The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
2000 (conf/asiacrypt/2000)

  1. Alex Biryukov, Adi Shamir
    Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:1-13 [Conf]
  2. Glenn Durfee, Phong Q. Nguyen
    Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:14-29 [Conf]
  3. Dan Boneh, Antoine Joux, Phong Q. Nguyen
    Why Textbook ElGamal and RSA Encryption Are Insecure. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:30-43 [Conf]
  4. Louis Goubin, Nicolas Courtois
    Cryptanalysis of the TTM Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:44-57 [Conf]
  5. Colin Boyd, Chris Pavlovski
    Attacking and Repairing Batch Verification Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:58-71 [Conf]
  6. Thomas A. Berson
    Cryptography Everywhere. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:72- [Conf]
  7. Claus-Peter Schnorr, Markus Jakobsson
    Security of Signed ElGamal Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:73-89 [Conf]
  8. Jean-Sébastien Coron, François Koeune, David Naccache
    From Fixed-Length to Arbitrary-Length RSA Padding Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:90-96 [Conf]
  9. Adam Young, Moti Yung
    Towards Signature-Only Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:97-115 [Conf]
  10. Michel Abdalla, Leonid Reyzin
    A New Forward-Secure Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:116-129 [Conf]
  11. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Unconditionally Secure Digital Signature Schemes Admitting Transferability. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:130-142 [Conf]
  12. Martin Hirt, Ueli M. Maurer, Bartosz Przydatek
    Efficient Secure Multi-party Computation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:143-161 [Conf]
  13. Markus Jakobsson, Ari Juels
    Mix and Match: Secure Function Evaluation via Ciphertexts. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:162-177 [Conf]
  14. Miyako Ohkubo, Masayuki Abe
    A Length-Invariant Hybrid Mix. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:178-191 [Conf]
  15. Masashi Mitomo, Kaoru Kurosawa
    Attack for Flash MIX. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:192-204 [Conf]
  16. Moni Naor, Benny Pinkas
    Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:205-219 [Conf]
  17. Arjen K. Lenstra, Eric R. Verheul
    Key Improvements to XTR. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:220-233 [Conf]
  18. Safuat Hamdy, Bodo Möller
    Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:234-247 [Conf]
  19. Seigo Arita
    Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:248-258 [Conf]
  20. Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii
    Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:259-273 [Conf]
  21. Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park
    Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:274-288 [Conf]
  22. Shiho Moriai, Serge Vaudenay
    On the Pseudorandomness of Top-Level Schemes of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:289-302 [Conf]
  23. Philip Hawkes, Gregory G. Rose
    Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:303-316 [Conf]
  24. Mihir Bellare, Phillip Rogaway
    Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:317-330 [Conf]
  25. Jan Camenisch, Ivan Damgård
    Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:331-345 [Conf]
  26. Markus Jakobsson, Ari Juels
    Addition of ElGamal Plaintexts. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:346-358 [Conf]
  27. Brian King
    Improved Methods to Perform Threshold RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:359-372 [Conf]
  28. Matthew K. Franklin, Tomas Sander
    Commital Deniable Proofs and Electronic Campaign Finance. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:373-387 [Conf]
  29. Wakaha Ogata, Kaoru Kurosawa
    Provably Secure Metering Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:388-398 [Conf]
  30. Hideki Imai, Atsuhiro Yamagishi
    CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:399-400 [Conf]
  31. Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Anonymous Fingerprinting with Direct Non-repudiation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:401-414 [Conf]
  32. Jan Camenisch
    Efficient Anonymous Fingerprinting with Group Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:415-428 [Conf]
  33. Danny Gutfreund, Michael Ben-Or
    Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:429-442 [Conf]
  34. Satoshi Hada
    Zero-Knowledge and Code Obfuscation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:443-457 [Conf]
  35. Marc Fischlin
    A Note on Security Proofs in the Generic Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:458-469 [Conf]
  36. Yuliang Zheng, Xian-Mo Zhang
    On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:470-482 [Conf]
  37. David Wagner
    Cryptanalysis of the Yi-Lam Hash. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:483-488 [Conf]
  38. Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart
    Power Analysis, What Is Now Possible.... [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:489-502 [Conf]
  39. Anand Desai, Sara K. Miner
    Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:503-516 [Conf]
  40. Mihir Bellare, Alexandra Boldyreva
    The Security of Chaffing and Winnowing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:517-530 [Conf]
  41. Mihir Bellare, Chanathip Namprempre
    Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:531-545 [Conf]
  42. Michel Abdalla, Mihir Bellare
    Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:546-559 [Conf]
  43. David Wagner, Ian Goldberg
    Proofs of Security for the Unix Password Hashing Algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:560-572 [Conf]
  44. Pascal Paillier
    Trapdooring Discrete Logarithms on Elliptic Curves over Rings. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:573-584 [Conf]
  45. Pierre Loidreau
    Strengthening McEliece Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:585-598 [Conf]
  46. Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
    Password-Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:599-613 [Conf]
  47. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Round-Efficient Conference Key Agreement Protocols with Provable Security. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:614-628 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002