default search action
Search dblp for Publications
export results for "toc:db/conf/asiacrypt/asiacrypt98.bht:"
@inproceedings{DBLP:conf/asiacrypt/Beaver98, author = {Donald Beaver}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Adaptively Secure Oblivious Transfer}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {300--314}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_24}, doi = {10.1007/3-540-49649-1\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Beaver98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonehDF98, author = {Dan Boneh and Glenn Durfee and Yair Frankel}, editor = {Kazuo Ohta and Dingyi Pei}, title = {An Attack on {RSA} Given a Small Fraction of the Private Key Bits}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {25--34}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_3}, doi = {10.1007/3-540-49649-1\_3}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonehDF98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoydF98, author = {Colin Boyd and Ernest Foo}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Off-Line Fair Payment Protocols Using Convertible Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {271--285}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_22}, doi = {10.1007/3-540-49649-1\_22}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoydF98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BurmesterDS98, author = {Mike Burmester and Yvo Desmedt and Jennifer Seberry}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {380--391}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_30}, doi = {10.1007/3-540-49649-1\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BurmesterDS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CamenischM98, author = {Jan Camenisch and Markus Michels}, editor = {Kazuo Ohta and Dingyi Pei}, title = {A Group Signature Scheme with Improved Efficiency}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {160--174}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_14}, doi = {10.1007/3-540-49649-1\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CamenischM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CanteautS98, author = {Anne Canteaut and Nicolas Sendrier}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Cryptanalysis of the Original McEliece Cryptosystem}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {187--199}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_16}, doi = {10.1007/3-540-49649-1\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CanteautS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChaoNST98, author = {Jinhui Chao and Osamu Nakamura and Kohji Sobataka and Shigeo Tsujii}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Construction of Secure Elliptic Cryptosystems Using {CM} Tests and Liftings}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {95--109}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_9}, doi = {10.1007/3-540-49649-1\_9}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChaoNST98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Chen98, author = {Liqun Chen}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Efficient Fair Exchange with Verifiable Confirmation of Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {286--299}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_23}, doi = {10.1007/3-540-49649-1\_23}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Chen98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CohenMO98, author = {Henri Cohen and Atsuko Miyaji and Takatoshi Ono}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Efficient Elliptic Curve Exponentiation Using Mixed Coordinates}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {51--65}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_6}, doi = {10.1007/3-540-49649-1\_6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CohenMO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DaiYL98, author = {Zong{-}Duo Dai and Dingfeng Ye and Kwok{-}Yan Lam}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Weak Invertibiity of Finite Automata and Cryptanalysis on {FAPKC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {227--241}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_19}, doi = {10.1007/3-540-49649-1\_19}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DaiYL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DesmedtHQ98, author = {Yvo Desmedt and Shuang Hou and Jean{-}Jacques Quisquater}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Audio and Optical Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {392--404}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_31}, doi = {10.1007/3-540-49649-1\_31}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DesmedtHQ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FrankelTY98, author = {Yair Frankel and Yiannis Tsiounis and Moti Yung}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Fair Off-Line e-cash Made Easy}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {257--270}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_21}, doi = {10.1007/3-540-49649-1\_21}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FrankelTY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/IzuKNY98, author = {Tetsuya Izu and Jun Kogure and Masayuki Noro and Kazuhiro Yokoyama}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Efficient Implementation of Schoof's Algorithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {66--79}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_7}, doi = {10.1007/3-540-49649-1\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/IzuKNY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Johansson98, author = {Thomas Johansson}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {342--356}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_27}, doi = {10.1007/3-540-49649-1\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Johansson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Kaliski98, author = {Burton S. Kaliski Jr.}, editor = {Kazuo Ohta and Dingyi Pei}, title = {{ECC/DLP} and Fractoring-Based Cryptography: {A} Tale of Two Families (Abstract)}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {50}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_5}, doi = {10.1007/3-540-49649-1\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Kaliski98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98, author = {Lars R. Knudsen and Willi Meier and Bart Preneel and Vincent Rijmen and Sven Verdoolaege}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Analysis Methods for (Alleged) {RC4}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {327--341}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_26}, doi = {10.1007/3-540-49649-1\_26}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenMPRV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaYDB98, author = {Kaoru Kurosawa and Takuya Yoshida and Yvo Desmedt and Mike Burmester}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Some Bounds and a Construction for Secure Broadcast Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {420--433}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_33}, doi = {10.1007/3-540-49649-1\_33}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaYDB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Lenstra98, author = {Arjen K. Lenstra}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Generating {RSA} Moduli with a Predetermined Portion}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {1--10}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_1}, doi = {10.1007/3-540-49649-1\_1}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Lenstra98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LimL98, author = {Chae Hoon Lim and Pil Joong Lee}, editor = {Kazuo Ohta and Dingyi Pei}, title = {A Study on the Proposed Korean Digital Signature Algorithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {175--186}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_15}, doi = {10.1007/3-540-49649-1\_15}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LimL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MaoL98, author = {Wenbo Mao and Chae Hoon Lim}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Cryptanalysis in Prime Order Subgroups of \emph{Z}\({}^{\mbox{*}}\)\({}_{\mbox{n}}\)}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {214--226}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_18}, doi = {10.1007/3-540-49649-1\_18}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MaoL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NguyenS98, author = {Phong Q. Nguyen and Jacques Stern}, editor = {Kazuo Ohta and Dingyi Pei}, title = {The B{\'{e}}guin-Quisquater Server-Aided {RSA} Protocol from Crypto '95 is not Secure}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {372--379}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_29}, doi = {10.1007/3-540-49649-1\_29}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NguyenS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatarinGC98, author = {Jacques Patarin and Louis Goubin and Nicolas T. Courtois}, editor = {Kazuo Ohta and Dingyi Pei}, title = {\emph{C}\({}^{\mbox{*}}\)\({}_{\mbox{-+}}\) and {HM:} Variations Around Two Schemes of T. Matsumoto and H. Imai}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {35--49}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_4}, doi = {10.1007/3-540-49649-1\_4}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatarinGC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Pornin98, author = {Thomas Pornin}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Optimal Resistance Against the Davies and Murphy Attack}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {148--159}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_13}, doi = {10.1007/3-540-49649-1\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Pornin98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PoupardS98, author = {Guillaume Poupard and Jacques Stern}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Generation of Shared {RSA} Keys by Two Parties}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {11--24}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_2}, doi = {10.1007/3-540-49649-1\_2}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PoupardS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/QiYZ98, author = {Wen Feng Qi and Jun{-}Hui Yang and Jing Jun Zhou}, editor = {Kazuo Ohta and Dingyi Pei}, title = {ML-Sequences over Rings \emph{Z/(2\({}^{\mbox{e}}\))}\({}^{\mbox{*}}\): I. Constructions of Nondegenerative ML-Sequences {II.} Injectiveness of Compression Mappings of New Classes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {315--326}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_25}, doi = {10.1007/3-540-49649-1\_25}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/QiYZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Safavi-NainiW98, author = {Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Bounds and Constructions for Multireceiver Authentication Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {242--256}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_20}, doi = {10.1007/3-540-49649-1\_20}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Safavi-NainiW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SakaiS98, author = {Yasuyuki Sakai and Kouichi Sakurai}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F\({}_{\mbox{2}}\)n}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {80--94}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_8}, doi = {10.1007/3-540-49649-1\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SakaiS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SilvermanS98, author = {Joseph H. Silverman and Joe Suzuki}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Elliptic Curve Discrete Logarithms and the Index Calculus}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {110--125}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_10}, doi = {10.1007/3-540-49649-1\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SilvermanS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Stern98, author = {Julien P. Stern}, editor = {Kazuo Ohta and Dingyi Pei}, title = {A New Efficient All-Or-Nothing Disclosure of Secrets Protocol}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {357--371}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_28}, doi = {10.1007/3-540-49649-1\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Stern98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Sun98, author = {Hung{-}Min Sun}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Improving the Security of the McEliece Public-Key Cryptosystem}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {200--213}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_17}, doi = {10.1007/3-540-49649-1\_17}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Sun98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Wolf98, author = {Stefan Wolf}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {405--419}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_32}, doi = {10.1007/3-540-49649-1\_32}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Wolf98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WuBDY98, author = {Hongjun Wu and Feng Bao and Robert H. Deng and Qin{-}Zhong Ye}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {126--132}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_11}, doi = {10.1007/3-540-49649-1\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WuBDY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WuBDY98a, author = {Hongjun Wu and Feng Bao and Robert H. Deng and Qin{-}Zhong Ye}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Improved Truncated Differential Attacks on {SAFER}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {133--147}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_12}, doi = {10.1007/3-540-49649-1\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WuBDY98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/1998, editor = {Kazuo Ohta and Dingyi Pei}, title = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1}, doi = {10.1007/3-540-49649-1}, isbn = {3-540-65109-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.