×

Found 94 Documents (Results 1–94)

Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA. (English) Zbl 1382.94117

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 350-369 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential power analysis in Hamming weight model: how to choose among (extended) affine equivalent S-boxes. (English) Zbl 1337.94069

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 360-373 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A differential fault attack on MICKEY 2.0. (English) Zbl 1353.94033

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 215-232 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A chosen IV related key attack on Grain-128a. (English) Zbl 1285.94042

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 13-26 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

New results on generalization of Roos-type biases and related keystreams of RC4. (English) Zbl 1312.94076

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 222-239 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A differential fault attack on the grain family under reasonable assumptions. (English) Zbl 1295.94014

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 191-208 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A differential fault attack on Grain-128a using macs. (English) Zbl 1312.94031

Bogdanov, Andrey (ed.) et al., Security, privacy, and applied cryptography engineering. Second international conference, SPACE 2012, Chennai, India, November 3–4, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34415-2/pbk). Lecture Notes in Computer Science 7644, 111-125 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Some results on related key-IV pairs of grain. (English) Zbl 1312.94030

Bogdanov, Andrey (ed.) et al., Security, privacy, and applied cryptography engineering. Second international conference, SPACE 2012, Chennai, India, November 3–4, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34415-2/pbk). Lecture Notes in Computer Science 7644, 94-110 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Side channel attack to actual cryptanalysis: breaking CRT-RSA with low weight decryption exponents. (English) Zbl 1294.94074

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 476-493 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A differential fault attack on the grain family of stream ciphers. (English) Zbl 1295.94013

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 122-139 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Proof of empirical RC4 biases and new key correlations. (English) Zbl 1292.94070

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 151-168 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the evolution of GGHN cipher. (English) Zbl 1291.94055

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 181-195 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A theoretical analysis of the structure of HC-128. (English) Zbl 1344.94070

Iwata, Tetsu (ed.) et al., Advances in information and computer security. 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25140-5/pbk). Lecture Notes in Computer Science 7038, 161-177 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attack on broadcast RC4 revisited. (English) Zbl 1282.94055

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 199-217 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

One byte per clock: a novel RC4 hardware. (English) Zbl 1295.68111

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 347-363 (2010).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Partial key exposure attack on RSA – improvements for limited lattice dimensions. (English) Zbl 1294.94075

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 2-16 (2010).
MSC:  94A60 94A62 11Y05
PDFBibTeX XMLCite
Full Text: DOI

Nega-Hadamard transform, bent and negabent functions. (English) Zbl 1233.94023

Carlet, Claude (ed.) et al., Sequences and their applications – SETA 2010. 6th international conference, Paris, France, September 13–17, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15873-5/pbk). Lecture Notes in Computer Science 6338, 359-372 (2010).
MSC:  94A60 06E30
PDFBibTeX XMLCite
Full Text: DOI

Factoring RSA modulus using prime reconstruction from random known bits. (English) Zbl 1284.94092

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 82-99 (2010).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Efficient CRT-RSA decryption for small encryption exponents. (English) Zbl 1272.94050

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 26-40 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling. (English) Zbl 1273.94338

Bras-Amorós, Maria (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 18th international symposium, AAECC-18, Tarragona, Sapin, June 8–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02180-0/pbk). Lecture Notes in Computer Science 5527, 137-148 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved partial key exposure attacks on RSA by guessing a few bits of one of the prime factors. (English) Zbl 1360.94331

Lee, Pil Joong (ed.) et al., Information security and cryptology – ICISC 2008. 11th international conference, Seoul, Korea, December 3–5, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-00729-3/pbk). Lecture Notes in Computer Science 5461, 37-51 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Boolean functions on odd number of variables having nonlinearity greater than the bent concatenation bound. (English) Zbl 1163.06003

Preneel, Bart (ed.) et al., Boolean functions in cryptology and information security. Selected papers based on the presentations at the NATO-Russia Advanced Study Institute on Boolean functions in cryptology and information security, Zvenigorod, Russia, September 8–18, 2007. Amsterdam: IOS Press (ISBN 978-1-58603-878-6/hbk). NATO Science for Peace and Security Series D: Information and Communication Security 18, 173-182 (2008).
MSC:  06E30 94A60
PDFBibTeX XMLCite
Full Text: DOI

