:facetid:stream:\"streams/conf/vietcrypt\"OK:facetid:stream:streams/conf/vietcryptRoberto Maria AvanziFrancesco Sica 0001Scalar Multiplication on Koblitz Curves Using Double Bases.VIETCRYPT131-1462006Conference and Workshop Papersclosedconf/vietcrypt/AvanziS0610.1007/11958239_9https://doi.org/10.1007/11958239_9https://dblp.org/rec/conf/vietcrypt/AvanziS06URL#5793056Jens-Matthias BohliBenjamin GlasRainer SteinwandtTowards Provably Secure Group Key Agreement Building on Group Theory.VIETCRYPT322-3362006Conference and Workshop Papersclosedconf/vietcrypt/BohliGS0610.1007/11958239_22https://doi.org/10.1007/11958239_22https://dblp.org/rec/conf/vietcrypt/BohliGS06URL#5793057Jens-Matthias BohliRainer SteinwandtDeniable Group Key Agreement.VIETCRYPT298-3112006Conference and Workshop Papersclosedconf/vietcrypt/BohliS0610.1007/11958239_20https://doi.org/10.1007/11958239_20https://dblp.org/rec/conf/vietcrypt/BohliS06URL#5793058Sherman S. M. ChowWilly SusiloTsz Hon YuenEscrowed Linkability of Ring Signatures and Its Applications.VIETCRYPT175-1922006Conference and Workshop Papersclosedconf/vietcrypt/ChowSY0610.1007/11958239_12https://doi.org/10.1007/11958239_12https://dblp.org/rec/conf/vietcrypt/ChowSY06URL#5793059Cécile DelerabléeDavid PointchevalDynamic Fully Anonymous Short Group Signatures.VIETCRYPT193-2102006Conference and Workshop Papersclosedconf/vietcrypt/DelerableeP0610.1007/11958239_13https://doi.org/10.1007/11958239_13https://dblp.org/rec/conf/vietcrypt/DelerableeP06URL#5793060Hossein GhodosiJosef PieprzykAn Ideal and Robust Threshold RSA.VIETCRYPT312-3212006Conference and Workshop Papersclosedconf/vietcrypt/GhodosiP0610.1007/11958239_21https://doi.org/10.1007/11958239_21https://dblp.org/rec/conf/vietcrypt/GhodosiP06URL#5793061Aline GougetJacques PatarinProbabilistic Multivariate Cryptography.VIETCRYPT1-182006Conference and Workshop Papersclosedconf/vietcrypt/GougetP0610.1007/11958239_1https://doi.org/10.1007/11958239_1https://dblp.org/rec/conf/vietcrypt/GougetP06URL#5793062Fumitaka HoshinoTetsutaro KobayashiKazumaro AokiCompressed Jacobian Coordinates for OEF.VIETCRYPT147-1562006Conference and Workshop Papersclosedconf/vietcrypt/HoshinoKA0610.1007/11958239_10https://doi.org/10.1007/11958239_10https://dblp.org/rec/conf/vietcrypt/HoshinoKA06URL#5793063Jianyong HuangJennifer SeberryWilly SusiloOn the Internal Structure of Alpha-MAC.VIETCRYPT271-2852006Conference and Workshop Papersclosedconf/vietcrypt/HuangSS0610.1007/11958239_18https://doi.org/10.1007/11958239_18https://dblp.org/rec/conf/vietcrypt/HuangSS06URL#5793064Kitae JeongJaechul SungSeokhie HongSangjin Lee 0002Jaeheon KimDeukjo HongImproved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.VIETCRYPT260-2702006Conference and Workshop Papersclosedconf/vietcrypt/JeongSHLKH0610.1007/11958239_17https://doi.org/10.1007/11958239_17https://dblp.org/rec/conf/vietcrypt/JeongSHLKH06URL#5793065Eunjin LeeDeukjo HongDonghoon ChangSeokhie HongJongin Lim 0001A Weak Key Class of XTEA for a Related-Key Rectangle Attack.VIETCRYPT286-2972006Conference and Workshop Papersclosedconf/vietcrypt/LeeHCHL0610.1007/11958239_19https://doi.org/10.1007/11958239_19https://dblp.org/rec/conf/vietcrypt/LeeHCHL06URL#5793066Arjen K. LenstraDan PageMartijn StamDiscrete Logarithm Variants of VSH.VIETCRYPT229-2422006Conference and Workshop Papersclosedconf/vietcrypt/LenstraPS0610.1007/11958239_15https://doi.org/10.1007/11958239_15https://dblp.org/rec/conf/vietcrypt/LenstraPS06URL#5793067Jean MonneratSerge VaudenayShort 2-Move Undeniable Signatures.VIETCRYPT19-362006Conference and Workshop Papersclosedconf/vietcrypt/MonneratV0610.1007/11958239_2https://doi.org/10.1007/11958239_2https://dblp.org/rec/conf/vietcrypt/MonneratV06URL#5793068Lan