The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
1999 (conf/pkc/1999)

  1. Feng Bao, Robert H. Deng
    A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:1-11 [Conf]
  2. Chang-Hyi Le, Jong In Lim
    A New Aspect of Dual Basis for Efficient Field Arithmetic. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:12-28 [Conf]
  3. Jean-Sébastien Coron
    On the Security of Random Sources. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:29-42 [Conf]
  4. Josep Domingo-Ferrer
    Anonymous Fingerprinting Based on Committed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:43-52 [Conf]
  5. Eiichiro Fujisaki, Tatsuaki Okamoto
    How to Enhance the Security of Public-Key Encryption at Minimum Cost. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:53-68 [Conf]
  6. Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
    Encrypted Message Authentication by Firewalls. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:69-81 [Conf]
  7. Satoshi Hada, Toshiaki Tanaka
    A Relationship between One-Wayness and Correlation Intractability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:82-96 [Conf]
  8. Hyung-Woo Lee, Tai-Yun Kim
    Message Recovery Fair Blind Signature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:97-111 [Conf]
  9. Markus Jakobsson
    On Quorum Controlled Asymmetric Proxy Re-encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:112-121 [Conf]
  10. Markus Jakobsson
    Mini-Cash: A Minimalistic Approach to E-Commerce. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:122-135 [Conf]
  11. Pekka Nikander, Yki Kortesniemi, Jonna Partanen
    Preserving Privacy in Distributed Delegation with Fast Certificates. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:136-153 [Conf]
  12. Simon Blake-Wilson, Alfred Menezes
    Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:154-170 [Conf]
  13. Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai
    Toward Fair International Key Escrow. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:171-187 [Conf]
  14. David Naccache, Adi Shamir, Julien P. Stern
    How to Copyright a Function? [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:188-196 [Conf]
  15. Jean-Sébastien Coron, David Naccache
    On the Security of RSA Screening. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:197-203 [Conf]
  16. Christophe Coupé, Phong Q. Nguyen, Jacques Stern
    The Effectiveness of Lattice Attacks Against Low-Exponent RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:204-218 [Conf]
  17. Pascal Paillier
    A Trapdoor Permutation Equivalent to Factoring. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:219-222 [Conf]
  18. Pascal Paillier
    Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:223-234 [Conf]
  19. Pascal Paillier
    Evaluating Differential Fault Analysis of Unknown Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:235-244 [Conf]
  20. Montse Rubia, Juan Carlos Cruellas, Manuel Medina
    Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:245-262 [Conf]
  21. Sang Uk Shin, Kyung Hyune Rhee, Jae Woo Yoon
    Hash Functions and the MAC Using All-or-Nothing Property. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:263-275 [Conf]
  22. Helena Handschuh, Yiannis Tsiounis, Moti Yung
    Decision Oracles are Equivalent to Matching Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:276-289 [Conf]
  23. Yuji Watanabe, Hideki Imai
    Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:290-305 [Conf]
  24. Adam Young, Moti Yung
    Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:306-314 [Conf]
  25. Jianying Zhou, Kwok-Yan Lam
    A Secure Pay-per View Scheme for Web-Based Video Service. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:315-326 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002