Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro |
Modulus Search for Elliptic Curve Cryptosystems. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Tetsu Iwata, Kaoru Kurosawa |
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yejing Wang, Reihaneh Safavi-Naini |
A3-Codes under Collusion Attacks. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Sébastien Coron, Helena Handschuh, David Naccache |
ECC: Do We Need to Count? |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen |
Equivalent Keys of HPC. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Iwan M. Duursma, Pierrick Gaudry, François Morain |
Speeding up the Discrete Log Computation on Curves with Automorphisms. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto |
A Quick Group Key Distribution Scheme with "Entity Revocation". |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yongge Wang |
Linear Complexity versus Pseudorandomness: On Beth and Dai's Result. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Yongge Wang |
Approximation Hardness and Secure Communication in Broadcast Channels. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Sarbani Palit, Bimal K. Roy |
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
On the Lai-Massey Scheme. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih |
On the Design of RSA with Short Secret Exponent. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Haruki Seki, Toshinobu Kaneko |
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yair Frankel, Philip D. MacKenzie, Moti Yung |
Adaptively-Secure Optimal-Resilience Proactive RSA. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Huaxiong Wang |
Broadcast Authentication in Group Communication. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Simon R. Blackburn, Steven D. Galbraith |
Cryptanalysis of Two Cryptosystems Based on Group Actions. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Junji Shikata, Yuliang Zheng 0001, Joe Suzuki, Hideki Imai |
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Mike Burmester, Yvo Desmedt |
Secure Communication in an Unknown Network Using Certificates. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Tatsuaki Okamoto |
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Satoh, Tetsu Iwata, Kaoru Kurosawa |
On Cryptographically Secure Vectorial Boolean Functions. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yongfei Han, Peng-Chor Leong, Peng-Chong Tan, Jiang Zhang |
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Erik Woodward Knudsen |
Elliptic Scalar Multiplication Using Point Halving. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng 0001, Hideki Imai |
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan |
How to Prove That a Committed Number Is Prime. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Numao |
Periodical Multi-secret Threshold Cryptosystems. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Fitzi, Martin Hirt, Ueli M. Maurer |
General Adversaries in Unconditional Multi-party Computation. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe |
Mix-Networks on Permutation Networks. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei |
A Class of Explicit Perfect Multi-sequences. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing (eds.) |
Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Paul C. Leyland, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman J. J. te Riele, Paul Zimmermann |
Factorization of RSA-140 Using the Number Field Sieve. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Detlef Hühnlein, Tsuyoshi Takagi |
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. |
ASIACRYPT |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii |
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Henri Cohen, Atsuko Miyaji, Takatoshi Ono |
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama |
Efficient Implementation of Schoof's Algorithm. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohta, Dingyi Pei (eds.) |
Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra |
Generating RSA Moduli with a Predetermined Portion. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Yasuyuki Sakai, Kouichi Sakurai |
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Mike Burmester, Yvo Desmedt, Jennifer Seberry |
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
auctions with closed bids, time stamps, key escrow |
1 | Wenbo Mao, Chae Hoon Lim |
Cryptanalysis in Prime Order Subgroups of Z*n. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Joseph H. Silverman, Joe Suzuki |
Elliptic Curve Discrete Logarithms and the Index Calculus. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam |
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
cryptanalysis, public key cryptosystem, finite automaton |
1 | Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater |
Audio and Optical Cryptography. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Anne Canteaut, Nicolas Sendrier |
Cryptanalysis of the Original McEliece Cryptosystem. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye |
Improved Truncated Differential Attacks on SAFER. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Ernest Foo |
Off-Line Fair Payment Protocols Using Convertible Signatures. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Pornin |
Optimal Resistance Against the Davies and Murphy Attack. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Phong Q. Nguyen, Jacques Stern |
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Min Sun |
Improving the Security of the McEliece Public-Key Cryptosystem. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Yair Frankel, Yiannis Tsiounis, Moti Yung |
Fair Off-Line e-cash Made Easy. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Burton S. Kaliski Jr. |
ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract). |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Chae Hoon Lim, Pil Joong Lee |
A Study on the Proposed Korean Digital Signature Algorithm. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye |
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Donald Beaver |
Adaptively Secure Oblivious Transfer. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Johansson 0001 |
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Poupard, Jacques Stern |
