ASIACRYPT A

48 papers

YearTitle / Authors
2000A Length-Invariant Hybrid Mix.
Miyako Ohkubo, Masayuki Abe
2000A New Forward-Secure Digital Signature Scheme.
Michel Abdalla, Leonid Reyzin
2000A Note on Security Proofs in the Generic Model.
Marc Fischlin
2000Addition of ElGamal Plaintexts.
Markus Jakobsson, Ari Juels
2000Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings
Tatsuaki Okamoto
2000Anonymous Fingerprinting with Direct Non-repudiation.
Birgit Pfitzmann, Ahmad-Reza Sadeghi
2000Attack for Flash MIX.
Masashi Mitomo, Kaoru Kurosawa
2000Attacking and Repairing Batch Verification Schemes.
Colin Boyd, Chris Pavlovski
2000Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
Mihir Bellare, Chanathip Namprempre
2000CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government.
Hideki Imai, Atsuhiro Yamagishi
2000Commital Deniable Proofs and Electronic Campaign Finance.
Matthew K. Franklin, Tomas Sander
2000Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications.
Anand Desai, Sara K. Miner
2000Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems.
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii
2000Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99.
Glenn Durfee, Phong Q. Nguyen
2000Cryptanalysis of the TTM Cryptosystem.
Louis Goubin, Nicolas T. Courtois
2000Cryptanalysis of the Yi-Lam Hash.
David A. Wagner
2000Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
Alex Biryukov, Adi Shamir
2000Cryptography Everywhere.
Thomas A. Berson
2000Distributed Oblivious Transfer.
Moni Naor, Benny Pinkas
2000Efficient Anonymous Fingerprinting with Group Signatures.
Jan Camenisch
2000Efficient Secure Multi-party Computation.
Martin Hirt, Ueli M. Maurer, Bartosz Przydatek
2000Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography.
Mihir Bellare, Phillip Rogaway
2000Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers.
Philip Hawkes, Gregory G. Rose
2000From Fixed-Length to Arbitrary-Length RSA Padding Schemes.
Jean-Sébastien Coron, François Koeune, David Naccache
2000Improved Methods to Perform Threshold RSA.
Brian King
2000Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques.
Michel Abdalla, Mihir Bellare
2000Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems.
Danny Gutfreund, Michael Ben-Or
2000Key Improvements to XTR.
Arjen K. Lenstra, Eric R. Verheul
2000Mix and Match: Secure Function Evaluation via Ciphertexts.
Markus Jakobsson, Ari Juels
2000On Relationships among Avalanche, Nonlinearity, and Correlation Immunity.
Yuliang Zheng, Xian-Mo Zhang
2000On the Pseudorandomness of Top-Level Schemes of Block Ciphers.
Shiho Moriai, Serge Vaudenay
2000Password-Authenticated Key Exchange Based on RSA.
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
2000Power Analysis, What Is Now Possible....
Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart
2000Proofs of Security for the Unix Password Hashing Algorithm.
David A. Wagner, Ian Goldberg
2000Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park
2000Provably Secure Metering Scheme.
Wakaha Ogata, Kaoru Kurosawa
2000Round-Efficient Conference Key Agreement Protocols with Provable Security.
Wen-Guey Tzeng, Zhi-Jia Tzeng
2000Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
Safuat Hamdy, Bodo Möller
2000Security of Signed ElGamal Encryption.
Claus-Peter Schnorr, Markus Jakobsson
2000Strengthening McEliece Cryptosystem.
Pierre Loidreau
2000The Security of Chaffing and Winnowing.
Mihir Bellare, Alexandra Boldyreva
2000Towards Signature-Only Signature Schemes.
Adam L. Young, Moti Yung
2000Trapdooring Discrete Logarithms on Elliptic Curves over Rings.
Pascal Paillier
2000Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
2000Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes.
Jan Camenisch, Ivan Damgård
2000Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three.
Seigo Arita
2000Why Textbook ElGamal and RSA Encryption Are Insecure.
Dan Boneh, Antoine Joux, Phong Q. Nguyen
2000Zero-Knowledge and Code Obfuscation.
Satoshi Hada