default search action
2. PKC 1999: Kamakura, Japan
- Hideki Imai, Yuliang Zheng:
Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings. Lecture Notes in Computer Science 1560, Springer 1999, ISBN 3-540-65644-8 - Feng Bao, Robert H. Deng:
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. 1-11 - Chang-Hyi Le, Jong In Lim:
A New Aspect of Dual Basis for Efficient Field Arithmetic. 12-28 - Jean-Sébastien Coron:
On the Security of Random Sources. 29-42 - Josep Domingo-Ferrer:
Anonymous Fingerprinting Based on Committed Oblivious Transfer. 43-52 - Eiichiro Fujisaki, Tatsuaki Okamoto:
How to Enhance the Security of Public-Key Encryption at Minimum Cost. 53-68 - Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng:
Encrypted Message Authentication by Firewalls. 69-81 - Satoshi Hada, Toshiaki Tanaka:
A Relationship between One-Wayness and Correlation Intractability. 82-96 - Hyung-Woo Lee, Tai-Yun Kim:
Message Recovery Fair Blind Signature. 97-111 - Markus Jakobsson:
On Quorum Controlled Asymmetric Proxy Re-encryption. 112-121 - Markus Jakobsson:
Mini-Cash: A Minimalistic Approach to E-Commerce. 122-135 - Pekka Nikander, Yki Kortesniemi, Jonna Partanen:
Preserving Privacy in Distributed Delegation with Fast Certificates. 136-153 - Simon Blake-Wilson, Alfred Menezes:
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. 154-170 - Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai:
Toward Fair International Key Escrow. 171-187 - David Naccache, Adi Shamir, Julien P. Stern:
How to Copyright a Function? 188-196 - Jean-Sébastien Coron, David Naccache:
On the Security of RSA Screening. 197-203 - Christophe Coupé, Phong Q. Nguyen, Jacques Stern:
The Effectiveness of Lattice Attacks Against Low-Exponent RSA. 204-218 - Pascal Paillier:
A Trapdoor Permutation Equivalent to Factoring. 219-222 - Pascal Paillier:
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor. 223-234 - Pascal Paillier:
Evaluating Differential Fault Analysis of Unknown Cryptosystems. 235-244 - Montse Rubia, Juan Carlos Cruellas, Manuel Medina:
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. 245-262 - Sang-Uk Shin, Kyung Hyune Rhee, Jae Woo Yoon:
Hash Functions and the MAC Using All-or-Nothing Property. 263-275 - Helena Handschuh, Yiannis Tsiounis, Moti Yung:
Decision Oracles are Equivalent to Matching Oracles. 276-289 - Yuji Watanabe, Hideki Imai:
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. 290-305 - Adam L. Young, Moti Yung:
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. 306-314 - Jianying Zhou, Kwok-Yan Lam:
A Secure Pay-per View Scheme for Web-Based Video Service. 315-326
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.