The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
2000 (conf/pkc/2000)

  1. Wen-Guey Tzeng
    A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:1-13 [Conf]
  2. Detlef Hühnlein, Johannes Merkle
    An Efficient NICE-Schnorr-Type Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:14-27 [Conf]
  3. Jaroslaw Pastuszak, Dariusz Michatek, Josef Pieprzyk, Jennifer Seberry
    Identification of Bad Signatures in Batches. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:28-45 [Conf]
  4. Jianying Zhou, Robert H. Deng, Feng Bao
    Some Remarks on a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:46-57 [Conf]
  5. Seigo Arita
    Gaudry's Variant against Cab Curves. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:58-67 [Conf]
  6. William D. Banks, Daniel Lieman, Igor Shparlinski
    An Identification Scheme Based on Sparse Polynomials. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:68-74 [Conf]
  7. Chuchang Liu, Maris A. Ozols, Marie Henderson, Anthony Cant
    A State-Based Model for Certificate Management Systems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:75-92 [Conf]
  8. Reto Kohlas, Ueli M. Maurer
    Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:93-112 [Conf]
  9. David Pointcheval
    The Composite Discrete Logarithm and Secure Authentication. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:113-128 [Conf]
  10. David Pointcheval
    Chosen-Ciphertext Security for Any One-Way Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:129-146 [Conf]
  11. Guillaume Poupard, Jacques Stern
    Short Proofs of Knowledge for Factoring. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:147-166 [Conf]
  12. Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan
    Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:167-177 [Conf]
  13. Sang Uk Shin, Weon Shin, Kyung Hyune Rhee
    All-or-Nothing Transform and Remotely Keyed Encription Protocols. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:178-195 [Conf]
  14. Wu Wen, Takamichi Saito, Fumio Mizoguchi
    Security of Public Key Certificate Based Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:196-209 [Conf]
  15. Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
    Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:210-222 [Conf]
  16. Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
    Key Recovery in Third Generation Wireless Communication Systems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:223-237 [Conf]
  17. Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
    Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:238-257 [Conf]
  18. Eric R. Verheul
    Certificates of Recoverability with Scale Recovery Agent Security. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:258-275 [Conf]
  19. Ernest F. Brickell, David Pointcheval, Serge Vaudenay, Moti Yung
    Design Validations for Discrete Logarithm Based Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:276-292 [Conf]
  20. Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
    Optimally Efficient Accountable Time-Stamping. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:293-305 [Conf]
  21. Yair Frankel, Philip D. MacKenzie, Moti Yung
    "Psyeudorandom Intermixing": A Tool for Shared Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:306-325 [Conf]
  22. Adam Young, Moti Yung
    RSA-Based Auto-recoverable Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:326-341 [Conf]
  23. Irene Gassko, Peter Gemmell, Philip D. MacKenzie
    Efficient and Fresh Cerification. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:342-353 [Conf]
  24. Ronald Cramer, Ivan Damgård, Philip D. MacKenzie
    Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:354-373 [Conf]
  25. Philip Bohannon, Markus Jakobsson, Sukamol Srikwan
    Cryptographic Approaches to Provacy in Forensic DNA Databases. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:373-390 [Conf]
  26. Toro Inoue, Kouichi Sakurai
    Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:391-404 [Conf]
  27. Chae Hoon Lim, Hyo Sun Hwang
    Fast Implementation of Elliptic Curve Arithmetic in GF(pn). [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:405-421 [Conf]
  28. Kazue Sako
    An Auction Protocol Which Hides Bids of Losers. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:422-432 [Conf]
  29. DongGook Park, Colin Boyd, Sang-Jae Moon
    Forward Secrecy and Its Application to Future Mobile Communications Security. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:433-445 [Conf]
  30. Arjen K. Lenstra, Eric R. Verheul
    Selecting Cryptographic Key Sizes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:446-465 [Conf]
  31. Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji
    A Structured ElGamal-Type Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:466-483 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002