ASIACRYPT A

33 papers

YearTitle / Authors
1998A Group Signature Scheme with Improved Efficiency.
Jan Camenisch, Markus Michels
1998A New Efficient All-Or-Nothing Disclosure of Secrets Protocol.
Julien P. Stern
1998A Study on the Proposed Korean Digital Signature Algorithm.
Chae Hoon Lim, Pil Joong Lee
1998Adaptively Secure Oblivious Transfer.
Donald Beaver
1998Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings
Kazuo Ohta, Dingyi Pei
1998An Attack on RSA Given a Small Fraction of the Private Key Bits.
Dan Boneh, Glenn Durfee, Yair Frankel
1998Analysis Methods for (Alleged) RC4.
Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege
1998Audio and Optical Cryptography.
Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater
1998Bounds and Constructions for Multireceiver Authentication Codes.
Reihaneh Safavi-Naini, Huaxiong Wang
1998Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings.
Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii
1998Cryptanalysis in Prime Order Subgroups of
Wenbo Mao, Chae Hoon Lim
1998Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers.
Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
1998Cryptanalysis of the Original McEliece Cryptosystem.
Anne Canteaut, Nicolas Sendrier
1998Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F
Yasuyuki Sakai, Kouichi Sakurai
1998ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract).
Burton S. Kaliski Jr.
1998Efficient Elliptic Curve Exponentiation Using Mixed Coordinates.
Henri Cohen, Atsuko Miyaji, Takatoshi Ono
1998Efficient Fair Exchange with Verifiable Confirmation of Signatures.
Liqun Chen
1998Efficient Implementation of Schoof's Algorithm.
Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
1998Elliptic Curve Discrete Logarithms and the Index Calculus.
Joseph H. Silverman, Joe Suzuki
1998Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically).
Mike Burmester, Yvo Desmedt, Jennifer Seberry
1998Fair Off-Line e-cash Made Easy.
Yair Frankel, Yiannis Tsiounis, Moti Yung
1998Generating RSA Moduli with a Predetermined Portion.
Arjen K. Lenstra
1998Generation of Shared RSA Keys by Two Parties.
Guillaume Poupard, Jacques Stern
1998Improved Truncated Differential Attacks on SAFER.
Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
1998Improving the Security of the McEliece Public-Key Cryptosystem.
Hung-Min Sun
1998ML-Sequences over Rings
Wen Feng Qi, Jun-Hui Yang, Jing Jun Zhou
1998Off-Line Fair Payment Protocols Using Convertible Signatures.
Colin Boyd, Ernest Foo
1998Optimal Resistance Against the Davies and Murphy Attack.
Thomas Pornin
1998Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators.
Thomas Johansson
1998Some Bounds and a Construction for Secure Broadcast Encryption.
Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester
1998Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement.
Stefan Wolf
1998The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure.
Phong Q. Nguyen, Jacques Stern
1998Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC.
Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam