default search action
ASIACRYPT 1999: Singapore
- Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing:
Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings. Lecture Notes in Computer Science 1716, Springer 1999, ISBN 3-540-66666-4
Invited Talk
- Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro:
Modulus Search for Elliptic Curve Cryptosystems. 1-7
Asymmetric Key Cryptosystems
- Serge Vaudenay:
On the Lai-Massey Scheme. 8-19 - Takashi Satoh, Tetsu Iwata, Kaoru Kurosawa:
On Cryptographically Secure Vectorial Boolean Functions. 20-28
Analysis
- Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen:
Equivalent Keys of HPC. 29-42 - Haruki Seki, Toshinobu Kaneko:
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials. 43-51 - Simon R. Blackburn, Steven D. Galbraith:
Cryptanalysis of Two Cryptosystems Based on Group Actions. 52-61 - Tetsu Iwata, Kaoru Kurosawa:
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. 62-74
Elliptic Curve Cryptosystems
- Yongfei Han, Peng-Chor Leong, Peng-Chong Tan, Jiang Zhang:
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field. 75-85 - Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. 86-102 - Iwan M. Duursma, Pierrick Gaudry, François Morain:
Speeding up the Discrete Log Computation on Curves with Automorphisms. 103-121 - Jean-Sébastien Coron, Helena Handschuh, David Naccache:
ECC: Do We Need to Count? 122-134 - Erik Woodward Knudsen:
Elliptic Scalar Multiplication Using Point Halving. 135-149
Public Key Cryptosystems
- Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih:
On the Design of RSA with Short Secret Exponent. 150-164 - Pascal Paillier, David Pointcheval:
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries. 165-179 - Yair Frankel, Philip D. MacKenzie, Moti Yung:
Adaptively-Secure Optimal-Resilience Proactive RSA. 180-194
Integers and Computation
- Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Paul C. Leyland, Walter M. Lioen, Peter L. Montgomery, Brian Murphy, Herman J. J. te Riele, Paul Zimmermann:
Factorization of RSA-140 Using the Number Field Sieve. 195-207 - Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan:
How to Prove That a Committed Number Is Prime. 208-218 - Detlef Hühnlein, Tsuyoshi Takagi:
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. 219-231 - Matthias Fitzi, Martin Hirt, Ueli M. Maurer:
General Adversaries in Unconditional Multi-party Computation. 232-246
Network Security
- Yvo Desmedt, Yongge Wang:
Approximation Hardness and Secure Communication in Broadcast Channels. 247-257 - Masayuki Abe:
Mix-Networks on Permutation Networks. 258-273 - Mike Burmester, Yvo Desmedt:
Secure Communication in an Unknown Network Using Certificates. 274-287
Random Number
- Yongge Wang:
Linear Complexity versus Pseudorandomness: On Beth and Dai's Result. 288-298 - Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei:
A Class of Explicit Perfect Multi-sequences. 299-305 - Sarbani Palit, Bimal K. Roy:
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function. 306-320
Key Management
- Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheul:
Doing More with Fewer Bits. 321-332 - Jun Anzai, Natsume Matsuzaki, Tsutomu Matsumoto:
A Quick Group Key Distribution Scheme with "Entity Revocation". 333-347 - Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. 348-362 - Masayuki Numao:
Periodical Multi-secret Threshold Cryptosystems. 363-377
Authentication
- Masayuki Abe, Tatsuaki Okamoto:
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm. 378-389 - Yejing Wang, Reihaneh Safavi-Naini:
A3-Codes under Collusion Attacks. 390-398 - Reihaneh Safavi-Naini, Huaxiong Wang:
Broadcast Authentication in Group Communication. 399-411
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.