
Conferences in DBLP
 Yair Frankel, Moti Yung
Distributed Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:113 [Conf]
 JeanFrançois Misarsky
How (not) to Design RSA Signature Schemes. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:1428 [Conf]
 Kiyomichi Araki, Takakazu Satoh, Shinji Miura
Overview of Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:2949 [Conf]
 Jacques Stern
Lattices and Cryptography: An Overview. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:5054 [Conf]
 Feng Bao, Robert H. Deng
A Signcryption Scheme with Signature Directly Verifiable by Public Key. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:5559 [Conf]
 Wenbo Mao
Guaranteed Correct Sharing of Integer Factorization with OffLine Shareholders. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:6071 [Conf]
 Tatsuaki Okamoto, Moti Yung
Lower Bounds on TermBased Divisible Cash Systems. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:7282 [Conf]
 Ilari Lehti, Pekka Nikander
Certifying Trust. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:8398 [Conf]
 Johannes Merkle, Ralph Werchner
On the Security of ServerAided RSA Protocols. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:99116 [Conf]
 Yiannis Tsiounis, Moti Yung
On the Security of ElGamal Based Encryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:117134 [Conf]
 Shouichi Hirose, Susumu Yoshida
An Authenticated DiffieHellman Key Agreement Protocol Secure Against Active Attacks. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:135148 [Conf]
 Shahrokh Saeednia, Reihaneh SafaviNaini
On the Security of Girault`s Identification Scheme. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:149153 [Conf]
 ChinChen Chang, JyhJong Leu, PaiCheng Huang, WeiBin Lee
A Scheme for Obtaining a Message from the Digital Multisignature. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:154163 [Conf]
 Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka
Secure Hyperelliptic Cryptosystems and Their Performances. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:164181 [Conf]
 Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16bit Microcomputer. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:182194 [Conf]
 Jung Hee Cheon, SungMo Park, Sangwoo Park, Daeho Kim
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:195202 [Conf]
 Akihiro Yamamura
PublicKey Cryptosystems Using the Modular Group. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:203216 [Conf]
 Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
A Cellular Automaton Based Fast OneWay Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:217233 [Conf]
 Sang Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee
A New Hash Function Based on MDxFamily and Its Application to MAC. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:234246 [Conf]
 Michael W. David, Kouichi Sakurai
Security Issues for Contactless Smart Cards. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:247252 [Conf]
 Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
Parameters for Secure Elliptic Curve Cryptosystem  Improvements on Schoof's Algorithm. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:253257 [Conf]
 Masahiro Mambo, Hiroki Shizuya
A Note on the Complexity of Breaking OkamotoTanaka IDBased Key Exchange Scheme. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:258262 [Conf]
