


default search action
2. PKC 1999: Kamakura, Japan
- Hideki Imai, Yuliang Zheng:

Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings. Lecture Notes in Computer Science 1560, Springer 1999, ISBN 3-540-65644-8 - Feng Bao, Robert H. Deng

:
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. 1-11 - Chang-Hyi Le, Jong In Lim:

A New Aspect of Dual Basis for Efficient Field Arithmetic. 12-28 - Jean-Sébastien Coron:

On the Security of Random Sources. 29-42 - Josep Domingo-Ferrer:

Anonymous Fingerprinting Based on Committed Oblivious Transfer. 43-52 - Eiichiro Fujisaki, Tatsuaki Okamoto:

How to Enhance the Security of Public-Key Encryption at Minimum Cost. 53-68 - Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng

:
Encrypted Message Authentication by Firewalls. 69-81 - Satoshi Hada, Toshiaki Tanaka:

A Relationship between One-Wayness and Correlation Intractability. 82-96 - Hyung-Woo Lee, Tai-Yun Kim:

Message Recovery Fair Blind Signature. 97-111 - Markus Jakobsson:

On Quorum Controlled Asymmetric Proxy Re-encryption. 112-121 - Markus Jakobsson:

Mini-Cash: A Minimalistic Approach to E-Commerce. 122-135 - Pekka Nikander, Yki Kortesniemi, Jonna Partanen:

Preserving Privacy in Distributed Delegation with Fast Certificates. 136-153 - Simon Blake-Wilson, Alfred Menezes:

Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. 154-170 - Shingo Miyazaki, Ikuko Kuroda

, Kouichi Sakurai:
Toward Fair International Key Escrow. 171-187 - David Naccache, Adi Shamir, Julien P. Stern:

How to Copyright a Function? 188-196 - Jean-Sébastien Coron, David Naccache:

On the Security of RSA Screening. 197-203 - Christophe Coupé, Phong Q. Nguyen, Jacques Stern:

The Effectiveness of Lattice Attacks Against Low-Exponent RSA. 204-218 - Pascal Paillier:

A Trapdoor Permutation Equivalent to Factoring. 219-222 - Pascal Paillier:

Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor. 223-234 - Pascal Paillier:

Evaluating Differential Fault Analysis of Unknown Cryptosystems. 235-244 - Montse Rubia, Juan Carlos Cruellas, Manuel Medina

:
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. 245-262 - Sang-Uk Shin, Kyung Hyune Rhee, Jae Woo Yoon:

Hash Functions and the MAC Using All-or-Nothing Property. 263-275 - Helena Handschuh, Yiannis Tsiounis, Moti Yung:

Decision Oracles are Equivalent to Matching Oracles. 276-289 - Yuji Watanabe, Hideki Imai:

Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. 290-305 - Adam L. Young, Moti Yung:

Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. 306-314 - Jianying Zhou, Kwok-Yan Lam:

A Secure Pay-per View Scheme for Web-Based Video Service. 315-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














