Conferences in DBLP
Daniel Bleichenbacher , Alexander May New Attacks on RSA with Small Secret CRT-Exponents. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:1-13 [Conf ] Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:14-26 [Conf ] Sébastien Kunz-Jacques , Gwenaëlle Martinet , Guillaume Poupard , Jacques Stern Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:27-43 [Conf ] Payman Mohassel , Matthew K. Franklin Efficient Polynomial Operations in the Shared-Coefficients Setting. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:44-57 [Conf ] Chris Crutchfield , David Molnar , David Turner , David Wagner Generic On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:58-74 [Conf ] Ivan Damgård , Rune Thorbek Linear Integer Secret Sharing and Distributed Exponentiation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:75-90 [Conf ] Benoît Chevallier-Mames , Pascal Paillier , David Pointcheval Encoding-Free ElGamal Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:91-104 [Conf ] Goichiro Hanaoka , Yumiko Hanaoka , Hideki Imai Parallel Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:105-122 [Conf ] Anna Lysyanskaya , Mira Meyerovich Provably Secure Steganography with Imperfect Sampling. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:123-139 [Conf ] Ilya Mironov Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:140-156 [Conf ] Ron Steinfeld , Josef Pieprzyk , Huaxiong Wang Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:157-173 [Conf ] An Commeine , Igor Semaev An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:174-190 [Conf ] Christophe Doche , Thomas Icart , David R. Kohel Efficient Scalar Multiplication by Isogeny Decompositions. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:191-206 [Conf ] Daniel J. Bernstein Curve25519: New Diffie-Hellman Speed Records. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:207-228 [Conf ] Dan Boneh , Emily Shen , Brent Waters Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:229-240 [Conf ] Sanjit Chatterjee , Palash Sarkar Generalization of the Selective-ID Security Model for HIBE Protocols. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:241-256 [Conf ] Craig Gentry , Zulfikar Ramzan Identity-Based Aggregate Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:257-273 [Conf ] Eike Kiltz On the Limitations of the Spread of an IBE-to-PKE Transformation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:274-289 [Conf ] Jintai Ding , Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:290-301 [Conf ] Alexei G. Myasnikov , Vladimir Shpilrain , Alexander Ushakov Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:302-314 [Conf ] Frédéric Muller , Frédéric Valette High-Order Attacks Against the Exponent Splitting Protection. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:315-329 [Conf ] Kaoru Kurosawa , Katja Schmidt-Samoa New Online/Offline Signature Schemes Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:330-346 [Conf ] Guomin Yang , Duncan S. Wong , Xiaotie Deng , Huaxiong Wang Anonymous Signature Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:347-363 [Conf ] Kaoru Kurosawa , Swee-Huay Heng The Power of Identification Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:364-377 [Conf ] Kristin Lauter , Anton Mityagin Security Analysis of KEA Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:378-394 [Conf ] Sylvain Pasini , Serge Vaudenay SAS-Based Authenticated Key Agreement. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:395-409 [Conf ] Olivier Chevassut , Pierre-Alain Fouque , Pierrick Gaudry , David Pointcheval The Twist-AUgmented Technique for Key Exchange. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:410-426 [Conf ] Michel Abdalla , Emmanuel Bresson , Olivier Chevassut , David Pointcheval Password-Based Group Key Exchange in a Constant Number of Rounds. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:427-442 [Conf ] Cheng-Kang Chu , Wen-Guey Tzeng Conditional Oblivious Cast. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:443-457 [Conf ] Payman Mohassel , Matthew K. Franklin Efficiency Tradeoffs for Malicious Two-Party Computation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:458-473 [Conf ] Benoît Libert , Jean-Jacques Quisquater On Constructing Certificateless Cryptosystems from Identity Based Encryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:474-490 [Conf ] Tor E. Bjørstad , Alexander W. Dent Building Better Signcryption Schemes with Tag-KEMs. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:491-507 [Conf ] Sherman S. M. Chow , Colin Boyd , Juan Manuel González Nieto Security-Mediated Certificateless Cryptography. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:508-524 [Conf ] Isamu Teranishi , Kazue Sako k -Times Anonymous Authentication with a Constant Proving Cost. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:525-542 [Conf ]