The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
2001 (conf/pkc/2001)

  1. Siguna Müller
    On the Security of Williams Based Public Key Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:1-18 [Conf]
  2. Kazukuni Kobara, Hideki Imai
    Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:19-35 [Conf]
  3. Kaoru Kurosawa, Wakaha Ogata, Toshihiki Matsuo, Shuichi Makishima
    IND-CCA Public Key Schemes Equivalent to Factoring n=pq. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:36-47 [Conf]
  4. Yuliang Zheng
    Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:48-63 [Conf]
  5. Arjen K. Lenstra, Igor Shparlinski
    On the Security of Lenstra's Variant of DSA without Long Inversions. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:64-72 [Conf]
  6. Arjen K. Lenstra, Eric R. Verheul
    Fast Irreducibility and Subgroup Membership Testing in XTR. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:73-86 [Conf]
  7. Takeshi Koshiba
    A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:87-103 [Conf]
  8. Tatsuaki Okamoto, David Pointcheval
    The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:104-118 [Conf]
  9. Ivan Damgård, Mats Jurik
    A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:119-136 [Conf]
  10. Dennis Kügler, Holger Vogt
    Marking: A Privacy Protecting Approach Against Blackmailing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:137-152 [Conf]
  11. Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu
    Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:153-164 [Conf]
  12. Éliane Jaulmes, Antoine Joux
    Cryptanalysis of PKP: A New Approach. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:165-172 [Conf]
  13. Hongjun Wu, Feng Bao, Robert H. Deng
    Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:173-179 [Conf]
  14. Rainer Steinwandt
    Loopholes in Two Public Key Cryptosystems Using the Modular Group. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:180-189 [Conf]
  15. Emmanuel Bresson, Jacques Stern
    Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:190-206 [Conf]
  16. Wen-Guey Tzeng, Zhi-Jia Tzeng
    A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:207-224 [Conf]
  17. Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
    Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:225-239 [Conf]
  18. Yair Frankel, Philip D. MacKenzie, Moti Yung
    Adaptive Security for the Additive-Sharing Based Proactive RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:240-263 [Conf]
  19. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Robust Forward-Secure Signature Schemes with Proactive Security. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:264-276 [Conf]
  20. Yvo Desmedt, Mike Burmester, Jennifer Seberry
    Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:277-286 [Conf]
  21. Adam Young, Moti Yung
    A PVSS as Hard as Discrete Log and Shareholder Separability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:287-299 [Conf]
  22. Pierre-Alain Fouque, Jacques Stern
    One Round Threshold Discrete-Log Key Generation without Private Channels. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:300-316 [Conf]
  23. Masayuki Abe, Fumitaka Hoshino
    Remarks on Mix-Network Based on Permutation Networks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:317-324 [Conf]
  24. Chong Hee Kim, Pil Joong Lee
    New Key Recovery in WAKE Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:325-338 [Conf]
  25. Willi Geiselmann, Harald Lukhaub
    Redundant Representation of Finite Fields. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:339-352 [Conf]
  26. Marc Joye, Christophe Tymen
    Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:353-364 [Conf]
  27. Jorge Guajardo, Rainer Blümel, Uwe Krieger, Christof Paar
    Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:365-382 [Conf]
  28. Markus Jakobsson, Susanne Wetzel
    Secure Server-Aided Signature Generation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:383-401 [Conf]
  29. Arne Ansper, Ahto Buldas, Meelis Roos, Jan Willemson
    Efficient Long-Term Validation of Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:402-415 [Conf]
  30. Nikos K. Moshopoulos, Kiamal Z. Pekmestzi
    A Novel Systolic Architecture for Efficient RSA Implementation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:416-421 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002