The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
2003 (conf/asiacrypt/2003)

  1. Duong Hieu Phan, David Pointcheval
    Chosen-Ciphertext Security without Redundancy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:1-18 [Conf]
  2. Kaoru Kurosawa, Tsuyoshi Takagi
    Some RSA-Based Encryption Schemes with Tight Security Reduction. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:19-36 [Conf]
  3. Emmanuel Bresson, Dario Catalano, David Pointcheval
    A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:37-54 [Conf]
  4. Arjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul C. Leyland
    Factoring Estimates for a 1024-Bit RSA Modulus. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:55-74 [Conf]
  5. Nicolas Thériault
    Index Calculus Attack for Hyperelliptic Curves of Small Genus. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:75-92 [Conf]
  6. Pradeep Kumar Mishra, Palash Sarkar
    Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:93-110 [Conf]
  7. Iwan M. Duursma, Hyang-Sook Lee
    Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:111-123 [Conf]
  8. David R. Kohel
    The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:124-136 [Conf]
  9. Miodrag J. Mihaljevic
    Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:137-154 [Conf]
  10. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Leakage-Resilient Authenticated Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:155-172 [Conf]
  11. Chih-Hung Wang
    Untraceable Fair Network Payment Protocols with Off-Line TTP. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:173-187 [Conf]
  12. Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh
    Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:188-207 [Conf]
  13. Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi
    New Parallel Domain Extenders for UOWHF. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:208-227 [Conf]
  14. Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle
    Cryptanalysis of 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:228-245 [Conf]
  15. Giuseppe Ateniese, Breno de Medeiros
    Efficient Group Signatures without Trapdoors. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:246-268 [Conf]
  16. Gene Tsudik, Shouhuai Xu
    Accumulating Composites and Improved Group Signing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:269-286 [Conf]
  17. Tatsuaki Okamoto, Jacques Stern
    Almost Uniform Density of Power Residues and the Provable Security of ESIGN. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:287-301 [Conf]
  18. Jason E. Gower
    Rotations and Translations of Number Field Sieve Polynomials. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:302-310 [Conf]
  19. Mark L. Bauer, Safuat Hamdy
    On Class Group Computations Using the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:311-325 [Conf]
  20. Hong-Sen Yan, Hsing-Hui Huang
    The Secret and Beauty of Ancient Chinese Padlocks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:326-330 [Conf]
  21. Olivier Billet, Henri Gilbert
    A Traceable Block Cipher. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:331-346 [Conf]
  22. Frédéric Muller
    A New Attack against Khazad. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:347-358 [Conf]
  23. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:359-373 [Conf]
  24. Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
    Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:374-391 [Conf]
  25. Jean-Sébastien Coron, David Naccache
    Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:392-397 [Conf]
  26. Helger Lipmaa
    On Diophantine Complexity and Statistical Zero-Knowledge Arguments. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:398-415 [Conf]
  27. Helger Lipmaa
    Verifiable Homomorphic Oblivious Transfer and Private Equality Test. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:416-433 [Conf]
  28. Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi
    Generalized Powering Functions and Their Application to Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:434-451 [Conf]
  29. Sattam S. Al-Riyami, Kenneth G. Paterson
    Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:452-473 [Conf]
  30. Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi
    A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:474-491 [Conf]
  31. Pierre-Alain Fouque, Nick Howgrave-Graham, Gwenaëlle Martinet, Guillaume Poupard
    The Insecurity of Esign in Practical Implementations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:492-506 [Conf]
  32. Huaxiong Wang, Josef Pieprzyk
    Efficient One-Time Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:507-522 [Conf]
  33. Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk
    Universal Designated-Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:523-542 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002