The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
2007 (conf/pkc/2007)

  1. Xavier Boyen, Brent Waters
    Full-Domain Subgroup Hiding and Constant-Size Group Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:1-15 [Conf]
  2. He Ge, Stephen R. Tate
    A Direct Anonymous Attestation Scheme for Embedded Devices. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:16-30 [Conf]
  3. Marc Fischlin
    Anonymous Signatures Made Easy. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:31-42 [Conf]
  4. Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao
    On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:43-60 [Conf]
  5. Dima Ruinskiy, Adi Shamir, Boaz Tsaban
    Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:61-75 [Conf]
  6. Alex D. Myasnikov, Alexander Ushakov
    Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:76-88 [Conf]
  7. Nicolas Gama, Phong Q. Nguyen
    New Chosen-Ciphertext Attacks on NTRU. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:89-106 [Conf]
  8. Daewan Han, Myung-Hwan Kim, Yongjin Yeom
    Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:107-117 [Conf]
  9. Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
    Optimistic Fair Exchange in a Multi-user Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:118-133 [Conf]
  10. Huafei Zhu, Willy Susilo, Yi Mu
    Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:134-149 [Conf]
  11. Ahto Buldas, Sven Laur
    Knowledge-Binding Commitments with Applications in Time-Stamping. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:150-165 [Conf]
  12. Hovav Shacham, Brent Waters
    Efficient Ring Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:166-180 [Conf]
  13. Eiichiro Fujisaki, Koutarou Suzuki
    Traceable Ring Signature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:181-200 [Conf]
  14. Mihir Bellare, Sarah Shoup
    Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:201-216 [Conf]
  15. Emmanuel Bresson, Dario Catalano, Rosario Gennaro
    Improved On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:217-232 [Conf]
  16. Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner
    High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:233-248 [Conf]
  17. Vivien Dubois, Louis Granboulan, Jacques Stern
    Cryptanalysis of HFE with Internal Perturbation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:249-265 [Conf]
  18. Jintai Ding, Christopher Wolf, Bo-Yin Yang
    l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:266-281 [Conf]
  19. Eike Kiltz
    Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:282-297 [Conf]
  20. Benoît Libert, Jean-Jacques Quisquater, Moti Yung
    Parallel Key-Insulated Public Key Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:298-314 [Conf]
  21. Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
    Multi-bit Cryptosystems Based on Lattice Problems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:315-329 [Conf]
  22. Juan A. Garay, Berry Schoenmakers, José Villegas
    Practical and Secure Solutions for Integer Comparison. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:330-342 [Conf]
  23. Takashi Nishide, Kazuo Ohta
    Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:343-360 [Conf]
  24. Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
    Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:361-376 [Conf]
  25. Jens Groth, Steve Lu
    Verifiable Shuffle of Large Size Ciphertexts. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:377-392 [Conf]
  26. Rafail Ostrovsky, William E. Skeith III
    A Survey of Single-Database Private Information Retrieval: Techniques and Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:393-411 [Conf]
  27. Noboru Kunihiro, Kaoru Kurosawa
    Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:412-425 [Conf]
  28. Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko
    Efficient Pseudorandom Generators Based on the DDH Assumption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:426-441 [Conf]
  29. Jung Hee Cheon, Jeong Hyun Yi
    Fast Batch Verification of Multiple Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:442-457 [Conf]
  30. Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi
    A Closer Look at PKI: Security and Efficiency. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:458-475 [Conf]
  31. Junzuo Lai, Weidong Kou
    Self-Generated-Certificate Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:476-489 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002