Conferences in DBLP
Wen-Guey Tzeng A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:1-13 [Conf ] Detlef Hühnlein , Johannes Merkle An Efficient NICE-Schnorr-Type Signature Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:14-27 [Conf ] Jaroslaw Pastuszak , Dariusz Michatek , Josef Pieprzyk , Jennifer Seberry Identification of Bad Signatures in Batches. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:28-45 [Conf ] Jianying Zhou , Robert H. Deng , Feng Bao Some Remarks on a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:46-57 [Conf ] Seigo Arita Gaudry's Variant against Cab Curves. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:58-67 [Conf ] William D. Banks , Daniel Lieman , Igor Shparlinski An Identification Scheme Based on Sparse Polynomials. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:68-74 [Conf ] Chuchang Liu , Maris A. Ozols , Marie Henderson , Anthony Cant A State-Based Model for Certificate Management Systems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:75-92 [Conf ] Reto Kohlas , Ueli M. Maurer Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:93-112 [Conf ] David Pointcheval The Composite Discrete Logarithm and Secure Authentication. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:113-128 [Conf ] David Pointcheval Chosen-Ciphertext Security for Any One-Way Cryptosystem. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:129-146 [Conf ] Guillaume Poupard , Jacques Stern Short Proofs of Knowledge for Factoring. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:147-166 [Conf ] Xiaoyun Wang , Lucas Chi Kwong Hui , K. P. Chow , Wai Wan Tsang , C. F. Chong , H. W. Chan Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:167-177 [Conf ] Sang Uk Shin , Weon Shin , Kyung Hyune Rhee All-or-Nothing Transform and Remotely Keyed Encription Protocols. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:178-195 [Conf ] Wu Wen , Takamichi Saito , Fumio Mizoguchi Security of Public Key Certificate Based Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:196-209 [Conf ] Tetsuya Izu , Jun Kogure , Kazuhiro Yokoyama Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:210-222 [Conf ] Juanma González Nieto , DongGook Park , Colin Boyd , Ed Dawson Key Recovery in Third Generation Wireless Communication Systems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:223-237 [Conf ] Katsuyuki Okeya , Hiroyuki Kurumatani , Kouichi Sakurai Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:238-257 [Conf ] Eric R. Verheul Certificates of Recoverability with Scale Recovery Agent Security. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:258-275 [Conf ] Ernest F. Brickell , David Pointcheval , Serge Vaudenay , Moti Yung Design Validations for Discrete Logarithm Based Signature Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:276-292 [Conf ] Ahto Buldas , Helger Lipmaa , Berry Schoenmakers Optimally Efficient Accountable Time-Stamping. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:293-305 [Conf ] Yair Frankel , Philip D. MacKenzie , Moti Yung "Psyeudorandom Intermixing": A Tool for Shared Cryptography. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:306-325 [Conf ] Adam Young , Moti Yung RSA-Based Auto-recoverable Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:326-341 [Conf ] Irene Gassko , Peter Gemmell , Philip D. MacKenzie Efficient and Fresh Cerification. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:342-353 [Conf ] Ronald Cramer , Ivan Damgård , Philip D. MacKenzie Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:354-373 [Conf ] Philip Bohannon , Markus Jakobsson , Sukamol Srikwan Cryptographic Approaches to Provacy in Forensic DNA Databases. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:373-390 [Conf ] Toro Inoue , Kouichi Sakurai Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:391-404 [Conf ] Chae Hoon Lim , Hyo Sun Hwang Fast Implementation of Elliptic Curve Arithmetic in GF(pn ). [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:405-421 [Conf ] Kazue Sako An Auction Protocol Which Hides Bids of Losers. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:422-432 [Conf ] DongGook Park , Colin Boyd , Sang-Jae Moon Forward Secrecy and Its Application to Future Mobile Communications Security. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:433-445 [Conf ] Arjen K. Lenstra , Eric R. Verheul Selecting Cryptographic Key Sizes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:446-465 [Conf ] Mike Burmester , Yvo Desmedt , Hiroshi Doi , Masahiro Mambo , Eiji Okamoto , Mitsuru Tada , Yuko Yoshifuji A Structured ElGamal-Type Multisignature Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:466-483 [Conf ]