Cryptographers' World
 

ASIACRYPT 2001


[Sort by page number] [Sort by citations count]

 
Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings. Springer, 2001. ISBN 3-540-42987-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Craig Gentry,  Jakob Jonsson,  Jacques Stern,  Michael Szydlo,  Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001, pp. 1 - 20, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

Phong Q. Nguyen,  Igor Shparlinski,  On the Insecurity of a Server-Aided RSA Protocol, pp. 21 - 35, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 12 times ]

Dan Boneh,  Shai Halevi,  Nick Howgrave-Graham,  The Modular Inversion Hidden Number Problem, pp. 36 - 51, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 29 times ]

Nicholas J. Hopper,  Manuel Blum,  Secure Human Identification Protocols, pp. 52 - 66, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 198 times Red StarRed Star]

Arjen K. Lenstra,  Unbelievable Security. Matching AES Security Using Public Key Systems, pp. 67 - 86, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 72 times Red Star]

Siguna Müller,  A Probable Prime Test with Very High Confidence for n equiv 1 mod 4, pp. 87 - 106, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2 times ]

Emmanuel Thomé,  Computation of Discrete Logarithms in F_(2^607), pp. 107 - 124, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

Martijn Stam,  Arjen K. Lenstra,  Speeding Up XTR, pp. 125 - 143, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 61 times Red Star]

Jae Choon Cha,  Ki Hyoung Ko,  Sangjin Lee,  Jae Woo Han,  Jung Hee Cheon,  An Efficient Implementation of Braid Groups, pp. 144 - 156, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 65 times Red Star]

Nicolas Courtois,  Matthieu Finiasz,  Nicolas Sendrier,  How to Achieve a McEliece-Based Digital Signature Scheme, pp. 157 - 174, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 97 times Red Star]

Alice Silverberg,  Jessica Staddon,  Judy L. Walker,  Efficient Traitor Tracing Algorithms Using List Decoding, pp. 175 - 192, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

Makoto Sugita,  Kazukuni Kobara,  Hideki Imai,  Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis, pp. 193 - 207, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

Deukjo Hong,  Jaechul Sung,  Seokhie Hong,  Wonil Lee,  Sangjin Lee,  Jongin Lim,  Okyeon Yi,  Known-IV Attacks on Triple Modes of Operation of Block Ciphers, pp. 208 - 221, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

Jacques Patarin,  Generic Attacks on Feistel Schemes, pp. 222 - 238, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

Akashi Satoh,  Sumio Morioka,  Kohji Takano,  Seiji Munetoh,  A Compact Rijndael Hardware Architecture with S-Box Optimization, pp. 239 - 254, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 291 times Red StarRed StarRed Star]

Ju-Sung Kang,  Sang Uk Shin,  Dowon Hong,  Okyeon Yi,  Provable Security of KASUMI and 3GPP Encryption Mode f8, pp. 255 - 271, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

Duncan S. Wong,  Agnes Hui Chan,  Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices, pp. 272 - 289, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 90 times Red Star]

Emmanuel Bresson,  Olivier Chevassut,  David Pointcheval,  Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case, pp. 290 - 309, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 161 times Red StarRed Star]

Pierre-Alain Fouque,  Jacques Stern,  Fully Distributed Threshold RSA under Standard Assumptions, pp. 310 - 330, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 61 times Red Star]

Anna Lysyanskaya,  Chris Peikert,  Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes, pp. 331 - 350, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

Pierre-Alain Fouque,  David Pointcheval,  Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks, pp. 351 - 368, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 78 times Red Star]

Yan-Cheng Chang,  Chi-Jen Lu,  Oblivious Polynomial Evaluation and Oblivious Neural Learning, pp. 369 - 384, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 42 times ]

Moses Liskov,  Anna Lysyanskaya,  Silvio Micali,  Leonid Reyzin,  Adam Smith,  Mutually Independent Commitments, pp. 385 - 401, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

Nicolas Courtois,  Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank, pp. 402 - 421, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

Tzafrir Cohen,  Joe Kilian,  Erez Petrank,  Responsive Round Complexity and Concurrent Zero-Knowledge, pp. 422 - 441, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

Johan HÃ¥stad,  Mats Näslund,  Practical Construction and Analysis of Pseudo-Randomness Primitives, pp. 442 - 459, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

Yuriy Tarannikov,  Peter Korolev,  Anton Botev,  Autocorrelation Coefficients and Correlation Immunity of Boolean Functions, pp. 460 - 479, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

Pierrick Gaudry,  Nicolas Gürel,  An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves, pp. 480 - 494, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

Steven D. Galbraith,  Supersingular Curves in Cryptography, pp. 495 - 513, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 205 times Red StarRed Star]

Dan Boneh,  Ben Lynn,  Hovav Shacham,  Short Signatures from the Weil Pairing, pp. 514 - 532, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1486 times Red StarRed StarRed StarRed StarRed Star]

Eric R. Verheul,  Self-Blindable Credential Certificates from the Weil Pairing, pp. 533 - 551, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 106 times Red StarRed Star]

Ronald L. Rivest,  Adi Shamir,  Yael Tauman,  How to Leak a Secret, pp. 552 - 565, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 601 times Red StarRed StarRed StarRed Star]

Mihir Bellare,  Alexandra Boldyreva,  Anand Desai,  David Pointcheval,  Key-Privacy in Public-Key Encryption, pp. 566 - 582, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 184 times Red StarRed Star]

Masayuki Abe,  Miyako Ohkubo,  Provably Secure Fair Blind Signatures with Tight Revocation, pp. 583 - 602, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...