default search action
ASIACRYPT 1998: Beijing, China
- Kazuo Ohta, Dingyi Pei:
Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings. Lecture Notes in Computer Science 1514, Springer 1998, ISBN 3-540-65109-8
Public Key Cryptosystems
- Arjen K. Lenstra:
Generating RSA Moduli with a Predetermined Portion. 1-10 - Guillaume Poupard, Jacques Stern:
Generation of Shared RSA Keys by Two Parties. 11-24 - Dan Boneh, Glenn Durfee, Yair Frankel:
An Attack on RSA Given a Small Fraction of the Private Key Bits. 25-34 - Jacques Patarin, Louis Goubin, Nicolas T. Courtois:
C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. 35-49
Invited Talk
- Burton S. Kaliski Jr.:
ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract). 50
Elliptic Curve Cryptosystems
- Henri Cohen, Atsuko Miyaji, Takatoshi Ono:
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. 51-65 - Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama:
Efficient Implementation of Schoof's Algorithm. 66-79 - Yasuyuki Sakai, Kouichi Sakurai:
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. 80-94 - Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii:
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. 95-109 - Joseph H. Silverman, Joe Suzuki:
Elliptic Curve Discrete Logarithms and the Index Calculus. 110-125
Cryptanalysis 1
- Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye:
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. 126-132 - Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye:
Improved Truncated Differential Attacks on SAFER. 133-147 - Thomas Pornin:
Optimal Resistance Against the Davies and Murphy Attack. 148-159
Signature
- Jan Camenisch, Markus Michels:
A Group Signature Scheme with Improved Efficiency. 160-174 - Chae Hoon Lim, Pil Joong Lee:
A Study on the Proposed Korean Digital Signature Algorithm. 175-186
Cryptanalysis 2
- Anne Canteaut, Nicolas Sendrier:
Cryptanalysis of the Original McEliece Cryptosystem. 187-199 - Hung-Min Sun:
Improving the Security of the McEliece Public-Key Cryptosystem. 200-213 - Wenbo Mao, Chae Hoon Lim:
Cryptanalysis in Prime Order Subgroups of Z*n. 214-226
Finite Automata
- Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam:
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. 227-241
Authentication Codes
- Reihaneh Safavi-Naini, Huaxiong Wang:
Bounds and Constructions for Multireceiver Authentication Codes. 242-256
Electronic Cash
- Yair Frankel, Yiannis Tsiounis, Moti Yung:
Fair Off-Line e-cash Made Easy. 257-270 - Colin Boyd, Ernest Foo:
Off-Line Fair Payment Protocols Using Convertible Signatures. 271-285 - Liqun Chen:
Efficient Fair Exchange with Verifiable Confirmation of Signatures. 286-299 - Donald Beaver:
Adaptively Secure Oblivious Transfer. 300-314
Steam Ciphers
- Wen Feng Qi, Jun-Hui Yang, Jing Jun Zhou:
ML-Sequences over Rings Z/(2e)*: I. Constructions of Nondegenerative ML-Sequences II. Injectiveness of Compression Mappings of New Classes. 315-326 - Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege:
Analysis Methods for (Alleged) RC4. 327-341 - Thomas Johansson:
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. 342-356
Cryptographic Protocols
- Julien P. Stern:
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. 357-371 - Phong Q. Nguyen, Jacques Stern:
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. 372-379
Key Escrow
- Mike Burmester, Yvo Desmedt, Jennifer Seberry:
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). 380-391
New Cryptography
- Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater:
Audio and Optical Cryptography. 392-404
Information Theory
- Stefan Wolf:
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. 405-419 - Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester:
Some Bounds and a Construction for Secure Broadcast Encryption. 420-433
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.