Conferences in DBLP
Arjen K. Lenstra Generating RSA Moduli with a Predetermined Portion. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:1-10 [Conf ] Guillaume Poupard , Jacques Stern Generation of Shared RSA Keys by Two Parties. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:11-24 [Conf ] Dan Boneh , Glenn Durfee , Yair Frankel An Attack on RSA Given a Small Fraction of the Private Key Bits. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:25-34 [Conf ] Jacques Patarin , Louis Goubin , Nicolas Courtois C * -+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:35-49 [Conf ] Burton S. Kaliski Jr. ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:50- [Conf ] Henri Cohen , Atsuko Miyaji , Takatoshi Ono Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:51-65 [Conf ] Tetsuya Izu , Jun Kogure , Masayuki Noro , Kazuhiro Yokoyama Efficient Implementation of Schoof's Algorithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:66-79 [Conf ] Yasuyuki Sakai , Kouichi Sakurai Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2 n. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:80-94 [Conf ] Jinhui Chao , Osamu Nakamura , Kohji Sobataka , Shigeo Tsujii Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:95-109 [Conf ] Joseph H. Silverman , Joe Suzuki Elliptic Curve Discrete Logarithms and the Index Calculus. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:110-125 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng , Qin-Zhong Ye Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:126-132 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng , Qin-Zhong Ye Improved Truncated Differential Attacks on SAFER. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:133-147 [Conf ] Thomas Pornin Optimal Resistance Against the Davies and Murphy Attack. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:148-159 [Conf ] Jan Camenisch , Markus Michels A Group Signature Scheme with Improved Efficiency. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:160-174 [Conf ] Chae Hoon Lim , Pil Joong Lee A Study on the Proposed Korean Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:175-186 [Conf ] Anne Canteaut , Nicolas Sendrier Cryptoanalysis of the Original McEliece Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:187-199 [Conf ] Hung-Min Sun Improving the Security of the McEliece Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:200-213 [Conf ] Wenbo Mao , Chae Hoon Lim Cryptoanalysis in Prime Order Subgroups of Z * n . [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:214-226 [Conf ] Zong-Duo Dai , Dingfeng Ye , Kwok-Yan Lam Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:227-241 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang Bounds and Constructions for Multireceiver Authentication Codes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:242-256 [Conf ] Yair Frankel , Yiannis Tsiounis , Moti Yung Fair Off-Line e-cash Made Easy. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:257-270 [Conf ] Colin Boyd , Ernest Foo Off-Line Fair Payment Protocols Using Convertible Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:271-285 [Conf ] Liqun Chen Efficient Fair Exchange with Verifiable Confirmation of Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:286-299 [Conf ] Donald Beaver Adaptively Secure Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:300-314 [Conf ] Wen Feng Qi , Jun-Hui Yang , Jing Jun Zhou ML-Sequences over Rings Z/(2e ) * : I. Constructions of Nondegenerative ML-Sequences II. Injectiveness of Compression Mappings of New Classes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:315-326 [Conf ] Lars R. Knudsen , Willi Meier , Bart Preneel , Vincent Rijmen , Sven Verdoolaege Analysis Methods for (Alleged) RC4. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:327-341 [Conf ] Thomas Johansson Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:342-356 [Conf ] Julien P. Stern A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:357-371 [Conf ] Phong Q. Nguyen , Jacques Stern The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:372-379 [Conf ] Mike Burmester , Yvo Desmedt , Jennifer Seberry Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:380-391 [Conf ] Yvo Desmedt , Shuang Hou , Jean-Jacques Quisquater Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:392-404 [Conf ] Stefan Wolf Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:405-419 [Conf ] Kaoru Kurosawa , Takuya Yoshida , Yvo Desmedt , Mike Burmester Some Bounds and a Construction for Secure Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:420-433 [Conf ]