The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
2001 (conf/asiacrypt/2001)

  1. Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo
    Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:1-20 [Conf]
  2. Phong Q. Nguyen, Igor Shparlinski
    On the Insecurity of a Server-Aided RSA Protocol. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:21-35 [Conf]
  3. Dan Boneh, Shai Halevi, Nick Howgrave-Graham
    The Modular Inversion Hidden Number Problem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:36-51 [Conf]
  4. Nicholas J. Hopper, Manuel Blum
    Secure Human Identification Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:52-66 [Conf]
  5. Arjen K. Lenstra
    Unbelievable Security. Matching AES Security Using Public Key Systems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:67-86 [Conf]
  6. Siguna Müller
    A Probable Prime Test with Very High Confidence for n equiv 1 mod 4. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:87-106 [Conf]
  7. Emmanuel Thomé
    Computation of Discrete Logarithms in F2607. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:107-124 [Conf]
  8. Martijn Stam, Arjen K. Lenstra
    Speeding Up XTR. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:125-143 [Conf]
  9. Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon
    An Efficient Implementation of Braid Groups. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:144-156 [Conf]
  10. Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier
    How to Achieve a McEliece-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:157-174 [Conf]
  11. Alice Silverberg, Jessica Staddon, Judy L. Walker
    Efficient Traitor Tracing Algorithms Using List Decoding. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:175-192 [Conf]
  12. Makoto Sugita, Kazukuni Kobara, Hideki Imai
    Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:193-207 [Conf]
  13. Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
    Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:208-221 [Conf]
  14. Jacques Patarin
    Generic Attacks on Feistel Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:222-238 [Conf]
  15. Akashi Satoh, Sumio Morioka, Kohji Takano, Seiji Munetoh
    A Compact Rijndael Hardware Architecture with S-Box Optimization. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:239-254 [Conf]
  16. Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi
    Provable Security of KASUMI and 3GPP Encryption Mode f8. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:255-271 [Conf]
  17. Duncan S. Wong, Agnes Hui Chan
    Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:272-289 [Conf]
  18. Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:290-309 [Conf]
  19. Pierre-Alain Fouque, Jacques Stern
    Fully Distributed Threshold RSA under Standard Assumptions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:310-330 [Conf]
  20. Anna Lysyanskaya, Chris Peikert
    Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:331-350 [Conf]
  21. Pierre-Alain Fouque, David Pointcheval
    Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:351-368 [Conf]
  22. Yan-Cheng Chang, Chi-Jen Lu
    Oblivious Polynomial Evaluation and Oblivious Neural Learning. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:369-384 [Conf]
  23. Moses Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam Smith
    Mutually Independent Commitments. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:385-401 [Conf]
  24. Nicolas Courtois
    Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:402-421 [Conf]
  25. Tzafrir Cohen, Joe Kilian, Erez Petrank
    Responsive Round Complexity and Concurrent Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:422-441 [Conf]
  26. Johan Håstad, Mats Näslund
    Practical Construction and Analysis of Pseudo-Randomness Primitives. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:442-459 [Conf]
  27. Yuriy Tarannikov, Peter Korolev, Anton Botev
    Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:460-479 [Conf]
  28. Pierrick Gaudry, Nicolas Gürel
    An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:480-494 [Conf]
  29. Steven D. Galbraith
    Supersingular Curves in Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:495-513 [Conf]
  30. Dan Boneh, Ben Lynn, Hovav Shacham
    Short Signatures from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:514-532 [Conf]
  31. Eric R. Verheul
    Self-Blindable Credential Certificates from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:533-551 [Conf]
  32. Ronald L. Rivest, Adi Shamir, Yael Tauman
    How to Leak a Secret. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:552-565 [Conf]
  33. Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval
    Key-Privacy in Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:566-582 [Conf]
  34. Masayuki Abe, Miyako Ohkubo
    Provably Secure Fair Blind Signatures with Tight Revocation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:583-602 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002