Conferences in DBLP
Duong Hieu Phan , David Pointcheval Chosen-Ciphertext Security without Redundancy. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:1-18 [Conf ] Kaoru Kurosawa , Tsuyoshi Takagi Some RSA-Based Encryption Schemes with Tight Security Reduction. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:19-36 [Conf ] Emmanuel Bresson , Dario Catalano , David Pointcheval A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:37-54 [Conf ] Arjen K. Lenstra , Eran Tromer , Adi Shamir , Wil Kortsmit , Bruce Dodson , James Hughes , Paul C. Leyland Factoring Estimates for a 1024-Bit RSA Modulus. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:55-74 [Conf ] Nicolas Thériault Index Calculus Attack for Hyperelliptic Curves of Small Genus. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:75-92 [Conf ] Pradeep Kumar Mishra , Palash Sarkar Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:93-110 [Conf ] Iwan M. Duursma , Hyang-Sook Lee Tate Pairing Implementation for Hyperelliptic Curves y^{2} = x^{p} -x + d. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:111-123 [Conf ] David R. Kohel The AGM-X_{0} (N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:124-136 [Conf ] Miodrag J. Mihaljevic Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:137-154 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai Leakage-Resilient Authenticated Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:155-172 [Conf ] Chih-Hung Wang Untraceable Fair Network Payment Protocols with Off-Line TTP. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:173-187 [Conf ] Dwaine E. Clarke , Srinivas Devadas , Marten van Dijk , Blaise Gassend , G. Edward Suh Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:188-207 [Conf ] Wonil Lee , Donghoon Chang , Sangjin Lee , Soo Hak Sung , Mridul Nandi New Parallel Domain Extenders for UOWHF. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:208-227 [Conf ] Bart Van Rompay , Alex Biryukov , Bart Preneel , Joos Vandewalle Cryptanalysis of 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:228-245 [Conf ] Giuseppe Ateniese , Breno de Medeiros Efficient Group Signatures without Trapdoors. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:246-268 [Conf ] Gene Tsudik , Shouhuai Xu Accumulating Composites and Improved Group Signing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:269-286 [Conf ] Tatsuaki Okamoto , Jacques Stern Almost Uniform Density of Power Residues and the Provable Security of ESIGN. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:287-301 [Conf ] Jason E. Gower Rotations and Translations of Number Field Sieve Polynomials. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:302-310 [Conf ] Mark L. Bauer , Safuat Hamdy On Class Group Computations Using the Number Field Sieve. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:311-325 [Conf ] Hong-Sen Yan , Hsing-Hui Huang The Secret and Beauty of Ancient Chinese Padlocks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:326-330 [Conf ] Olivier Billet , Henri Gilbert A Traceable Block Cipher. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:331-346 [Conf ] Frédéric Muller A New Attack against Khazad. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:347-358 [Conf ] Chong Hee Kim , Yong Ho Hwang , Pil Joong Lee An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:359-373 [Conf ] Nuttapong Attrapadung , Kazukuni Kobara , Hideki Imai Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:374-391 [Conf ] Jean-Sébastien Coron , David Naccache Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:392-397 [Conf ] Helger Lipmaa On Diophantine Complexity and Statistical Zero-Knowledge Arguments. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:398-415 [Conf ] Helger Lipmaa Verifiable Homomorphic Oblivious Transfer and Private Equality Test. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:416-433 [Conf ] Hisayoshi Sato , Tsuyoshi Takagi , Satoru Tezuka , Kazuo Takaragi Generalized Powering Functions and Their Application to Digital Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:434-451 [Conf ] Sattam S. Al-Riyami , Kenneth G. Paterson Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:452-473 [Conf ] Kaoru Kurosawa , Katja Schmidt-Samoa , Tsuyoshi Takagi A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:474-491 [Conf ] Pierre-Alain Fouque , Nick Howgrave-Graham , Gwenaëlle Martinet , Guillaume Poupard The Insecurity of Esign in Practical Implementations. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:492-506 [Conf ] Huaxiong Wang , Josef Pieprzyk Efficient One-Time Proxy Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:507-522 [Conf ] Ron Steinfeld , Laurence Bull , Huaxiong Wang , Josef Pieprzyk Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:523-542 [Conf ]