NguyenEfficient Dynamic k-Times Anonymous Authentication.VIETCRYPT81-982006Conference and Workshop Papersclosedconf/vietcrypt/Nguyen0610.1007/11958239_6https://doi.org/10.1007/11958239_6https://dblp.org/rec/conf/vietcrypt/Nguyen06URL#5793069Ryo NishimakiYoshifumi ManabeTatsuaki OkamotoUniversally Composable Identity-Based Encryption.VIETCRYPT337-3532006Conference and Workshop Papersclosedconf/vietcrypt/NishimakiMO0610.1007/11958239_23https://doi.org/10.1007/11958239_23https://dblp.org/rec/conf/vietcrypt/NishimakiMO06URL#5793070Miyako OhkuboMasayuki AbeOn the Definition of Anonymity for Ring Signatures.VIETCRYPT157-1742006Conference and Workshop Papersclosedconf/vietcrypt/OhkuboA0610.1007/11958239_11https://doi.org/10.1007/11958239_11https://dblp.org/rec/conf/vietcrypt/OhkuboA06URL#5793071Tatsuaki OkamotoOn Pairing-Based Cryptosystems.VIETCRYPT50-662006Conference and Workshop Papersclosedconf/vietcrypt/Okamoto0610.1007/11958239_4https://doi.org/10.1007/11958239_4https://dblp.org/rec/conf/vietcrypt/Okamoto06URL#5793072Duong Hieu PhanTraitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.VIETCRYPT354-3652006Conference and Workshop Papersclosedconf/vietcrypt/Phan0610.1007/11958239_24https://doi.org/10.1007/11958239_24https://dblp.org/rec/conf/vietcrypt/Phan06URL#5793073Thi Lan Anh PhanYumiko HanaokaGoichiro HanaokaKanta MatsuuraHideki ImaiReducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.VIETCRYPT366-3842006Conference and Workshop Papersclosedconf/vietcrypt/PhanHHMI0610.1007/11958239_25https://doi.org/10.1007/11958239_25https://dblp.org/rec/conf/vietcrypt/PhanHHMI06URL#5793074Matthew J. B. RobshawSearching for Compact Algorithms: cgen.VIETCRYPT37-492006Conference and Workshop Papersclosedconf/vietcrypt/Robshaw0610.1007/11958239_3https://doi.org/10.1007/11958239_3https://dblp.org/rec/conf/vietcrypt/Robshaw06URL#5793075Phillip RogawayFormalizing Human Ignorance.VIETCRYPT211-2282006Conference and Workshop Papersclosedconf/vietcrypt/Rogaway0610.1007/11958239_14https://doi.org/10.1007/11958239_14https://dblp.org/rec/conf/vietcrypt/Rogaway06URL#5793076Bagus SantosoNoboru KunihiroNaoki KanayamaKazuo OhtaFactorization of Square-Free Integers with High Bits Known.VIETCRYPT115-1302006Conference and Workshop Papersclosedconf/vietcrypt/SantosoKKO0610.1007/11958239_8https://doi.org/10.1007/11958239_8https://dblp.org/rec/conf/vietcrypt/SantosoKKO06URL#5793077Yu SasakiYusuke Naito 0001Jun YajimaTakeshi ShimoyamaNoboru KunihiroKazuo OhtaHow to Construct Sufficient Conditions for Hash Functions.VIETCRYPT243-2592006Conference and Workshop Papersclosedconf/vietcrypt/SasakiNYSKO0610.1007/11958239_16https://doi.org/10.1007/11958239_16https://dblp.org/rec/conf/vietcrypt/SasakiNYSKO06URL#5793078Claire WhelanMichael ScottSide Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?VIETCRYPT99-1142006Conference and Workshop Papersclosedconf/vietcrypt/WhelanS0610.1007/11958239_7https://doi.org/10.1007/11958239_7https://dblp.org/rec/conf/vietcrypt/WhelanS06URL#5793079Fangguo ZhangXiaofeng Chen 0001Willy SusiloYi Mu 0001A New Signature Scheme Without Random Oracles from Bilinear Pairings.VIETCRYPT67-802006Conference and Workshop Papersclosedconf/vietcrypt/ZhangCSM0610.1007/11958239_5https://doi.org/10.1007/11958239_5https://dblp.org/rec/conf/vietcrypt/ZhangCSM06URL#5793080Phong Q. NguyenProgressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected PapersVIETCRYPTLecture Notes in Computer Science4341Springer2006Editorshipconf/vietcrypt/200610.1007/11958239https://doi.org/10.1007/11958239https://dblp.org/rec/conf/vietcrypt/2006URL#5802009