Conferences in DBLP
Feng Bao , Robert H. Deng A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:1-11 [Conf ] Chang-Hyi Le , Jong In Lim A New Aspect of Dual Basis for Efficient Field Arithmetic. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:12-28 [Conf ] Jean-Sébastien Coron On the Security of Random Sources. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:29-42 [Conf ] Josep Domingo-Ferrer Anonymous Fingerprinting Based on Committed Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:43-52 [Conf ] Eiichiro Fujisaki , Tatsuaki Okamoto How to Enhance the Security of Public-Key Encryption at Minimum Cost. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:53-68 [Conf ] Chandana Gamage , Jussipekka Leiwo , Yuliang Zheng Encrypted Message Authentication by Firewalls. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:69-81 [Conf ] Satoshi Hada , Toshiaki Tanaka A Relationship between One-Wayness and Correlation Intractability. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:82-96 [Conf ] Hyung-Woo Lee , Tai-Yun Kim Message Recovery Fair Blind Signature. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:97-111 [Conf ] Markus Jakobsson On Quorum Controlled Asymmetric Proxy Re-encryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:112-121 [Conf ] Markus Jakobsson Mini-Cash: A Minimalistic Approach to E-Commerce. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:122-135 [Conf ] Pekka Nikander , Yki Kortesniemi , Jonna Partanen Preserving Privacy in Distributed Delegation with Fast Certificates. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:136-153 [Conf ] Simon Blake-Wilson , Alfred Menezes Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:154-170 [Conf ] Shingo Miyazaki , Ikuko Kuroda , Kouichi Sakurai Toward Fair International Key Escrow. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:171-187 [Conf ] David Naccache , Adi Shamir , Julien P. Stern How to Copyright a Function? [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:188-196 [Conf ] Jean-Sébastien Coron , David Naccache On the Security of RSA Screening. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:197-203 [Conf ] Christophe Coupé , Phong Q. Nguyen , Jacques Stern The Effectiveness of Lattice Attacks Against Low-Exponent RSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:204-218 [Conf ] Pascal Paillier A Trapdoor Permutation Equivalent to Factoring. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:219-222 [Conf ] Pascal Paillier Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:223-234 [Conf ] Pascal Paillier Evaluating Differential Fault Analysis of Unknown Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:235-244 [Conf ] Montse Rubia , Juan Carlos Cruellas , Manuel Medina Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:245-262 [Conf ] Sang Uk Shin , Kyung Hyune Rhee , Jae Woo Yoon Hash Functions and the MAC Using All-or-Nothing Property. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:263-275 [Conf ] Helena Handschuh , Yiannis Tsiounis , Moti Yung Decision Oracles are Equivalent to Matching Oracles. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:276-289 [Conf ] Yuji Watanabe , Hideki Imai Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:290-305 [Conf ] Adam Young , Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:306-314 [Conf ] Jianying Zhou , Kwok-Yan Lam A Secure Pay-per View Scheme for Web-Based Video Service. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:315-326 [Conf ]