A new class of weak encryption exponents in RSA. (English) Zbl 1203.94116

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 337-349 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of RC4 and proposal of additional layers for better security margin. (English) Zbl 1203.94115

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 27-39 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Revisiting Wiener’s attack – new weak keys in RSA. (English) Zbl 1181.94102

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 228-243 (2008).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

New form of permutation bias and secret key leakage in keystream bytes of RC4. (English) Zbl 1154.68404

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 253-269 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Recovering RC4 permutation from 2048 keystream bytes if \(j\) is stuck. (English) Zbl 1285.94080

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 306-320 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Construction of rotation symmetric Boolean functions on odd number of variables with maximum algebraic immunity. (English) Zbl 1193.94063

Boztaş, Serdar (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 17th international symposium, AAECC-17, Bangalore, India, December 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77223-1/pbk). Lecture Notes in Computer Science 4851, 271-280 (2007).
MSC:  94A60 06E30
PDFBibTeX XMLCite
Full Text: DOI

On non-randomness of the permutation after RC4 key scheduling. (English) Zbl 1195.94068

Boztaş, Serdar (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 17th international symposium, AAECC-17, Bangalore, India, December 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77223-1/pbk). Lecture Notes in Computer Science 4851, 100-109 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Permutation after RC4 key scheduling reveals the secret key. (English) Zbl 1154.94427

Adams, Carlisle (ed.) et al., Selected areas in cryptography. 14th international workshop, SAC 2007, Ottawa, Canada, August 16–17, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77359-7/pbk). Lecture Notes in Computer Science 4876, 360-377 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Reducing the number of homogeneous linear equations in finding annihilators. (English) Zbl 1152.94415

Gong, Guang (ed.) et al., Sequences and their applications – SETA 2006. 4th international conference, Beijing, China, September 24–28, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-44523-4/pbk). Lecture Notes in Computer Science 4086, 376-390 (2006).
MSC:  94A60 06E30 68W30
PDFBibTeX XMLCite
Full Text: DOI

Enumeration of 9-variable rotation symmetric Boolean functions having nonlinearity \(> 240\). (English) Zbl 1175.94085

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 266-279 (2006).
MSC:  94A60 06E30 94B75
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. (English) Zbl 1131.94004

Lecture Notes in Computer Science 3797. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). xiv, 416 p. (2005).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. (English) Zbl 1127.68374

Zhou, Jianying (ed.) et al., Information security. 8th international conference, ISC 2005, Singapore, September 20–23, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29001-X/pbk). Lecture Notes in Computer Science 3650, 89-103 (2005).
MSC:  68P25 94A62 05B05
PDFBibTeX XMLCite
Full Text: DOI

Cryptographically significant Boolean functions: Construction and analysis in terms of algebraic immunity. (English) Zbl 1140.94334

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 98-111 (2005).
MSC:  94A60 06E30
PDFBibTeX XMLCite
Full Text: DOI

Results on rotation symmetric bent and correlation immune Boolean functions. (English) Zbl 1079.68562

Roy, Bimal (ed.) et al., Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5–7, 2004. Revised papers. Berlin: Springer (ISBN 3-540-22171-9/pbk). Lecture Notes in Computer Science 3017, 161-177 (2004).
MSC:  94D10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Minimum distance between bent and 1-resilient Boolean functions. (English) Zbl 1079.68553

Roy, Bimal (ed.) et al., Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5–7, 2004. Revised papers. Berlin: Springer (ISBN 3-540-22171-9/pbk). Lecture Notes in Computer Science 3017, 143-160 (2004).
PDFBibTeX XMLCite
Full Text: DOI

Results on algebraic immunity for cryptographically significant Boolean functions. (English) Zbl 1115.94007

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 92-106 (2004).
MSC:  94A60 06E30
PDFBibTeX XMLCite
Full Text: DOI

Efficient software implementation of LFSR and Boolean function and its application in nonlinear combiner model. (English) Zbl 1131.94309

Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 387-402 (2003).
MSC:  94A55 94A60
PDFBibTeX XMLCite
Full Text: DOI

