default search action
1. PKC 1998: Pacifico Yokohama, Japan
- Hideki Imai, Yuliang Zheng:
Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings. Lecture Notes in Computer Science 1431, Springer 1998, ISBN 3-540-64693-0
Invited Talks
- Yair Frankel, Moti Yung:
Distributed Public Key Cryptosystems. 1-13 - Jean-François Misarsky:
How (not) to Design RSA Signature Schemes. 14-28 - Kiyomichi Araki, Takakazu Satoh, Shinji Miura:
Overview of Elliptic Curve Cryptography. 29-49
Special Talk
- Jacques Stern:
Lattices and Cryptography: An Overview. 50-54
Regular Contributions
- Feng Bao, Robert H. Deng:
A Signcryption Scheme with Signature Directly Verifiable by Public Key. 55-59 - Wenbo Mao:
Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. 60-71 - Tatsuaki Okamoto, Moti Yung:
Lower Bounds on Term-Based Divisible Cash Systems. 72-82 - Ilari Lehti, Pekka Nikander:
Certifying Trust. 83-98 - Johannes Merkle, Ralph Werchner:
On the Security of Server-Aided RSA Protocols. 99-116 - Yiannis Tsiounis, Moti Yung:
On the Security of ElGamal Based Encryption. 117-134 - Shoichi Hirose, Susumu Yoshida:
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. 135-148 - Shahrokh Saeednia, Reihaneh Safavi-Naini:
On the Security of Girault's Identification Scheme. 149-153 - Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee:
A Scheme for Obtaining a Message from the Digital Multisignature. 154-163 - Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka:
Secure Hyperelliptic Cryptosystems and Their Performances. 164-181 - Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui:
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. 182-194 - Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho Kim:
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. 195-202 - Akihiro Yamamura:
Public-Key Cryptosystems Using the Modular Group. 203-216 - Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. 217-233 - Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee:
A New Hash Function Based on MDx-Family and Its Application to MAC. 234-246
Recent Results
- Michael W. David, Kouichi Sakurai:
Security Issues for Contactless Smart Cards. 247-252 - Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama:
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. 253-257 - Masahiro Mambo, Hiroki Shizuya:
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. 258-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.