The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
1998 (conf/pkc/1998)

  1. Yair Frankel, Moti Yung
    Distributed Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:1-13 [Conf]
  2. Jean-François Misarsky
    How (not) to Design RSA Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:14-28 [Conf]
  3. Kiyomichi Araki, Takakazu Satoh, Shinji Miura
    Overview of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:29-49 [Conf]
  4. Jacques Stern
    Lattices and Cryptography: An Overview. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:50-54 [Conf]
  5. Feng Bao, Robert H. Deng
    A Signcryption Scheme with Signature Directly Verifiable by Public Key. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:55-59 [Conf]
  6. Wenbo Mao
    Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:60-71 [Conf]
  7. Tatsuaki Okamoto, Moti Yung
    Lower Bounds on Term-Based Divisible Cash Systems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:72-82 [Conf]
  8. Ilari Lehti, Pekka Nikander
    Certifying Trust. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:83-98 [Conf]
  9. Johannes Merkle, Ralph Werchner
    On the Security of Server-Aided RSA Protocols. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:99-116 [Conf]
  10. Yiannis Tsiounis, Moti Yung
    On the Security of ElGamal Based Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:117-134 [Conf]
  11. Shouichi Hirose, Susumu Yoshida
    An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:135-148 [Conf]
  12. Shahrokh Saeednia, Reihaneh Safavi-Naini
    On the Security of Girault`s Identification Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:149-153 [Conf]
  13. Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee
    A Scheme for Obtaining a Message from the Digital Multisignature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:154-163 [Conf]
  14. Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka
    Secure Hyperelliptic Cryptosystems and Their Performances. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:164-181 [Conf]
  15. Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui
    A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:182-194 [Conf]
  16. Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho Kim
    Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:195-202 [Conf]
  17. Akihiro Yamamura
    Public-Key Cryptosystems Using the Modular Group. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:203-216 [Conf]
  18. Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
    A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:217-233 [Conf]
  19. Sang Uk Shin, Kyung Hyune Rhee, Dae-Hyun Ryu, Sangjin Lee
    A New Hash Function Based on MDx-Family and Its Application to MAC. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:234-246 [Conf]
  20. Michael W. David, Kouichi Sakurai
    Security Issues for Contactless Smart Cards. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:247-252 [Conf]
  21. Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
    Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:253-257 [Conf]
  22. Masahiro Mambo, Hiroki Shizuya
    A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:258-262 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002