|
Conferences in DBLP
- Yair Frankel, Moti Yung
Distributed Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:1-13 [Conf]
- Jean-François Misarsky
How (not) to Design RSA Signature Schemes. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:14-28 [Conf]
- Kiyomichi Araki, Takakazu Satoh, Shinji Miura
Overview of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:29-49 [Conf]
- Jacques Stern
Lattices and Cryptography: An Overview. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:50-54 [Conf]
- Feng Bao, Robert H. Deng
A Signcryption Scheme with Signature Directly Verifiable by Public Key. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:55-59 [Conf]
- Wenbo Mao
Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:60-71 [Conf]
- Tatsuaki Okamoto, Moti Yung
Lower Bounds on Term-Based Divisible Cash Systems. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:72-82 [Conf]
- Ilari Lehti, Pekka Nikander
Certifying Trust. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:83-98 [Conf]
- Johannes Merkle, Ralph Werchner
On the Security of Server-Aided RSA Protocols. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:99-116 [Conf]
- Yiannis Tsiounis, Moti Yung
On the Security of ElGamal Based Encryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:117-134 [Conf]
- Shouichi Hirose, Susumu Yoshida
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:135-148 [Conf]
- Shahrokh Saeednia, Reihaneh Safavi-Naini
On the Security of Girault`s Identification Scheme. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:149-153 [Conf]
- Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee
A Scheme for Obtaining a Message from the Digital Multisignature. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:154-163 [Conf]
- Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka
Secure Hyperelliptic Cryptosystems and Their Performances. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:164-181 [Conf]
- Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:182-194 [Conf]
- Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho Kim
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:195-202 [Conf]
- Akihiro Yamamura
Public-Key Cryptosystems Using the Modular Group. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:203-216 [Conf]
- Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:217-233 [Conf]
- Sang Uk Shin, Kyung Hyune Rhee, Dae-Hyun Ryu, Sangjin Lee
A New Hash Function Based on MDx-Family and Its Application to MAC. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:234-246 [Conf]
- Michael W. David, Kouichi Sakurai
Security Issues for Contactless Smart Cards. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:247-252 [Conf]
- Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:253-257 [Conf]
- Masahiro Mambo, Hiroki Shizuya
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:258-262 [Conf]
|