6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Boolean Functions > 470-482
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Cryptanalysis I > 1-13
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Cryptanalysis I > 14-29
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Cryptanalysis I > 30-43
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Cryptanalysis I > 44-57
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Cryptanalysis I > 58-71
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Cryptanalysis II > 483-488
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Cryptanalysis II > 489-502
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Digital Signatures > 73-89
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Digital Signatures > 90-96
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Digital Signatures > 97-115
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Digital Signatures > 116-129
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Digital Signatures > 130-142
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Fingerprinting > 401-414
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Fingerprinting > 415-428
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > IACR Distinguished Lecture > 72-72
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Invited Lecture > 399-400
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Number Theoretic Algorithms > 220-233
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Number Theoretic Algorithms > 234-247
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Number Theoretic Algorithms > 248-258