The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
1998 (conf/asiacrypt/1998)

  1. Arjen K. Lenstra
    Generating RSA Moduli with a Predetermined Portion. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:1-10 [Conf]
  2. Guillaume Poupard, Jacques Stern
    Generation of Shared RSA Keys by Two Parties. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:11-24 [Conf]
  3. Dan Boneh, Glenn Durfee, Yair Frankel
    An Attack on RSA Given a Small Fraction of the Private Key Bits. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:25-34 [Conf]
  4. Jacques Patarin, Louis Goubin, Nicolas Courtois
    C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:35-49 [Conf]
  5. Burton S. Kaliski Jr.
    ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:50- [Conf]
  6. Henri Cohen, Atsuko Miyaji, Takatoshi Ono
    Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:51-65 [Conf]
  7. Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
    Efficient Implementation of Schoof's Algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:66-79 [Conf]
  8. Yasuyuki Sakai, Kouichi Sakurai
    Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:80-94 [Conf]
  9. Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii
    Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:95-109 [Conf]
  10. Joseph H. Silverman, Joe Suzuki
    Elliptic Curve Discrete Logarithms and the Index Calculus. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:110-125 [Conf]
  11. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
    Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:126-132 [Conf]
  12. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
    Improved Truncated Differential Attacks on SAFER. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:133-147 [Conf]
  13. Thomas Pornin
    Optimal Resistance Against the Davies and Murphy Attack. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:148-159 [Conf]
  14. Jan Camenisch, Markus Michels
    A Group Signature Scheme with Improved Efficiency. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:160-174 [Conf]
  15. Chae Hoon Lim, Pil Joong Lee
    A Study on the Proposed Korean Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:175-186 [Conf]
  16. Anne Canteaut, Nicolas Sendrier
    Cryptoanalysis of the Original McEliece Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:187-199 [Conf]
  17. Hung-Min Sun
    Improving the Security of the McEliece Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:200-213 [Conf]
  18. Wenbo Mao, Chae Hoon Lim
    Cryptoanalysis in Prime Order Subgroups of Z*n. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:214-226 [Conf]
  19. Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam
    Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:227-241 [Conf]
  20. Reihaneh Safavi-Naini, Huaxiong Wang
    Bounds and Constructions for Multireceiver Authentication Codes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:242-256 [Conf]
  21. Yair Frankel, Yiannis Tsiounis, Moti Yung
    Fair Off-Line e-cash Made Easy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:257-270 [Conf]
  22. Colin Boyd, Ernest Foo
    Off-Line Fair Payment Protocols Using Convertible Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:271-285 [Conf]
  23. Liqun Chen
    Efficient Fair Exchange with Verifiable Confirmation of Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:286-299 [Conf]
  24. Donald Beaver
    Adaptively Secure Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:300-314 [Conf]
  25. Wen Feng Qi, Jun-Hui Yang, Jing Jun Zhou
    ML-Sequences over Rings Z/(2e)*: I. Constructions of Nondegenerative ML-Sequences II. Injectiveness of Compression Mappings of New Classes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:315-326 [Conf]
  26. Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege
    Analysis Methods for (Alleged) RC4. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:327-341 [Conf]
  27. Thomas Johansson
    Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:342-356 [Conf]
  28. Julien P. Stern
    A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:357-371 [Conf]
  29. Phong Q. Nguyen, Jacques Stern
    The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:372-379 [Conf]
  30. Mike Burmester, Yvo Desmedt, Jennifer Seberry
    Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:380-391 [Conf]
  31. Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater
    Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:392-404 [Conf]
  32. Stefan Wolf
    Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:405-419 [Conf]
  33. Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester
    Some Bounds and a Construction for Secure Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:420-433 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002