Conferences in DBLP
Siguna Müller On the Security of Williams Based Public Key Encryption Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:1-18 [Conf ] Kazukuni Kobara , Hideki Imai Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:19-35 [Conf ] Kaoru Kurosawa , Wakaha Ogata , Toshihiki Matsuo , Shuichi Makishima IND-CCA Public Key Schemes Equivalent to Factoring n=pq. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:36-47 [Conf ] Yuliang Zheng Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:48-63 [Conf ] Arjen K. Lenstra , Igor Shparlinski On the Security of Lenstra's Variant of DSA without Long Inversions. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:64-72 [Conf ] Arjen K. Lenstra , Eric R. Verheul Fast Irreducibility and Subgroup Membership Testing in XTR. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:73-86 [Conf ] Takeshi Koshiba A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:87-103 [Conf ] Tatsuaki Okamoto , David Pointcheval The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:104-118 [Conf ] Ivan Damgård , Mats Jurik A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:119-136 [Conf ] Dennis Kügler , Holger Vogt Marking: A Privacy Protecting Approach Against Blackmailing. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:137-152 [Conf ] Feng Bao , Robert H. Deng , Willi Geiselmann , Claus-Peter Schnorr , Rainer Steinwandt , Hongjun Wu Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:153-164 [Conf ] Éliane Jaulmes , Antoine Joux Cryptanalysis of PKP: A New Approach. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:165-172 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:173-179 [Conf ] Rainer Steinwandt Loopholes in Two Public Key Cryptosystems Using the Modular Group. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:180-189 [Conf ] Emmanuel Bresson , Jacques Stern Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:190-206 [Conf ] Wen-Guey Tzeng , Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:207-224 [Conf ] Hirotaka Komaki , Yuji Watanabe , Goichiro Hanaoka , Hideki Imai Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:225-239 [Conf ] Yair Frankel , Philip D. MacKenzie , Moti Yung Adaptive Security for the Additive-Sharing Based Proactive RSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:240-263 [Conf ] Wen-Guey Tzeng , Zhi-Jia Tzeng Robust Forward-Secure Signature Schemes with Proactive Security. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:264-276 [Conf ] Yvo Desmedt , Mike Burmester , Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:277-286 [Conf ] Adam Young , Moti Yung A PVSS as Hard as Discrete Log and Shareholder Separability. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:287-299 [Conf ] Pierre-Alain Fouque , Jacques Stern One Round Threshold Discrete-Log Key Generation without Private Channels. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:300-316 [Conf ] Masayuki Abe , Fumitaka Hoshino Remarks on Mix-Network Based on Permutation Networks. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:317-324 [Conf ] Chong Hee Kim , Pil Joong Lee New Key Recovery in WAKE Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:325-338 [Conf ] Willi Geiselmann , Harald Lukhaub Redundant Representation of Finite Fields. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:339-352 [Conf ] Marc Joye , Christophe Tymen Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:353-364 [Conf ] Jorge Guajardo , Rainer Blümel , Uwe Krieger , Christof Paar Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:365-382 [Conf ] Markus Jakobsson , Susanne Wetzel Secure Server-Aided Signature Generation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:383-401 [Conf ] Arne Ansper , Ahto Buldas , Meelis Roos , Jan Willemson Efficient Long-Term Validation of Digital Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:402-415 [Conf ] Nikos K. Moshopoulos , Kiamal Z. Pekmestzi A Novel Systolic Architecture for Efficient RSA Implementation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:416-421 [Conf ]