The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
2008 (conf/pkc/2008)


  1. Total Break of the l-IC Signature Scheme. [Citation Graph (, )][DBLP]


  2. Recovering NTRU Secret Key from Inversion Oracles. [Citation Graph (, )][DBLP]


  3. Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? [Citation Graph (, )][DBLP]


  4. Relations Among Notions of Plaintext Awareness. [Citation Graph (, )][DBLP]


  5. Completely Non-malleable Encryption Revisited. [Citation Graph (, )][DBLP]


  6. Cryptographic Test Correction. [Citation Graph (, )][DBLP]


  7. Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. [Citation Graph (, )][DBLP]


  8. Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. [Citation Graph (, )][DBLP]


  9. Proxy Signatures Secure Against Proxy Key Exposure. [Citation Graph (, )][DBLP]


  10. Lattice-Based Identification Schemes Secure Under Active Attacks. [Citation Graph (, )][DBLP]


  11. Efficient Simultaneous Broadcast. [Citation Graph (, )][DBLP]


  12. SAS-Based Group Authentication and Key Agreement Protocols. [Citation Graph (, )][DBLP]


  13. An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm. [Citation Graph (, )][DBLP]


  14. New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. [Citation Graph (, )][DBLP]


  15. Online-Untransferable Signatures. [Citation Graph (, )][DBLP]


  16. Security of Digital Signature Schemes in Weakened Random Oracle Models. [Citation Graph (, )][DBLP]


  17. A Digital Signature Scheme Based on CVPinfinity. [Citation Graph (, )][DBLP]


  18. An Analysis of the Vector Decomposition Problem. [Citation Graph (, )][DBLP]


  19. A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents. [Citation Graph (, )][DBLP]


  20. Certificateless Encryption Schemes Strongly Secure in the Standard Model. [Citation Graph (, )][DBLP]


  21. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. [Citation Graph (, )][DBLP]


  22. Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002