Rotation symmetric Boolean functions – count and cryptographic properties. (English) Zbl 1190.94050

Ray Chaudhuri, D. K. (ed.) et al., Extended abstracts from the R. C. Bose centenary symposium on discrete mathematics and applications, Kolkata, India, December 20–23, 2002. Amsterdam: Elsevier. Electronic Notes in Discrete Mathematics 15, 139-145 (2003).
MSC:  94C10 94A60 68P25 68R05
PDFBibTeX XMLCite
Full Text: DOI

Patterson-Wiedemann construction revisited. (English) Zbl 1259.94086

Ray Chaudhuri, D. K. (ed.) et al., Extended abstracts from the R. C. Bose centenary symposium on discrete mathematics and applications, Kolkata, India, December 20–23, 2002. Amsterdam: Elsevier. Electronic Notes in Discrete Mathematics 15, 85-90 (2003).
MSC:  94C10 06E30 11T71
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. (English) Zbl 1029.00080

Lecture Notes in Computer Science. 2904. Berlin: Springer. xi, 421 p. (2003).
MSC:  00B25 94-06 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Multiples of primitive polynomials and their products over GF(2). (English) Zbl 1066.94547

Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15–16, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00622-2/pbk). Lect. Notes Comput. Sci. 2595, 214-231 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Further results on multiples of primitive polynomials and their products over GF\((2)\). (English) Zbl 1023.94539

Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 231-242 (2002).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: Link

Further constructions of resilient Boolean functions with very high nonlinearity. (English) Zbl 1043.94551

Helleseth, Tor (ed.) et al., Sequences and their applications. Proceedings of the 2nd international conference (SETA’01), Bergen, Norway, May 13–17, 2001. London: Springer (ISBN 1-85233-529-7). Discrete Mathematics and Theoretical Computer Science, 265-280 (2002).
MSC:  94C10 06E30 94A55
PDFBibTeX XMLCite

Further results related to generalized nonlinearity. (English) Zbl 1033.94524

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 260-274 (2002).
MSC:  94A60 06E30 11T71
PDFBibTeX XMLCite
Full Text: Link

Evolving Boolean functions satisfying multiple criteria. (English) Zbl 1033.94516

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 246-259 (2002).
MSC:  94A60 06E30
PDFBibTeX XMLCite
Full Text: Link

Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. (English) Zbl 1033.94520

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 135-148 (2002).
MSC:  94A60 65T50 68P25
PDFBibTeX XMLCite
Full Text: Link

Linear codes in constructing resilient functions with high nonlinearity. (English) Zbl 1067.94556

Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 60-74 (2001).
PDFBibTeX XMLCite
Full Text: Link

Primitive polynomials over GF(2) – a cryptologic approach. (English) Zbl 1050.94524

Qing, Sihan (ed.) et al., Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13–16, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42880-1). Lect. Notes Comput. Sci. 2229, 23-34 (2001).
MSC:  94A60 11T71 11T06
PDFBibTeX XMLCite
Full Text: Link

Efficient implementation of “large” stream cipher systems. (English) Zbl 1012.94540

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 319-332 (2001).
MSC:  94A55 68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Efficient software implementation of linear feedback shift registers. (English) Zbl 1011.94541

Rangan, C. Pandu (ed.) et al., Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16-20, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2247, 297-307 (2001).
MSC:  94A55 94A60 68W01
PDFBibTeX XMLCite

Spatial domain digital watermarking with buyer authentication. (English) Zbl 1011.94563

Rangan, C. Pandu (ed.) et al., Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16-20, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2247, 149-161 (2001).
MSC:  94A62
PDFBibTeX XMLCite

New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity. (English) Zbl 0987.94521

Augot, Daniel (ed.) et al., WCC2001 international workshop on coding and cryptography. Paris, France, January 8-12, 2001. Amsterdam: Elsevier, Electron. Notes Discrete Math. 6, no pag., electronic only (2001).
MSC:  94D10 94A60
PDFBibTeX XMLCite

Construction of nonlinear Boolean functions with important cryptographic properties. (English) Zbl 1082.94529

Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 485-506 (2000).
MSC:  94A60 06E30
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software