Cryptographers' World
 

ASIACRYPT 1998


[Sort by page number] [Sort by citations count]

 
Kazuo OhtaDingyi Pei, editors, Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings. Springer, 1998. ISBN 3-540-65109-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Arjen K. Lenstra,  Generating RSA Moduli with a Predetermined Portion, pp. 1 - 10, ASIACRYPT 1998.

[Electronic Edition][Cited 55 times Red Star]

Guillaume Poupard,  Jacques Stern,  Generation of Shared RSA Keys by Two Parties, pp. 11 - 24, ASIACRYPT 1998.

[Electronic Edition][Cited 40 times ]

Dan Boneh,  Glenn Durfee,  Yair Frankel,  An Attack on RSA Given a Small Fraction of the Private Key Bits, pp. 25 - 34, ASIACRYPT 1998.

[Electronic Edition][Cited 95 times Red Star]

Jacques Patarin,  Louis Goubin,  Nicolas Courtois,  C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai, pp. 35 - 49, ASIACRYPT 1998.

[Electronic Edition][Cited 73 times Red Star]

Burton S. Kaliski Jr.,  ECC/DLP and Fractoring-Based Cryptography: A Tale of Two Families (Abstract), pp. 50 - 50, ASIACRYPT 1998.

[Electronic Edition][No citation]

Henri Cohen,  Atsuko Miyaji,  Takatoshi Ono,  Efficient Elliptic Curve Exponentiation Using Mixed Coordinates, pp. 51 - 65, ASIACRYPT 1998.

[Electronic Edition][Cited 353 times Red StarRed StarRed Star]

Tetsuya Izu,  Jun Kogure,  Masayuki Noro,  Kazuhiro Yokoyama,  Efficient Implementation of Schoof's Algorithm, pp. 66 - 79, ASIACRYPT 1998.

[Electronic Edition][Cited 26 times ]

Yasuyuki Sakai,  Kouichi Sakurai,  Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F, pp. 80 - 94, ASIACRYPT 1998.

[Electronic Edition][Cited 31 times ]

Jinhui Chao,  Osamu Nakamura,  Kohji Sobataka,  Shigeo Tsujii,  Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings, pp. 95 - 109, ASIACRYPT 1998.

[Electronic Edition][Cited 12 times ]

Joseph H. Silverman,  Joe Suzuki,  Elliptic Curve Discrete Logarithms and the Index Calculus, pp. 110 - 125, ASIACRYPT 1998.

[Electronic Edition][Cited 73 times Red Star]

Hongjun Wu,  Feng Bao,  Robert H. Deng,  Qin-Zhong Ye,  Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers, pp. 126 - 132, ASIACRYPT 1998.

[Electronic Edition][Cited 5 times ]

Hongjun Wu,  Feng Bao,  Robert H. Deng,  Qin-Zhong Ye,  Improved Truncated Differential Attacks on SAFER, pp. 133 - 147, ASIACRYPT 1998.

[Electronic Edition][Cited 6 times ]

Thomas Pornin,  Optimal Resistance Against the Davies and Murphy Attack, pp. 148 - 159, ASIACRYPT 1998.

[Electronic Edition][Cited 4 times ]

Jan Camenisch,  Markus Michels,  A Group Signature Scheme with Improved Efficiency, pp. 160 - 174, ASIACRYPT 1998.

[Electronic Edition][Cited 181 times Red StarRed Star]

Chae Hoon Lim,  Pil Joong Lee,  A Study on the Proposed Korean Digital Signature Algorithm, pp. 175 - 186, ASIACRYPT 1998.

[Electronic Edition][Cited 21 times ]

Anne Canteaut,  Nicolas Sendrier,  Cryptanalysis of the Original McEliece Cryptosystem, pp. 187 - 199, ASIACRYPT 1998.

[Electronic Edition][Cited 51 times Red Star]

Hung-Min Sun,  Improving the Security of the McEliece Public-Key Cryptosystem, pp. 200 - 213, ASIACRYPT 1998.

[Electronic Edition][Cited 12 times ]

Wenbo Mao,  Chae Hoon Lim,  Cryptanalysis in Prime Order Subgroups of Z, pp. 214 - 226, ASIACRYPT 1998.

[Electronic Edition][Cited 25 times ]

Zong-Duo Dai,  Ding-Feng Ye,  Kwok-Yan Lam,  Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC, pp. 227 - 241, ASIACRYPT 1998.

[Electronic Edition][No citation]

Reihaneh Safavi-Naini,  Huaxiong Wang,  Bounds and Constructions for Multireceiver Authentication Codes, pp. 242 - 256, ASIACRYPT 1998.

[Electronic Edition][Cited 4 times ]

Yair Frankel,  Yiannis Tsiounis,  Moti Yung,  Fair Off-Line e-cash Made Easy, pp. 257 - 270, ASIACRYPT 1998.

[Electronic Edition][Cited 66 times Red Star]

Colin Boyd,  Ernest Foo,  Off-Line Fair Payment Protocols Using Convertible Signatures, pp. 271 - 285, ASIACRYPT 1998.

[Electronic Edition][Cited 122 times Red StarRed Star]

Liqun Chen,  Efficient Fair Exchange with Verifiable Confirmation of Signatures, pp. 286 - 299, ASIACRYPT 1998.

[Electronic Edition][Cited 66 times Red Star]

Donald Beaver,  Adaptively Secure Oblivious Transfer, pp. 300 - 314, ASIACRYPT 1998.

[Electronic Edition][Cited 8 times ]

Wen-Feng Qi,  Jun-Hui Yang,  Jing Jun Zhou,  ML-Sequences over Rings , pp. 315 - 326, ASIACRYPT 1998.

[Electronic Edition][Cited 10 times ]

Lars R. Knudsen,  Willi Meier,  Bart Preneel,  Vincent Rijmen,  Sven Verdoolaege,  Analysis Methods for (Alleged) RC4, pp. 327 - 341, ASIACRYPT 1998.

[Electronic Edition][Cited 91 times Red Star]

Thomas Johansson,  Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators, pp. 342 - 356, ASIACRYPT 1998.

[Electronic Edition][Cited 59 times Red Star]

Julien P. Stern,  A New Efficient All-Or-Nothing Disclosure of Secrets Protocol, pp. 357 - 371, ASIACRYPT 1998.

[Electronic Edition][Cited 104 times Red StarRed Star]

Phong Q. Nguyen,  Jacques Stern,  The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure, pp. 372 - 379, ASIACRYPT 1998.

[Electronic Edition][Cited 34 times ]

Mike Burmester,  Yvo Desmedt,  Jennifer Seberry,  Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically), pp. 380 - 391, ASIACRYPT 1998.

[Electronic Edition][Cited 28 times ]

Yvo Desmedt,  Shuang Hou,  Jean-Jacques Quisquater,  Audio and Optical Cryptography, pp. 392 - 404, ASIACRYPT 1998.

[Electronic Edition][Cited 14 times ]

Stefan Wolf,  Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement, pp. 405 - 419, ASIACRYPT 1998.

[Electronic Edition][Cited 12 times ]

Kaoru Kurosawa,  Takuya Yoshida,  Yvo Desmedt,  Mike Burmester,  Some Bounds and a Construction for Secure Broadcast Encryption, pp. 420 - 433, ASIACRYPT 1998.

[Electronic Edition][Cited 21 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...