default search action
4. PKC 2001: Cheju Island, Korea
- Kwangjo Kim:
Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings. Lecture Notes in Computer Science 1992, Springer 2001, ISBN 3-540-41658-7 - Siguna Müller:
On the Security of Williams Based Public Key Encryption Scheme. 1-18 - Kazukuni Kobara, Hideki Imai:
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. 19-35 - Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima:
IND-CCA Public Key Schemes Equivalent to Factoring n=pq. 36-47 - Yuliang Zheng:
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. 48-63 - Arjen K. Lenstra, Igor E. Shparlinski:
On the Security of Lenstra's Variant of DSA without Long Inversions. 64-72 - Arjen K. Lenstra, Eric R. Verheul:
Fast Irreducibility and Subgroup Membership Testing in XTR. 73-86 - Takeshi Koshiba:
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes. 87-103 - Tatsuaki Okamoto, David Pointcheval:
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. 104-118 - Ivan Damgård, Mads Jurik:
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. 119-136 - Dennis Kügler, Holger Vogt:
Marking: A Privacy Protecting Approach Against Blackmailing. 137-152 - Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu:
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. 153-164 - Éliane Jaulmes, Antoine Joux:
Cryptanalysis of PKP: A New Approach. 165-172 - Hongjun Wu, Feng Bao, Robert H. Deng:
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. 173-179 - Rainer Steinwandt:
Loopholes in Two Public Key Cryptosystems Using the Modular Group. 180-189 - Emmanuel Bresson, Jacques Stern:
Efficient Revocation in Group Signatures. 190-206 - Wen-Guey Tzeng, Zhi-Jia Tzeng:
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. 207-224 - Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai:
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. 225-239 - Yair Frankel, Philip D. MacKenzie, Moti Yung:
Adaptive Security for the Additive-Sharing Based Proactive RSA. 240-263 - Wen-Guey Tzeng, Zhi-Jia Tzeng:
Robust Forward-Secure Signature Schemes with Proactive Security. 264-276 - Yvo Desmedt, Mike Burmester, Jennifer Seberry:
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. 277-286 - Adam L. Young, Moti Yung:
A PVSS as Hard as Discrete Log and Shareholder Separability. 287-299 - Pierre-Alain Fouque, Jacques Stern:
One Round Threshold Discrete-Log Key Generation without Private Channels. 300-316 - Masayuki Abe, Fumitaka Hoshino:
Remarks on Mix-Network Based on Permutation Networks. 317-324 - Chong Hee Kim, Pil Joong Lee:
New Key Recovery in WAKE Protocol. 325-338 - Willi Geiselmann, Harald Lukhaub:
Redundant Representation of Finite Fields. 339-352 - Marc Joye, Christophe Tymen:
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography. 353-364 - Jorge Guajardo, Rainer Blümel, Uwe Krieger, Christof Paar:
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers. 365-382 - Markus Jakobsson, Susanne Wetzel:
Secure Server-Aided Signature Generation. 383-401 - Arne Ansper, Ahto Buldas, Meelis Roos, Jan Willemson:
Efficient Long-Term Validation of Digital Signatures. 402-415 - Nikos K. Moshopoulos, Kiamal Z. Pekmestzi:
A Novel Systolic Architecture for Efficient RSA Implementation. 416-421
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.