Search dblp for Publications

export results for "toc:db/conf/pkc/pkc2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/pkc/AbdallaBCP09,
  author       = {Michel Abdalla and
                  Xavier Boyen and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Distributed Public-Key Cryptography from Weak Secrets},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {139--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_9},
  doi          = {10.1007/978-3-642-00468-1\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeKO09,
  author       = {Masayuki Abe and
                  Eike Kiltz and
                  Tatsuaki Okamoto},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Compact CCA-Secure Encryption for Messages of Arbitrary Length},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_21},
  doi          = {10.1007/978-3-642-00468-1\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AkiyamaGM09,
  author       = {Koichiro Akiyama and
                  Yasuhiro Goto and
                  Hideyuki Miyake},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {An Algebraic Surface Cryptosystem},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {425--442},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_24},
  doi          = {10.1007/978-3-642-00468-1\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AkiyamaGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Aono09,
  author       = {Yoshinori Aono},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {A New Lattice Construction for Partial Key Exposure Attack for {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {34--53},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_3},
  doi          = {10.1007/978-3-642-00468-1\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Aono09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehFKW09,
  author       = {Dan Boneh and
                  David Mandell Freeman and
                  Jonathan Katz and
                  Brent Waters},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_5},
  doi          = {10.1007/978-3-642-00468-1\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BonehFKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaFFLPSSV09,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Tobias Freudenreich and
                  Anja Lehmann and
                  Marcus Page and
                  Jakob Schelbert and
                  Dominique Schr{\"{o}}der and
                  Florian Volk},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Security of Sanitizable Signatures Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_18},
  doi          = {10.1007/978-3-642-00468-1\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrzuskaFFLPSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKRS09,
  author       = {Jan Camenisch and
                  Markulf Kohlweiss and
                  Alfredo Rial and
                  Caroline Sheedy},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Blind and Anonymous Identity-Based Encryption and Authorised Private
                  Searches on Public Key Encrypted Data},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_12},
  doi          = {10.1007/978-3-642-00468-1\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischKRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKS09,
  author       = {Jan Camenisch and
                  Markulf Kohlweiss and
                  Claudio Soriente},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
                  Anonymous Credentials},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {481--500},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_27},
  doi          = {10.1007/978-3-642-00468-1\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Chow09,
  author       = {Sherman S. M. Chow},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Removing Escrow from Identity-Based Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {256--276},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_15},
  doi          = {10.1007/978-3-642-00468-1\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Chow09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoullGH09,
  author       = {Scott E. Coull and
                  Matthew Green and
                  Susan Hohenberger},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Controlling Access to an Oblivious Database Using Stateful Anonymous
                  Credentials},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {501--520},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_28},
  doi          = {10.1007/978-3-642-00468-1\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoullGH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardGKN09,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard and
                  Jesper Buus Nielsen},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Asynchronous Multiparty Computation: Theory and Implementation},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_10},
  doi          = {10.1007/978-3-642-00468-1\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardGKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardM09,
  author       = {Ivan Damg{\aa}rd and
                  Gert L{\ae}ss{\o}e Mikkelsen},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {On the Theory and Practice of Personal Digital Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {277--296},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_16},
  doi          = {10.1007/978-3-642-00468-1\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FischlinS09,
  author       = {Marc Fischlin and
                  Dominique Schr{\"{o}}der},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Security of Blind Signatures under Aborts},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {297--316},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_17},
  doi          = {10.1007/978-3-642-00468-1\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FischlinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GhodosiP09,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Multi-Party Computation with Omnipresent Adversary},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {180--195},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_11},
  doi          = {10.1007/978-3-642-00468-1\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GhodosiP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GorantlaBN09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange
                  Protocols},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {105--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_7},
  doi          = {10.1007/978-3-642-00468-1\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GorantlaBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HerrmannL09,
  author       = {Mathias Herrmann and
                  Gregor Leander},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {A Practical Key Recovery Attack on Basic TCHo},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {411--424},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_23},
  doi          = {10.1007/978-3-642-00468-1\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HerrmannL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HooghSSV09,
  author       = {Sebastiaan de Hoogh and
                  Berry Schoenmakers and
                  Boris Skoric and
                  Jos{\'{e}} Villegas},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Verifiable Rotation of Homomorphic Encryptions},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_22},
  doi          = {10.1007/978-3-642-00468-1\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HooghSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JunodKL09,
  author       = {Pascal Junod and
                  Alexandre Karlov and
                  Arjen K. Lenstra},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Improving the Boneh-Franklin Traitor Tracing Scheme},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {88--104},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_6},
  doi          = {10.1007/978-3-642-00468-1\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JunodKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiayiasZ09,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Zero-Knowledge Proofs with Witness Elimination},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_8},
  doi          = {10.1007/978-3-642-00468-1\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KiayiasZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KimCH09,
  author       = {Minkyu Kim and
                  Jung Hee Cheon and
                  Jin Hong},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Subset-Restricted Random Walks for Pollard rho Method on F\({}_{\mbox{p\({}^{\mbox{m}}\)}}\)},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {54--67},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_4},
  doi          = {10.1007/978-3-642-00468-1\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KimCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertV09,
  author       = {Beno{\^{\i}}t Libert and
                  Damien Vergnaud},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Towards Black-Box Accountable Authority {IBE} with Short Ciphertexts
                  and Private Keys},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {235--255},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_14},
  doi          = {10.1007/978-3-642-00468-1\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LongaG09,
  author       = {Patrick Longa and
                  Catherine H. Gebotys},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Fast Multibase Methods and Other Several Optimizations for Elliptic
                  Curve Scalar Multiplication},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {443--462},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_25},
  doi          = {10.1007/978-3-642-00468-1\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LongaG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Matt09,
  author       = {Brian J. Matt},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Identification of Multiple Invalid Signatures in Pairing-Based Batched
                  Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {337--356},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_19},
  doi          = {10.1007/978-3-642-00468-1\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Matt09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MayR09,
  author       = {Alexander May and
                  Maike Ritzenhofen},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit
                  Hint},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_1},
  doi          = {10.1007/978-3-642-00468-1\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MayR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MorilloR09,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {The Security of All Bits Using List Decoding},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {15--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_2},
  doi          = {10.1007/978-3-642-00468-1\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MorilloR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NakanishiFHF09,
  author       = {Toru Nakanishi and
                  Hiroki Fujii and
                  Yuta Hira and
                  Nobuo Funabiki},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Revocable Group Signature Schemes with Constant Costs for Signing
                  and Verifying},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {463--480},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_26},
  doi          = {10.1007/978-3-642-00468-1\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NakanishiFHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SeoKOS09,
  author       = {Jae Hong Seo and
                  Tetsutaro Kobayashi and
                  Miyako Ohkubo and
                  Koutarou Suzuki},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Anonymous Hierarchical Identity-Based Encryption with Constant Size
                  Ciphertexts},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {215--234},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_13},
  doi          = {10.1007/978-3-642-00468-1\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SeoKOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShaoC09,
  author       = {Jun Shao and
                  Zhenfu Cao},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {CCA-Secure Proxy Re-encryption without Pairings},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {357--376},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_20},
  doi          = {10.1007/978-3-642-00468-1\_20},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShaoC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2009,
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1},
  doi          = {10.1007/978-3-642-00468-1},
  isbn         = {978-3-642-00467-4},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics