The SCEAS System
Navigation Menu

Conferences in DBLP

Public Key Cryptography (PKC) (pkc)
2003 (conf/pkc/2003)

  1. Yevgeniy Dodis
    Efficient Construction of (Distributed) Verifiable Random Functions. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:1-17 [Conf]
  2. Jae Choon Cha, Jung Hee Cheon
    An Identity-Based Signature from Gap Diffie-Hellman Groups. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:18-30 [Conf]
  3. Alexandra Boldyreva
    Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:31-46 [Conf]
  4. Philip D. MacKenzie
    An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:47-61 [Conf]
  5. Mats Näslund, Igor Shparlinski, William Whyte
    On the Bit Security of NTRUEncrypt. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:62-70 [Conf]
  6. Yodai Watanabe, Junji Shikata, Hideki Imai
    Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:71-84 [Conf]
  7. Mihir Bellare, Alexandra Boldyreva, Jessica Staddon
    Randomness Re-use in Multi-recipient Encryption Schemeas. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:85-99 [Conf]
  8. Yevgeniy Dodis, Nelly Fazio
    Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:100-115 [Conf]
  9. Marc Fischlin
    The Cramer-Shoup Strong-RSASignature Scheme Revisited. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:116-129 [Conf]
  10. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
    Strong Key-Insulated Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:130-144 [Conf]
  11. Jens Groth
    A Verifiable Secret Shuffle of Homomorphic Encryptions. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:145-160 [Conf]
  12. Colin Boyd, Juan Manuel González Nieto
    Round-Optimal Contributory Conference Key Agreement. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:161-174 [Conf]
  13. Christian Tobias
    Security Analysis of the MOR Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:175-186 [Conf]
  14. Dennis Hofheinz, Rainer Steinwandt
    A Practical Attack on Some Braid Group Based Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:187-198 [Conf]
  15. Louis Goubin
    A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:199-210 [Conf]
  16. Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone
    Validation of Elliptic Curve Public Keys. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:211-223 [Conf]
  17. Tetsuya Izu, Tsuyoshi Takagi
    Exceptional Procedure Attack on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:224-239 [Conf]
  18. Martijn Stam
    On Montgomery-Like Representationsfor Elliptic Curves over GF(2k). [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:240-253 [Conf]
  19. Willi Geiselmann, Rainer Steinwandt
    A Dedicated Sieving Hardware. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:254-266 [Conf]
  20. Mehdi-Laurent Akkar, Nicolas Courtois, Romain Duteuil, Louis Goubin
    A Fast and Secure Implementation of Sflash. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:267-278 [Conf]
  21. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:279-291 [Conf]
  22. Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha
    A Lattice Based Public Key Cryptosystem Using Polynomial Representations. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:292-308 [Conf]
  23. Serge Vaudenay
    The Security of DSA and ECDSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:309-323 [Conf]
  24. Ulrich Kühn
    Side-Channel Attacks on Textbook RSA and ElGamal Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:324-336 [Conf]
  25. Nicolas Courtois, Magnus Daum, Patrick Felke
    On the Security of HFE, HFEv- and Quartz. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:337-350 [Conf]
  26. Nicolas Courtois
    Generic Attacks and the Security of Quartz. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:351-364 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002