The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
2002 (conf/pkc/2002)

  1. Kouichi Sakurai, Tsuyoshi Takagi
    New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:1-16 [Conf]
  2. Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen
    Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:17-33 [Conf]
  3. Takeshi Koshiba
    On Sufficient Randomness for Secure Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:34-47 [Conf]
  4. Kaoru Kurosawa
    Multi-recipient Public-Key Encryption with Shortened Ciphertext. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:48-63 [Conf]
  5. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:64-79 [Conf]
  6. Joonsang Baek, Ron Steinfeld, Yuliang Zheng
    Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:80-98 [Conf]
  7. Greg Maitland, Colin Boyd
    A Provably Secure Restrictive Partially Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:99-114 [Conf]
  8. Masayuki Abe, Koutarou Suzuki
    M+1-st Price Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:115-124 [Conf]
  9. Ivan Damgård, Mads Jurik
    Client/Server Tradeoffs for Online Elections. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:125-140 [Conf]
  10. Aggelos Kiayias, Moti Yung
    Self-tallying Elections and Perfect Ballot Secrecy. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:141-158 [Conf]
  11. Wen-Guey Tzeng
    Efficient 1-Out-n Oblivious Transfer Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:159-171 [Conf]
  12. Kaoru Kurosawa, Takuya Yoshida
    Linear Code Implies Public-Key Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:172-187 [Conf]
  13. Chan H. Lee, Xiaotie Deng, Huafei Zhu
    Design and Security Analysis of Anonymous Group Identification Protocols. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:188-198 [Conf]
  14. Michaël Quisquater, Bart Preneel, Joos Vandewalle
    On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:199-210 [Conf]
  15. Nicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier
    Solving Underdefined Systems of Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:211-227 [Conf]
  16. Arjen K. Lenstra, Igor Shparlinski
    Selective Forgery of RSA Signatures with Fixed-Pattern Padding. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:228-236 [Conf]
  17. Kazukuni Kobara, Hideki Imai
    New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:237-251 [Conf]
  18. Roman Novak
    SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:252-262 [Conf]
  19. Werner Schindler
    A Combined Timing and Power Attack. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:263-279 [Conf]
  20. Tetsuya Izu, Tsuyoshi Takagi
    A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:280-296 [Conf]
  21. Bart Preneel
    New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:297-309 [Conf]
  22. Young-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung
    An Improved Method of Multiplication on Certain Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:310-322 [Conf]
  23. Young-Ho Park, Sangtae Jeong, Chang Han Kim, Jongin Lim
    An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:323-334 [Conf]
  24. Eric Brier, Marc Joye
    Weierstraß Elliptic Curves and Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:335-345 [Conf]
  25. Marc Joye, Sung-Ming Yen
    One-Way Cross-Trees and Their Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:346-356 [Conf]
  26. Ari Juels, Jorge Guajardo
    RSA Key Generation with Verifiable Randomness. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:357-374 [Conf]
  27. Marc Joye, Sung-Ming Yen
    New Minimal Modified Radix-r Representation with Applications to Smart Cards. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:375-384 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002