The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
2004 (conf/pkc/2004)

  1. Johannes Blömer, Alexander May
    A Generalized Wiener Attack on RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:1-13 [Conf]
  2. Jean-Sébastien Coron
    Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:14-27 [Conf]
  3. Roberto Maria Avanzi, Mathieu Ciet, Francesco Sica
    Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:28-40 [Conf]
  4. Pradeep Kumar Mishra, Palash Sarkar
    Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:41-54 [Conf]
  5. Stéphane Flon, Roger Oyono
    Fast Arithmetic on Jacobians of Picard Curves. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:55-68 [Conf]
  6. Jean Monnerat, Serge Vaudenay
    Undeniable Signatures Based on Characters: How to Sign with One Bit. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:69-85 [Conf]
  7. Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
    Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:86-100 [Conf]
  8. Huafei Zhu
    Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:101-114 [Conf]
  9. Emmanuel Bresson, Dario Catalano
    Constant Round Authenticated Group Key Agreement via Distributed Computation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:115-129 [Conf]
  10. Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee
    Efficient ID-based Group Key Agreement with Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:130-144 [Conf]
  11. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    New Security Results on Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:145-158 [Conf]
  12. Maria Isabel Gonzalez Vasco, Mats Näslund, Igor Shparlinski
    New Results on the Hardness of Diffie-Hellman Bits. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:159-172 [Conf]
  13. Takeshi Koshiba, Kaoru Kurosawa
    Short Exponent Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:173-186 [Conf]
  14. Benoît Libert, Jean-Jacques Quisquater
    Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:187-200 [Conf]
  15. Nicolas Courtois
    Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:201-217 [Conf]
  16. Alexander May
    Secret Exponent Attacks on RSA-type Schemes with Moduli N= prq. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:218-230 [Conf]
  17. Reihaneh Safavi-Naini, Luke McAven, Moti Yung
    General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures". [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:231-247 [Conf]
  18. Kaoru Kurosawa, Swee-Huay Heng
    From Digital Signature to ID-based Identification/Signature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:248-261 [Conf]
  19. Joonsang Baek, Yuliang Zheng
    Identity-Based Threshold Decryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:262-276 [Conf]
  20. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
    An Efficient Signature Scheme from Bilinear Pairings and Its Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:277-290 [Conf]
  21. Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
    An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:291-304 [Conf]
  22. Jintai Ding
    A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:305-318 [Conf]
  23. Jun Furukawa
    Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:319-332 [Conf]
  24. Brian King
    A Point Compression Method for Elliptic Curves Defined over GF(2 n). [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:333-345 [Conf]
  25. Toru Akishita, Tsuyoshi Takagi
    On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:346-359 [Conf]
  26. Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:360-374 [Conf]
  27. Farid F. Elwailly, Craig Gentry, Zulfikar Ramzan
    QuasiModo: Efficient Certificate Validation and Revocation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:375-388 [Conf]
  28. Satoshi Koga, Kouichi Sakurai
    A Distributed Online Certificate Status Protocol with a Single Public Key. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:389-401 [Conf]
  29. Vicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya
    A First Approach to Provide Anonymity in Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:402-415 [Conf]
  30. Igor Shparlinski, Arne Winterhof
    A Nonuniform Algorithm for the Hidden Number Problem in Subgroups. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:416-424 [Conf]
  31. Andris Ambainis, Markus Jakobsson, Helger Lipmaa
    Cryptographic Randomized Response Techniques. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:425-438 [Conf]
  32. Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
    A Correct, Private, and Efficient Mix Network. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:439-454 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002