Conferences in DBLP
Xavier Boyen , Brent Waters Full-Domain Subgroup Hiding and Constant-Size Group Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:1-15 [Conf ] He Ge , Stephen R. Tate A Direct Anonymous Attestation Scheme for Embedded Devices. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:16-30 [Conf ] Marc Fischlin Anonymous Signatures Made Easy. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:31-42 [Conf ] Guilin Wang , Joonsang Baek , Duncan S. Wong , Feng Bao On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:43-60 [Conf ] Dima Ruinskiy , Adi Shamir , Boaz Tsaban Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:61-75 [Conf ] Alex D. Myasnikov , Alexander Ushakov Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:76-88 [Conf ] Nicolas Gama , Phong Q. Nguyen New Chosen-Ciphertext Attacks on NTRU. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:89-106 [Conf ] Daewan Han , Myung-Hwan Kim , Yongjin Yeom Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:107-117 [Conf ] Yevgeniy Dodis , Pil Joong Lee , Dae Hyun Yum Optimistic Fair Exchange in a Multi-user Setting. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:118-133 [Conf ] Huafei Zhu , Willy Susilo , Yi Mu Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:134-149 [Conf ] Ahto Buldas , Sven Laur Knowledge-Binding Commitments with Applications in Time-Stamping. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:150-165 [Conf ] Hovav Shacham , Brent Waters Efficient Ring Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:166-180 [Conf ] Eiichiro Fujisaki , Koutarou Suzuki Traceable Ring Signature. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:181-200 [Conf ] Mihir Bellare , Sarah Shoup Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:201-216 [Conf ] Emmanuel Bresson , Dario Catalano , Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:217-232 [Conf ] Jintai Ding , Lei Hu , Xuyun Nie , Jianyu Li , John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:233-248 [Conf ] Vivien Dubois , Louis Granboulan , Jacques Stern Cryptanalysis of HFE with Internal Perturbation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:249-265 [Conf ] Jintai Ding , Christopher Wolf , Bo-Yin Yang l -Invertible Cycles for M ultivariate Q uadratic (MQ ) Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:266-281 [Conf ] Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:282-297 [Conf ] Benoît Libert , Jean-Jacques Quisquater , Moti Yung Parallel Key-Insulated Public Key Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:298-314 [Conf ] Akinori Kawachi , Keisuke Tanaka , Keita Xagawa Multi-bit Cryptosystems Based on Lattice Problems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:315-329 [Conf ] Juan A. Garay , Berry Schoenmakers , José Villegas Practical and Secure Solutions for Integer Comparison. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:330-342 [Conf ] Takashi Nishide , Kazuo Ohta Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:343-360 [Conf ] Michel Abdalla , Alexander W. Dent , John Malone-Lee , Gregory Neven , Duong Hieu Phan , Nigel P. Smart Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:361-376 [Conf ] Jens Groth , Steve Lu Verifiable Shuffle of Large Size Ciphertexts. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:377-392 [Conf ] Rafail Ostrovsky , William E. Skeith III A Survey of Single-Database Private Information Retrieval: Techniques and Applications. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:393-411 [Conf ] Noboru Kunihiro , Kaoru Kurosawa Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:412-425 [Conf ] Reza Rezaeian Farashahi , Berry Schoenmakers , Andrey Sidorenko Efficient Pseudorandom Generators Based on the DDH Assumption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:426-441 [Conf ] Jung Hee Cheon , Jeong Hyun Yi Fast Batch Verification of Multiple Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:442-457 [Conf ] Alexandra Boldyreva , Marc Fischlin , Adriana Palacio , Bogdan Warinschi A Closer Look at PKI: Security and Efficiency. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:458-475 [Conf ] Junzuo Lai , Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:476-489 [Conf ]