Cryptographers' World
 

PKC 2005


[Sort by page number] [Sort by citations count]

 
Serge Vaudenay, editor, Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings. Springer, 2005. ISBN 3-540-24454-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.



Oded Yacobi,  Yacov Yacobi,  A New Related Message Attack on RSA, pp. 1 - 8, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2 times ]

Daniel Bleichenbacher,  Breaking a Cryptographic Protocol with Pseudoprimes, pp. 9 - 15, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

David Naccache,  Phong Q. Nguyen,  Michael Tunstall,  Claire Whelan,  Experimenting with Faults, Lattices and the DSA, pp. 16 - 28, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 34 times ]

Jakob Jonsson,  Matthew J. B. Robshaw,  Securing RSA-KEM via the AES, pp. 29 - 46, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

Michel Abdalla,  Olivier Chevassut,  David Pointcheval,  One-Time Verifier-Based Encrypted Key Exchange, pp. 47 - 64, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 61 times Red Star]

Michel Abdalla,  Pierre-Alain Fouque,  David Pointcheval,  Password-Based Authenticated Key Exchange in the Three-Party Setting, pp. 65 - 84, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 147 times Red StarRed Star]

Werner Schindler,  On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods, pp. 85 - 103, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 12 times ]

Kristian Gj√łsteen,  Symmetric Subgroup Membership Problems, pp. 104 - 119, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

Emil Ong,  John Kubiatowicz,  Optimizing Robustness While Generating Shared Secret Safe Primes, pp. 120 - 137, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

Wu-Chuan Yang,  Dah-Jyh Guan,  Chi-Sung Laih,  Fast Multi-computations with Integer Similarity Strategy, pp. 138 - 153, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

Endre Bangerter,  Jan Camenisch,  Ueli M. Maurer,  Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order, pp. 154 - 171, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

Cheng-Kang Chu,  Wen-Guey Tzeng,  Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries, pp. 172 - 183, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

Ron Steinfeld,  Scott Contini,  Huaxiong Wang,  Josef Pieprzyk,  Converse Results to the Wiener Attack on RSA, pp. 184 - 198, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

Hung-Min Sun,  Cheng-Ta Yang,  RSA with Balanced Short Exponents and Its Application to Entity Authentication, pp. 199 - 215, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 26 times ]

Ryotaro Hayashi,  Keisuke Tanaka,  The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity, pp. 216 - 233, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

Julien Cathalo,  Jean-S√©bastien Coron,  David Naccache,  From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited, pp. 234 - 243, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

Lih-Chung Wang,  Yuh-Hua Hu,  Feipei Lai,  Chun-yen Chou,  Bo-Yin Yang,  Tractable Rational Map Signature, pp. 244 - 257, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

Antoine Joux,  S√©bastien Kunz-Jacques,  Fr√©d√©ric Muller,  Pierre-Michel Ricordel,  Cryptanalysis of the Tractable Rational Map Cryptosystem, pp. 258 - 274, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 12 times ]

Christopher Wolf,  Bart Preneel,  Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems, pp. 275 - 287, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

Jintai Ding,  Dieter Schmidt,  Cryptanalysis of HFEv and Internal Perturbation of HFE, pp. 288 - 301, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 30 times ]

Louis Granboulan,  A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible, pp. 302 - 312, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

Dario Catalano,  Rosario Gennaro,  Cramer-Damg√•rd Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring, pp. 313 - 327, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

Wakaha Ogata,  Kaoru Kurosawa,  Swee-Huay Heng,  The Security of the FDH Variant of Chaum's Undeniable Signature Scheme, pp. 328 - 345, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 38 times ]

Ivan Damgard,  Kasper Dupont,  Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions, pp. 346 - 361, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

Liqun Chen,  John Malone-Lee,  Improved Identity-Based Signcryption, pp. 362 - 379, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 112 times Red StarRed Star]

Joonsang Baek,  Reihaneh Safavi-Naini,  Willy Susilo,  Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption, pp. 380 - 397, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 52 times Red Star]

Sattam S. Al-Riyami,  Kenneth G. Paterson,  CBE from CL-PKE: A Generic Construction and Efficient Schemes, pp. 398 - 415, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 89 times Red Star]

Yevgeniy Dodis,  Aleksandr Yampolskiy,  A Verifiable Random Function with Short Proofs and Keys, pp. 416 - 431, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 91 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...