Search dblp for Publications

export results for "toc:db/conf/asiacrypt/asiacrypt98.bht:"

 download as .bib file

@inproceedings{DBLP:conf/asiacrypt/Beaver98,
  author       = {Donald Beaver},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Adaptively Secure Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {300--314},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_24},
  doi          = {10.1007/3-540-49649-1\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Beaver98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehDF98,
  author       = {Dan Boneh and
                  Glenn Durfee and
                  Yair Frankel},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {An Attack on {RSA} Given a Small Fraction of the Private Key Bits},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {25--34},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_3},
  doi          = {10.1007/3-540-49649-1\_3},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonehDF98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoydF98,
  author       = {Colin Boyd and
                  Ernest Foo},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Off-Line Fair Payment Protocols Using Convertible Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {271--285},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_22},
  doi          = {10.1007/3-540-49649-1\_22},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoydF98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BurmesterDS98,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Jennifer Seberry},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Equitable Key Escrow with Limited Time Span (or, How to Enforce Time
                  Expiration Cryptographically)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {380--391},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_30},
  doi          = {10.1007/3-540-49649-1\_30},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BurmesterDS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischM98,
  author       = {Jan Camenisch and
                  Markus Michels},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {A Group Signature Scheme with Improved Efficiency},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_14},
  doi          = {10.1007/3-540-49649-1\_14},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CamenischM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CanteautS98,
  author       = {Anne Canteaut and
                  Nicolas Sendrier},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Cryptanalysis of the Original McEliece Cryptosystem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {187--199},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_16},
  doi          = {10.1007/3-540-49649-1\_16},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CanteautS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChaoNST98,
  author       = {Jinhui Chao and
                  Osamu Nakamura and
                  Kohji Sobataka and
                  Shigeo Tsujii},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Construction of Secure Elliptic Cryptosystems Using {CM} Tests and
                  Liftings},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {95--109},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_9},
  doi          = {10.1007/3-540-49649-1\_9},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChaoNST98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Chen98,
  author       = {Liqun Chen},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Efficient Fair Exchange with Verifiable Confirmation of Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {286--299},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_23},
  doi          = {10.1007/3-540-49649-1\_23},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Chen98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CohenMO98,
  author       = {Henri Cohen and
                  Atsuko Miyaji and
                  Takatoshi Ono},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Efficient Elliptic Curve Exponentiation Using Mixed Coordinates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_6},
  doi          = {10.1007/3-540-49649-1\_6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CohenMO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DaiYL98,
  author       = {Zong{-}Duo Dai and
                  Dingfeng Ye and
                  Kwok{-}Yan Lam},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Weak Invertibiity of Finite Automata and Cryptanalysis on {FAPKC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {227--241},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_19},
  doi          = {10.1007/3-540-49649-1\_19},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DaiYL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DesmedtHQ98,
  author       = {Yvo Desmedt and
                  Shuang Hou and
                  Jean{-}Jacques Quisquater},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Audio and Optical Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {392--404},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_31},
  doi          = {10.1007/3-540-49649-1\_31},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DesmedtHQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FrankelTY98,
  author       = {Yair Frankel and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Fair Off-Line e-cash Made Easy},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {257--270},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_21},
  doi          = {10.1007/3-540-49649-1\_21},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FrankelTY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/IzuKNY98,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Masayuki Noro and
                  Kazuhiro Yokoyama},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Efficient Implementation of Schoof's Algorithm},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {66--79},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_7},
  doi          = {10.1007/3-540-49649-1\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/IzuKNY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Johansson98,
  author       = {Thomas Johansson},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {342--356},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_27},
  doi          = {10.1007/3-540-49649-1\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Johansson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Kaliski98,
  author       = {Burton S. Kaliski Jr.},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {{ECC/DLP} and Fractoring-Based Cryptography: {A} Tale of Two Families
                  (Abstract)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {50},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_5},
  doi          = {10.1007/3-540-49649-1\_5},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Kaliski98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98,
  author       = {Lars R. Knudsen and
                  Willi Meier and
                  Bart Preneel and
                  Vincent Rijmen and
                  Sven Verdoolaege},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Analysis Methods for (Alleged) {RC4}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_26},
  doi          = {10.1007/3-540-49649-1\_26},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenMPRV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaYDB98,
  author       = {Kaoru Kurosawa and
                  Takuya Yoshida and
                  Yvo Desmedt and
                  Mike Burmester},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Some Bounds and a Construction for Secure Broadcast Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {420--433},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_33},
