The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
2006 (conf/pkc/2006)

  1. Daniel Bleichenbacher, Alexander May
    New Attacks on RSA with Small Secret CRT-Exponents. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:1-13 [Conf]
  2. Christian Wieschebrink
    An Attack on a Modified Niederreiter Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:14-26 [Conf]
  3. Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern
    Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:27-43 [Conf]
  4. Payman Mohassel, Matthew K. Franklin
    Efficient Polynomial Operations in the Shared-Coefficients Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:44-57 [Conf]
  5. Chris Crutchfield, David Molnar, David Turner, David Wagner
    Generic On-Line/Off-Line Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:58-74 [Conf]
  6. Ivan Damgård, Rune Thorbek
    Linear Integer Secret Sharing and Distributed Exponentiation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:75-90 [Conf]
  7. Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval
    Encoding-Free ElGamal Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:91-104 [Conf]
  8. Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai
    Parallel Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:105-122 [Conf]
  9. Anna Lysyanskaya, Mira Meyerovich
    Provably Secure Steganography with Imperfect Sampling. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:123-139 [Conf]
  10. Ilya Mironov
    Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:140-156 [Conf]
  11. Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
    Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:157-173 [Conf]
  12. An Commeine, Igor Semaev
    An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:174-190 [Conf]
  13. Christophe Doche, Thomas Icart, David R. Kohel
    Efficient Scalar Multiplication by Isogeny Decompositions. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:191-206 [Conf]
  14. Daniel J. Bernstein
    Curve25519: New Diffie-Hellman Speed Records. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:207-228 [Conf]
  15. Dan Boneh, Emily Shen, Brent Waters
    Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:229-240 [Conf]
  16. Sanjit Chatterjee, Palash Sarkar
    Generalization of the Selective-ID Security Model for HIBE Protocols. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:241-256 [Conf]
  17. Craig Gentry, Zulfikar Ramzan
    Identity-Based Aggregate Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:257-273 [Conf]
  18. Eike Kiltz
    On the Limitations of the Spread of an IBE-to-PKE Transformation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:274-289 [Conf]
  19. Jintai Ding, Jason E. Gower
    Inoculating Multivariate Schemes Against Differential Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:290-301 [Conf]
  20. Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov
    Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:302-314 [Conf]
  21. Frédéric Muller, Frédéric Valette
    High-Order Attacks Against the Exponent Splitting Protection. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:315-329 [Conf]
  22. Kaoru Kurosawa, Katja Schmidt-Samoa
    New Online/Offline Signature Schemes Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:330-346 [Conf]
  23. Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
    Anonymous Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:347-363 [Conf]
  24. Kaoru Kurosawa, Swee-Huay Heng
    The Power of Identification Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:364-377 [Conf]
  25. Kristin Lauter, Anton Mityagin
    Security Analysis of KEA Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:378-394 [Conf]
  26. Sylvain Pasini, Serge Vaudenay
    SAS-Based Authenticated Key Agreement. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:395-409 [Conf]
  27. Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
    The Twist-AUgmented Technique for Key Exchange. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:410-426 [Conf]
  28. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Password-Based Group Key Exchange in a Constant Number of Rounds. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:427-442 [Conf]
  29. Cheng-Kang Chu, Wen-Guey Tzeng
    Conditional Oblivious Cast. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:443-457 [Conf]
  30. Payman Mohassel, Matthew K. Franklin
    Efficiency Tradeoffs for Malicious Two-Party Computation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:458-473 [Conf]
  31. Benoît Libert, Jean-Jacques Quisquater
    On Constructing Certificateless Cryptosystems from Identity Based Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:474-490 [Conf]
  32. Tor E. Bjørstad, Alexander W. Dent
    Building Better Signcryption Schemes with Tag-KEMs. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:491-507 [Conf]
  33. Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
    Security-Mediated Certificateless Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:508-524 [Conf]
  34. Isamu Teranishi, Kazue Sako
    k-Times Anonymous Authentication with a Constant Proving Cost. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:525-542 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002