Conferences in DBLP
Kouichi Sakurai , Tsuyoshi Takagi New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:1-16 [Conf ] Jean-Sébastien Coron , Helena Handschuh , Marc Joye , Pascal Paillier , David Pointcheval , Christophe Tymen Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:17-33 [Conf ] Takeshi Koshiba On Sufficient Randomness for Secure Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:34-47 [Conf ] Kaoru Kurosawa Multi-recipient Public-Key Encryption with Shortened Ciphertext. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:48-63 [Conf ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:64-79 [Conf ] Joonsang Baek , Ron Steinfeld , Yuliang Zheng Formal Proofs for the Security of Signcryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:80-98 [Conf ] Greg Maitland , Colin Boyd A Provably Secure Restrictive Partially Blind Signature Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:99-114 [Conf ] Masayuki Abe , Koutarou Suzuki M+1-st Price Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:115-124 [Conf ] Ivan Damgård , Mads Jurik Client/Server Tradeoffs for Online Elections. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:125-140 [Conf ] Aggelos Kiayias , Moti Yung Self-tallying Elections and Perfect Ballot Secrecy. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:141-158 [Conf ] Wen-Guey Tzeng Efficient 1-Out-n Oblivious Transfer Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:159-171 [Conf ] Kaoru Kurosawa , Takuya Yoshida Linear Code Implies Public-Key Traitor Tracing. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:172-187 [Conf ] Chan H. Lee , Xiaotie Deng , Huafei Zhu Design and Security Analysis of Anonymous Group Identification Protocols. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:188-198 [Conf ] Michaël Quisquater , Bart Preneel , Joos Vandewalle On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:199-210 [Conf ] Nicolas Courtois , Louis Goubin , Willi Meier , Jean-Daniel Tacier Solving Underdefined Systems of Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:211-227 [Conf ] Arjen K. Lenstra , Igor Shparlinski Selective Forgery of RSA Signatures with Fixed-Pattern Padding. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:228-236 [Conf ] Kazukuni Kobara , Hideki Imai New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:237-251 [Conf ] Roman Novak SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:252-262 [Conf ] Werner Schindler A Combined Timing and Power Attack. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:263-279 [Conf ] Tetsuya Izu , Tsuyoshi Takagi A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:280-296 [Conf ] Bart Preneel New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:297-309 [Conf ] Young-Ho Park , Sangho Oh , Sangjin Lee , Jongin Lim , Maenghee Sung An Improved Method of Multiplication on Certain Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:310-322 [Conf ] Young-Ho Park , Sangtae Jeong , Chang Han Kim , Jongin Lim An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:323-334 [Conf ] Eric Brier , Marc Joye Weierstraß Elliptic Curves and Side-Channel Attacks. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:335-345 [Conf ] Marc Joye , Sung-Ming Yen One-Way Cross-Trees and Their Applications. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:346-356 [Conf ] Ari Juels , Jorge Guajardo RSA Key Generation with Verifiable Randomness. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:357-374 [Conf ] Marc Joye , Sung-Ming Yen New Minimal Modified Radix-r Representation with Applications to Smart Cards. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:375-384 [Conf ]