  doi          = {10.1007/3-540-49649-1\_33},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaYDB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Lenstra98,
  author       = {Arjen K. Lenstra},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Generating {RSA} Moduli with a Predetermined Portion},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_1},
  doi          = {10.1007/3-540-49649-1\_1},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Lenstra98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LimL98,
  author       = {Chae Hoon Lim and
                  Pil Joong Lee},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {A Study on the Proposed Korean Digital Signature Algorithm},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {175--186},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_15},
  doi          = {10.1007/3-540-49649-1\_15},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LimL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MaoL98,
  author       = {Wenbo Mao and
                  Chae Hoon Lim},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Cryptanalysis in Prime Order Subgroups of \emph{Z}\({}^{\mbox{*}}\)\({}_{\mbox{n}}\)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {214--226},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_18},
  doi          = {10.1007/3-540-49649-1\_18},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MaoL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NguyenS98,
  author       = {Phong Q. Nguyen and
                  Jacques Stern},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {The B{\'{e}}guin-Quisquater Server-Aided {RSA} Protocol from
                  Crypto '95 is not Secure},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {372--379},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_29},
  doi          = {10.1007/3-540-49649-1\_29},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NguyenS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatarinGC98,
  author       = {Jacques Patarin and
                  Louis Goubin and
                  Nicolas T. Courtois},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {\emph{C}\({}^{\mbox{*}}\)\({}_{\mbox{-+}}\) and {HM:} Variations Around
                  Two Schemes of T. Matsumoto and H. Imai},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {35--49},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_4},
  doi          = {10.1007/3-540-49649-1\_4},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatarinGC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Pornin98,
  author       = {Thomas Pornin},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Optimal Resistance Against the Davies and Murphy Attack},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_13},
  doi          = {10.1007/3-540-49649-1\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Pornin98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PoupardS98,
  author       = {Guillaume Poupard and
                  Jacques Stern},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Generation of Shared {RSA} Keys by Two Parties},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {11--24},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_2},
  doi          = {10.1007/3-540-49649-1\_2},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PoupardS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/QiYZ98,
  author       = {Wen Feng Qi and
                  Jun{-}Hui Yang and
                  Jing Jun Zhou},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {ML-Sequences over Rings \emph{Z/(2\({}^{\mbox{e}}\))}\({}^{\mbox{*}}\):
                  I. Constructions of Nondegenerative ML-Sequences {II.} Injectiveness
                  of Compression Mappings of New Classes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {315--326},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_25},
  doi          = {10.1007/3-540-49649-1\_25},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/QiYZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Safavi-NainiW98,
  author       = {Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Bounds and Constructions for Multireceiver Authentication Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {242--256},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_20},
  doi          = {10.1007/3-540-49649-1\_20},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Safavi-NainiW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SakaiS98,
  author       = {Yasuyuki Sakai and
                  Kouichi Sakurai},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Design of Hyperelliptic Cryptosystems in Small Characteristic and
                  a Software Implementation over F\({}_{\mbox{2}}\)n},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {80--94},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_8},
  doi          = {10.1007/3-540-49649-1\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SakaiS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SilvermanS98,
  author       = {Joseph H. Silverman and
                  Joe Suzuki},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Elliptic Curve Discrete Logarithms and the Index Calculus},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {110--125},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_10},
  doi          = {10.1007/3-540-49649-1\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SilvermanS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Stern98,
  author       = {Julien P. Stern},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {A New Efficient All-Or-Nothing Disclosure of Secrets Protocol},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {357--371},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_28},
  doi          = {10.1007/3-540-49649-1\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Stern98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Sun98,
  author       = {Hung{-}Min Sun},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Improving the Security of the McEliece Public-Key Cryptosystem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {200--213},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_17},
  doi          = {10.1007/3-540-49649-1\_17},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Sun98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Wolf98,
  author       = {Stefan Wolf},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Strong Security Against Active Attacks in Information-Theoretic Secret-Key
                  Agreement},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {405--419},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_32},
  doi          = {10.1007/3-540-49649-1\_32},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Wolf98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WuBDY98,
  author       = {Hongjun Wu and
                  Feng Bao and
                  Robert H. Deng and
                  Qin{-}Zhong Ye},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {126--132},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_11},
  doi          = {10.1007/3-540-49649-1\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WuBDY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WuBDY98a,
  author       = {Hongjun Wu and
                  Feng Bao and
                  Robert H. Deng and
                  Qin{-}Zhong Ye},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Improved Truncated Differential Attacks on {SAFER}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_12},
  doi          = {10.1007/3-540-49649-1\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WuBDY98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1998,
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1},
  doi          = {10.1007/3-540-49649-1},
  isbn         = {3-540-65109-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics