Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,392,738 papers from all fields of science
Search
Sign In
Create Free Account
Indocrypt
Known as:
International Conference on Cryptology in India
Indocrypt (also INDOCRYPT) is an annual international cryptography conference held each December since 2000 in India. The conference proceedings are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Cryptography
Cryptology Research Society of India
Differential equations of addition
Jennifer Seberry
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Isogeny graphs with maximal real multiplication
S. Ionica
,
Emmanuel Thomé
IACR Cryptology ePrint Archive
2014
Corpus ID: 14861446
2013
2013
Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff
B. Kim
,
Jin Hong
Australasian Conference on Information Security…
2013
Corpus ID: 2447059
Time memory tradeoff algorithms are tools for inverting one-way functions, and they are often used to recover passwords from…
Expand
Highly Cited
2007
Highly Cited
2007
Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings
K. Srinathan
,
C. Rangan
,
M. Yung
International Conference on Cryptology in India
2007
Corpus ID: 21543149
Thank you for reading progress in cryptology indocrypt 2004 5th international conference on cryptology in india chennai india…
Expand
2006
2006
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
María Isabel González Vasco
,
R. Steinwandt
Applied Mathematics Letters
2006
Corpus ID: 5959806
Review
2006
Review
2006
Short 2-Move Undeniable Signatures
Jean Monnerat
,
S. Vaudenay
International Conference on Cryptology in Vietnam
2006
Corpus ID: 10219018
Attempting to reach a minimal number of moves in cryptographic protocols is a quite classical issue. Besides the theoretical…
Expand
2005
2005
On the Security of a Certified E-Mail Scheme with Temporal Authentication
Min-Hua Shao
,
Jianying Zhou
,
Guilin Wang
Communication Systems and Applications
2005
Corpus ID: 17370273
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if…
Expand
Review
2003
Review
2003
Progress in Cryptology - INDOCRYPT 2003
T. Johansson
Lecture Notes in Computer Science
2003
Corpus ID: 11542746
We present a survey of recent work on the linear complexity, the linear complexity profile, and the k-error linear complexity of…
Expand
Review
2002
Review
2002
Progress in Cryptology — INDOCRYPT 2002
A. Menezes
,
P. Sarkar
Lecture Notes in Computer Science
2002
Corpus ID: 13362644
The wide trail design strategy claims to design ciphers that are both efficient and secure against linear and differential…
Expand
2001
2001
Progress in Cryptology — INDOCRYPT 2001
C. Rangan
,
C. Ding
Lecture Notes in Computer Science
2001
Corpus ID: 19950186
Function Secret Sharing (FSS) and Homomorphic Secret Sharing (HSS) are two extensions of standard secret sharing, which support…
Expand
Highly Cited
1991
Highly Cited
1991
Plasma Loops in the Solar Corona
R. Bray
,
L. Cram
,
C. J. Durrant
,
R. Loughhead
1991
Corpus ID: 117505236
1. Historical introduction 2. Cool loops: observed properties 3. Hot loops: observed properties 4. Flare loops: observed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE