Conferences in DBLP
Johannes Blömer , Alexander May A Generalized Wiener Attack on RSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:1-13 [Conf ] Jean-Sébastien Coron Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:14-27 [Conf ] Roberto Maria Avanzi , Mathieu Ciet , Francesco Sica Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:28-40 [Conf ] Pradeep Kumar Mishra , Palash Sarkar Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:41-54 [Conf ] Stéphane Flon , Roger Oyono Fast Arithmetic on Jacobians of Picard Curves. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:55-68 [Conf ] Jean Monnerat , Serge Vaudenay Undeniable Signatures Based on Characters: How to Sign with One Bit. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:69-85 [Conf ] Ron Steinfeld , Huaxiong Wang , Josef Pieprzyk Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:86-100 [Conf ] Huafei Zhu Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:101-114 [Conf ] Emmanuel Bresson , Dario Catalano Constant Round Authenticated Group Key Agreement via Distributed Computation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:115-129 [Conf ] Kyu Young Choi , Jung Yeon Hwang , Dong Hoon Lee Efficient ID-based Group Key Agreement with Bilinear Maps. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:130-144 [Conf ] Emmanuel Bresson , Olivier Chevassut , David Pointcheval New Security Results on Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:145-158 [Conf ] Maria Isabel Gonzalez Vasco , Mats Näslund , Igor Shparlinski New Results on the Hardness of Diffie-Hellman Bits. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:159-172 [Conf ] Takeshi Koshiba , Kaoru Kurosawa Short Exponent Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:173-186 [Conf ] Benoît Libert , Jean-Jacques Quisquater Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:187-200 [Conf ] Nicolas Courtois Algebraic Attacks over GF(2k ), Application to HFE Challenge 2 and Sflash-v2. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:201-217 [Conf ] Alexander May Secret Exponent Attacks on RSA-type Schemes with Moduli N= pr q. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:218-230 [Conf ] Reihaneh Safavi-Naini , Luke McAven , Moti Yung General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:231-247 [Conf ] Kaoru Kurosawa , Swee-Huay Heng From Digital Signature to ID-based Identification/Signature. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:248-261 [Conf ] Joonsang Baek , Yuliang Zheng Identity-Based Threshold Decryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:262-276 [Conf ] Fangguo Zhang , Reihaneh Safavi-Naini , Willy Susilo An Efficient Signature Scheme from Bilinear Pairings and Its Applications. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:277-290 [Conf ] Ryotaro Hayashi , Tatsuaki Okamoto , Keisuke Tanaka An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:291-304 [Conf ] Jintai Ding A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:305-318 [Conf ] Jun Furukawa Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:319-332 [Conf ] Brian King A Point Compression Method for Elliptic Curves Defined over GF(2 n). [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:333-345 [Conf ] Toru Akishita , Tsuyoshi Takagi On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:346-359 [Conf ] Rui Zhang 0002 , Goichiro Hanaoka , Junji Shikata , Hideki Imai On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:360-374 [Conf ] Farid F. Elwailly , Craig Gentry , Zulfikar Ramzan QuasiModo: Efficient Certificate Validation and Revocation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:375-388 [Conf ] Satoshi Koga , Kouichi Sakurai A Distributed Online Certificate Status Protocol with a Single Public Key. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:389-401 [Conf ] Vicente Benjumea , Javier Lopez , José A. Montenegro , José M. Troya A First Approach to Provide Anonymity in Attribute Certificates. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:402-415 [Conf ] Igor Shparlinski , Arne Winterhof A Nonuniform Algorithm for the Hidden Number Problem in Subgroups. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:416-424 [Conf ] Andris Ambainis , Markus Jakobsson , Helger Lipmaa Cryptographic Randomized Response Techniques. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:425-438 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapalee Viswanathan A Correct, Private, and Efficient Mix Network. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:439-454 [Conf ]