|
Conferences in DBLP
- Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro
Modulus Search for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:1-7 [Conf]
- Serge Vaudenay
On the Lai-Massey Scheme. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:8-19 [Conf]
- Takashi Satoh, Tetsu Iwata, Kaoru Kurosawa
On Cryptographically Secure Vectorial Boolean Functions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:20-28 [Conf]
- Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen
Equivalent Keys of HPC. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:29-42 [Conf]
- Haruki Seki, Toshinobu Kaneko
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:43-51 [Conf]
- Simon R. Blackburn, Steven D. Galbraith
Cryptanalysis of Two Cryptosystems Based on Group Actions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:52-61 [Conf]
- Tetsu Iwata, Kaoru Kurosawa
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:62-74 [Conf]
- Yongfei Han, Peng-Chor Leong, Peng-Chong Tan, Jiang Zhang
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:75-85 [Conf]
- Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:86-102 [Conf]
- Iwan M. Duursma, Pierrick Gaudry, François Morain
Speeding up the Discrete Log Computation on Curves with Automorphisms. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:103-121 [Conf]
- Jean-Sébastien Coron, Helena Handschuh, David Naccache
ECC: Do We Need to Count? [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:122-134 [Conf]
- Erik Woodward Knudsen
Elliptic Scalar Multiplication Using Point Halving. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:135-149 [Conf]
- Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih
On the Design of RSA with Short Secret Exponent. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:150-164 [Conf]
- Pascal Paillier, David Pointcheval
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:165-179 [Conf]
- Yair Frankel, Philip D. MacKenzie, Moti Yung
Adaptively-Secure Optimal-Resilience Proactive RSA. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:180-194 [Conf]
- Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Paul C. Leyland, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman te Riele, Paul Zimmermann
Factorization of RSA-140 Using the Number Field Sieve. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:195-207 [Conf]
- Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan
How to Prove That a Committed Number Is Prime. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:208-218 [Conf]
- Detlef Hühnlein, Tsuyoshi Takagi
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:219-231 [Conf]
- Matthias Fitzi, Martin Hirt, Ueli M. Maurer
General Adversaries in Unconditional Multi-party Computation. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:232-246 [Conf]
- Yvo Desmedt, Yongge Wang
Approximation Hardness and Secure Communication in Broadcast Channels. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:247-257 [Conf]
- Masayuki Abe
Mix-Networks on Permutation Networks. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:258-273 [Conf]
- Mike Burmester, Yvo Desmedt
Secure Communication in an Unknown Network Using Certificates. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:274-287 [Conf]
- Yongge Wang
Linear Complexity versus Pseudorandomness: On Beth and Dai's Result. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:288-298 [Conf]
- Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei
A Class of Explicit Perfect Multi-sequences. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:299-305 [Conf]
- Sarbani Palit, Bimal K. Roy
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:306-320 [Conf]
- Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheul
Doing More with Fewer Bits. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:321-332 [Conf]
- Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto
A Quick Group Key Distribution Scheme with "Entity Revocation". [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:333-347 [Conf]
- Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:348-362 [Conf]
- Masayuki Numao
Periodical Multi-secret Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:363-377 [Conf]
- Masayuki Abe, Tatsuaki Okamoto
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:378-389 [Conf]
- Yejing Wang, Reihaneh Safavi-Naini
A3-Codes under Collusion Attacks. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:390-398 [Conf]
- Reihaneh Safavi-Naini, Huaxiong Wang
Broadcast Authentication in Group Communication. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:399-411 [Conf]
|