Generation of Shared RSA Keys by Two Parties. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Julien P. Stern |
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege |
Analysis Methods for (Alleged) RC4. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Patarin, Louis Goubin, Nicolas T. Courtois |
C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester |
Some Bounds and a Construction for Secure Broadcast Encryption. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |
1 | Wen Feng Qi, Jun-Hui Yang, Jing Jun Zhou |
ML-Sequences over Rings Z/(2e)*: I. Constructions of Nondegenerative ML-Sequences II. Injectiveness of Compression Mappings of New Classes. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
nondegenerate ML-sequence, quasi-period, injective compression mapping |
1 | Reihaneh Safavi-Naini, Huaxiong Wang |
Bounds and Constructions for Multireceiver Authentication Codes. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Glenn Durfee, Yair Frankel |
An Attack on RSA Given a Small Fraction of the Private Key Bits. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002 |
Efficient Fair Exchange with Verifiable Confirmation of Signatures. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Jan Camenisch, Markus Michels |
A Group Signature Scheme with Improved Efficiency. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
Group signature scheme for large groups, revocable anonymity, digital signature schemes |
1 | Ross J. Anderson, Serge Vaudenay |
Minding your p's and q's. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Dieter Gollmann |
Observations on Non-repudiation. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
non-repudiation, communications security, ISO standards |
1 | Kouichi Sakurai |
A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Kevin S. McCurley |
Cryptography and the Internet: Lessons and Challenges. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Seongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung |
On the Correlation Immune Functions and Their Nonlinearity. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Agnes Hui Chan, Yair Frankel, Philip D. MacKenzie, Yiannis Tsiounis |
Mis-representation of Identities in E-cash Schemes and how to Prevent it. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Philip Hawkes, Luke O'Connor |
On Applying Linear Cryptanalysis to IDEA. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Shigeo Tsujii |
Electronic Money and Key Management from Global and Regional Points of View. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Yair Frankel, Yiannis Tsiounis, Moti Yung |
"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Markus Michels, Patrick Horster |
On the Risk of Disruption in Several Multiparty Signature Schemes. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Erik De Win, Antoon Bosselaers, Servaas Vandenberghe, Peter De Gersem, Joos Vandewalle |
A Fast Software Implementation for Arithmetic Operations in GF(2n). |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Chun-I Fan, Chin-Laung Lei |
A Multi-Recastable Ticket Scheme for Electronic Elections. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Mike Just, Serge Vaudenay |
Authenticated Multi-Party Key Agreement. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
confirmation, authentication, key agreement, forward secrecy |
1 | David M'Raïhi |
Cost-Effective Payment Schemes with Privacy Regulation. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Stern |
The Validation of Cryptographic Algorithms. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Kwangjo Kim, Tsutomu Matsumoto (eds.) |
Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Kaisa Nyberg |
Generalized Feistel Networks. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Markus Michels, Patrick Horster |
Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting Scheme. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto |
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Kazukuni Kobara, Hideki Imai |
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Bleichenbacher, Ueli M. Maurer |
On the Efficiency of One-Time Digital Signatures. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
Cryptography, Digital signature, Directed acyclic graph, One-way function, Partially ordered set |
1 | Masayuki Abe, Eiichiro Fujisaki |
How to Date Blind Signatures. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra |
Generating Standard DSA Signatures Without Long Inversion. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Florent Chabaud, Jacques Stern |
The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance Codes. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park |
Conditional Correlation Attack on Nonlinear Filter Generators. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Valeri Korjik, D. Kushnir |
Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main Channel. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Stefan Wolf 0001 |
Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
Cryptography, Information theory, Unconditional security, Secret key agreement |
1 | Ingrid Biehl, Bernd Meyer 0002, Christoph Thiel |
Cryptographic Protocols Based on Real-Quadratic A-fields. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Seungjoo Kim, Sungjun Park, Dongho Won |
Convertible Group Signatures. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | James Cowie, Bruce Dodson, R. Marije Elkenbracht-Huizing, Arjen K. Lenstra, Peter L. Montgomery, Jörg Zayer |
A World Wide Number Field Sieve Factoring Record: On to 512 Bits. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | David Pointcheval, Jacques Stern |
Provably Secure Blind Signature Schemes. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen, Bart Preneel |
Hash Functions Based on Block Ciphers and Quaternary Codes. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Willi Geiselmann, Dieter Gollmann |
Correlation Attacks on Cascades of Clock Controlled Shift Registers. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Takashi Satoh |
Generalization of Higher Order SAC to Vector Output Boolean Functions. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji |
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|