Conferences in DBLP
Craig Gentry , Jakob Jonsson , Jacques Stern , Michael Szydlo Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:1-20 [Conf ] Phong Q. Nguyen , Igor Shparlinski On the Insecurity of a Server-Aided RSA Protocol. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:21-35 [Conf ] Dan Boneh , Shai Halevi , Nick Howgrave-Graham The Modular Inversion Hidden Number Problem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:36-51 [Conf ] Nicholas J. Hopper , Manuel Blum Secure Human Identification Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:52-66 [Conf ] Arjen K. Lenstra Unbelievable Security. Matching AES Security Using Public Key Systems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:67-86 [Conf ] Siguna Müller A Probable Prime Test with Very High Confidence for n equiv 1 mod 4. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:87-106 [Conf ] Emmanuel Thomé Computation of Discrete Logarithms in F2607 . [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:107-124 [Conf ] Martijn Stam , Arjen K. Lenstra Speeding Up XTR. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:125-143 [Conf ] Jae Choon Cha , Ki Hyoung Ko , Sangjin Lee , Jae Woo Han , Jung Hee Cheon An Efficient Implementation of Braid Groups. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:144-156 [Conf ] Nicolas Courtois , Matthieu Finiasz , Nicolas Sendrier How to Achieve a McEliece-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:157-174 [Conf ] Alice Silverberg , Jessica Staddon , Judy L. Walker Efficient Traitor Tracing Algorithms Using List Decoding. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:175-192 [Conf ] Makoto Sugita , Kazukuni Kobara , Hideki Imai Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:193-207 [Conf ] Deukjo Hong , Jaechul Sung , Seokhie Hong , Wonil Lee , Sangjin Lee , Jongin Lim , Okyeon Yi Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:208-221 [Conf ] Jacques Patarin Generic Attacks on Feistel Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:222-238 [Conf ] Akashi Satoh , Sumio Morioka , Kohji Takano , Seiji Munetoh A Compact Rijndael Hardware Architecture with S-Box Optimization. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:239-254 [Conf ] Ju-Sung Kang , Sang Uk Shin , Dowon Hong , Okyeon Yi Provable Security of KASUMI and 3GPP Encryption Mode f8. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:255-271 [Conf ] Duncan S. Wong , Agnes Hui Chan Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:272-289 [Conf ] Emmanuel Bresson , Olivier Chevassut , David Pointcheval Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:290-309 [Conf ] Pierre-Alain Fouque , Jacques Stern Fully Distributed Threshold RSA under Standard Assumptions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:310-330 [Conf ] Anna Lysyanskaya , Chris Peikert Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:331-350 [Conf ] Pierre-Alain Fouque , David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:351-368 [Conf ] Yan-Cheng Chang , Chi-Jen Lu Oblivious Polynomial Evaluation and Oblivious Neural Learning. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:369-384 [Conf ] Moses Liskov , Anna Lysyanskaya , Silvio Micali , Leonid Reyzin , Adam Smith Mutually Independent Commitments. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:385-401 [Conf ] Nicolas Courtois Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:402-421 [Conf ] Tzafrir Cohen , Joe Kilian , Erez Petrank Responsive Round Complexity and Concurrent Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:422-441 [Conf ] Johan Håstad , Mats Näslund Practical Construction and Analysis of Pseudo-Randomness Primitives. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:442-459 [Conf ] Yuriy Tarannikov , Peter Korolev , Anton Botev Autocorrelation Coefficients and Correlation Immunity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:460-479 [Conf ] Pierrick Gaudry , Nicolas Gürel An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:480-494 [Conf ] Steven D. Galbraith Supersingular Curves in Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:495-513 [Conf ] Dan Boneh , Ben Lynn , Hovav Shacham Short Signatures from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:514-532 [Conf ] Eric R. Verheul Self-Blindable Credential Certificates from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:533-551 [Conf ] Ronald L. Rivest , Adi Shamir , Yael Tauman How to Leak a Secret. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:552-565 [Conf ] Mihir Bellare , Alexandra Boldyreva , Anand Desai , David Pointcheval Key-Privacy in Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:566-582 [Conf ] Masayuki Abe , Miyako Ohkubo Provably Secure Fair Blind Signatures with Tight Revocation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:583-602 [Conf ]