Conferences in DBLP
Alex Biryukov , Adi Shamir Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:1-13 [Conf ] Glenn Durfee , Phong Q. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:14-29 [Conf ] Dan Boneh , Antoine Joux , Phong Q. Nguyen Why Textbook ElGamal and RSA Encryption Are Insecure. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:30-43 [Conf ] Louis Goubin , Nicolas Courtois Cryptanalysis of the TTM Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:44-57 [Conf ] Colin Boyd , Chris Pavlovski Attacking and Repairing Batch Verification Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:58-71 [Conf ] Thomas A. Berson Cryptography Everywhere. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:72- [Conf ] Claus-Peter Schnorr , Markus Jakobsson Security of Signed ElGamal Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:73-89 [Conf ] Jean-Sébastien Coron , François Koeune , David Naccache From Fixed-Length to Arbitrary-Length RSA Padding Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:90-96 [Conf ] Adam Young , Moti Yung Towards Signature-Only Signature Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:97-115 [Conf ] Michel Abdalla , Leonid Reyzin A New Forward-Secure Digital Signature Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:116-129 [Conf ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Unconditionally Secure Digital Signature Schemes Admitting Transferability. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:130-142 [Conf ] Martin Hirt , Ueli M. Maurer , Bartosz Przydatek Efficient Secure Multi-party Computation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:143-161 [Conf ] Markus Jakobsson , Ari Juels Mix and Match: Secure Function Evaluation via Ciphertexts. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:162-177 [Conf ] Miyako Ohkubo , Masayuki Abe A Length-Invariant Hybrid Mix. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:178-191 [Conf ] Masashi Mitomo , Kaoru Kurosawa Attack for Flash MIX. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:192-204 [Conf ] Moni Naor , Benny Pinkas Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:205-219 [Conf ] Arjen K. Lenstra , Eric R. Verheul Key Improvements to XTR. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:220-233 [Conf ] Safuat Hamdy , Bodo Möller Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:234-247 [Conf ] Seigo Arita Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:248-258 [Conf ] Jinhui Chao , Kazuto Matsuo , Hiroto Kawashiro , Shigeo Tsujii Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:259-273 [Conf ] Jaechul Sung , Sangjin Lee , Jong In Lim , Seokhie Hong , Sangjoon Park Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:274-288 [Conf ] Shiho Moriai , Serge Vaudenay On the Pseudorandomness of Top-Level Schemes of Block Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:289-302 [Conf ] Philip Hawkes , Gregory G. Rose Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:303-316 [Conf ] Mihir Bellare , Phillip Rogaway Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:317-330 [Conf ] Jan Camenisch , Ivan Damgård Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:331-345 [Conf ] Markus Jakobsson , Ari Juels Addition of ElGamal Plaintexts. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:346-358 [Conf ] Brian King Improved Methods to Perform Threshold RSA. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:359-372 [Conf ] Matthew K. Franklin , Tomas Sander Commital Deniable Proofs and Electronic Campaign Finance. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:373-387 [Conf ] Wakaha Ogata , Kaoru Kurosawa Provably Secure Metering Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:388-398 [Conf ] Hideki Imai , Atsuhiro Yamagishi CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:399-400 [Conf ] Birgit Pfitzmann , Ahmad-Reza Sadeghi Anonymous Fingerprinting with Direct Non-repudiation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:401-414 [Conf ] Jan Camenisch Efficient Anonymous Fingerprinting with Group Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:415-428 [Conf ] Danny Gutfreund , Michael Ben-Or Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:429-442 [Conf ] Satoshi Hada Zero-Knowledge and Code Obfuscation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:443-457 [Conf ] Marc Fischlin A Note on Security Proofs in the Generic Model. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:458-469 [Conf ] Yuliang Zheng , Xian-Mo Zhang On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:470-482 [Conf ] David Wagner Cryptanalysis of the Yi-Lam Hash. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:483-488 [Conf ] Mehdi-Laurent Akkar , Régis Bevan , Paul Dischamp , Didier Moyart Power Analysis, What Is Now Possible.... [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:489-502 [Conf ] Anand Desai , Sara K. Miner Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:503-516 [Conf ] Mihir Bellare , Alexandra Boldyreva The Security of Chaffing and Winnowing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:517-530 [Conf ] Mihir Bellare , Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:531-545 [Conf ] Michel Abdalla , Mihir Bellare Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:546-559 [Conf ] David Wagner , Ian Goldberg Proofs of Security for the Unix Password Hashing Algorithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:560-572 [Conf ] Pascal Paillier Trapdooring Discrete Logarithms on Elliptic Curves over Rings. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:573-584 [Conf ] Pierre Loidreau Strengthening McEliece Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:585-598 [Conf ] Philip D. MacKenzie , Sarvar Patel , Ram Swaminathan Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:599-613 [Conf ] Wen-Guey Tzeng , Zhi-Jia Tzeng Round-Efficient Conference Key Agreement Protocols with Provable Security. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:614-628 [Conf ]