The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
1999 (conf/asiacrypt/1999)

  1. Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro
    Modulus Search for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:1-7 [Conf]
  2. Serge Vaudenay
    On the Lai-Massey Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:8-19 [Conf]
  3. Takashi Satoh, Tetsu Iwata, Kaoru Kurosawa
    On Cryptographically Secure Vectorial Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:20-28 [Conf]
  4. Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen
    Equivalent Keys of HPC. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:29-42 [Conf]
  5. Haruki Seki, Toshinobu Kaneko
    Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:43-51 [Conf]
  6. Simon R. Blackburn, Steven D. Galbraith
    Cryptanalysis of Two Cryptosystems Based on Group Actions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:52-61 [Conf]
  7. Tetsu Iwata, Kaoru Kurosawa
    Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:62-74 [Conf]
  8. Yongfei Han, Peng-Chor Leong, Peng-Chong Tan, Jiang Zhang
    Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:75-85 [Conf]
  9. Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai
    Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:86-102 [Conf]
  10. Iwan M. Duursma, Pierrick Gaudry, François Morain
    Speeding up the Discrete Log Computation on Curves with Automorphisms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:103-121 [Conf]
  11. Jean-Sébastien Coron, Helena Handschuh, David Naccache
    ECC: Do We Need to Count? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:122-134 [Conf]
  12. Erik Woodward Knudsen
    Elliptic Scalar Multiplication Using Point Halving. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:135-149 [Conf]
  13. Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih
    On the Design of RSA with Short Secret Exponent. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:150-164 [Conf]
  14. Pascal Paillier, David Pointcheval
    Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:165-179 [Conf]
  15. Yair Frankel, Philip D. MacKenzie, Moti Yung
    Adaptively-Secure Optimal-Resilience Proactive RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:180-194 [Conf]
  16. Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Paul C. Leyland, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman te Riele, Paul Zimmermann
    Factorization of RSA-140 Using the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:195-207 [Conf]
  17. Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan
    How to Prove That a Committed Number Is Prime. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:208-218 [Conf]
  18. Detlef Hühnlein, Tsuyoshi Takagi
    Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:219-231 [Conf]
  19. Matthias Fitzi, Martin Hirt, Ueli M. Maurer
    General Adversaries in Unconditional Multi-party Computation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:232-246 [Conf]
  20. Yvo Desmedt, Yongge Wang
    Approximation Hardness and Secure Communication in Broadcast Channels. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:247-257 [Conf]
  21. Masayuki Abe
    Mix-Networks on Permutation Networks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:258-273 [Conf]
  22. Mike Burmester, Yvo Desmedt
    Secure Communication in an Unknown Network Using Certificates. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:274-287 [Conf]
  23. Yongge Wang
    Linear Complexity versus Pseudorandomness: On Beth and Dai's Result. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:288-298 [Conf]
  24. Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei
    A Class of Explicit Perfect Multi-sequences. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:299-305 [Conf]
  25. Sarbani Palit, Bimal K. Roy
    Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:306-320 [Conf]
  26. Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheul
    Doing More with Fewer Bits. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:321-332 [Conf]
  27. Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto
    A Quick Group Key Distribution Scheme with "Entity Revocation". [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:333-347 [Conf]
  28. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:348-362 [Conf]
  29. Masayuki Numao
    Periodical Multi-secret Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:363-377 [Conf]
  30. Masayuki Abe, Tatsuaki Okamoto
    A Signature Scheme with Message Recovery as Secure as Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:378-389 [Conf]
  31. Yejing Wang, Reihaneh Safavi-Naini
    A3-Codes under Collusion Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:390-398 [Conf]
  32. Reihaneh Safavi-Naini, Huaxiong Wang
    Broadcast Authentication in Group Communication. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:399-411 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002