64. INDOCRYPT 2002: 34-47 - Byoungcheon Lee, Kwangjo Kim:
Self-certified Signatures. INDOCRYPT 2002: 199-214 - Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee:
New Identity Escrow Scheme for Anonymity Authentication. INDOCRYPT 2002: 382-394 - Helger Lipmaa:
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. INDOCRYPT 2002: 48-61 - Soumen Maity, Thomas Johansson:
Construction of Cryptographically Important Boolean Functions. INDOCRYPT 2002: 234-245 - Ravi Mukkamala:
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). INDOCRYPT 2002: 108-121 - Olaf Müller, Michael Nüsken:
Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System. INDOCRYPT 2002: 79-92 - Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
On Unconditionally Secure Distributed Oblivious Transfer. INDOCRYPT 2002: 395-408 - Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. INDOCRYPT 2002: 422-436 - B. Prabhu, K. Srinathan, C. Pandu Rangan:
Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. INDOCRYPT 2002: 93-107 - K. C. Reddy, Divya Nalla:
Identity Based Authenticated Group Key Agreement Protocol. INDOCRYPT 2002: 215-233 - S. C. Samuel, D. Gnanaraj Thomas, P. J. Abisha, K. G. Subramanian:
Tree Replacement and Public Key Cryptosystem. INDOCRYPT 2002: 71-78 - K. Srinathan, N. Tharani Rajan, C. Pandu Rangan:
Non-perfect Secret Sharing over General Access Structures. INDOCRYPT 2002: 409-421 - Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang:
A 2-Secure Code with Efficient Tracing Algorithm. INDOCRYPT 2002: 149-162 - Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati:
Reed Solomon Codes for Digital Fingerprinting. INDOCRYPT 2002: 163-175 - Kapali Viswanathan, Ashutosh Saxena:
Towards Logically and Physically Secure Public-Key Infrastructures. INDOCRYPT 2002: 122-134 - Douglas Wikström:
A Note on the Malleability of the El Gamal Cryptosystem. INDOCRYPT 2002: 176-184 - Douglas Wikström:
The Security of a Mix-Center Based on a Semantically Secure Cryptosystem. INDOCRYPT 2002: 368-381