default search action
11. PKC 2008: Barcelona, Spain
- Ronald Cramer:
Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings. Lecture Notes in Computer Science 4939, Springer 2008, ISBN 978-3-540-78439-5 - Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern:
Total Break of the l-IC Signature Scheme. 1-17 - Petros Mol, Moti Yung:
Recovering NTRU Secret Key from Inversion Oracles. 18-36 - Alexander May, Maike Ritzenhofen:
Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? 37-46 - James Birkett, Alexander W. Dent:
Relations Among Notions of Plaintext Awareness. 47-64 - Carmine Ventre, Ivan Visconti:
Completely Non-malleable Encryption Revisited. 65-84 - Éric Levieil, David Naccache:
Cryptographic Test Correction. 85-100 - Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro:
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. 101-120 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini:
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. 121-140 - Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson:
Proxy Signatures Secure Against Proxy Key Exposure. 141-161 - Vadim Lyubashevsky:
Lattice-Based Identification Schemes Secure Under Active Attacks. 162-179 - Sebastian Faust, Emilia Käsper, Stefan Lucks:
Efficient Simultaneous Broadcast. 180-196 - Sven Laur, Sylvain Pasini:
SAS-Based Group Authentication and Key Agreement Protocols. 197-213 - Miaoqing Huang, Kris Gaj, Soonhak Kwon, Tarek A. El-Ghazawi:
An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm. 214-228 - Patrick Longa, Ali Miri:
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. 229-247 - Moses D. Liskov, Silvio Micali:
Online-Untransferable Signatures. 248-267 - Akira Numayama, Toshiyuki Isshiki, Keisuke Tanaka:
Security of Digital Signature Schemes in Weakened Random Oracle Models. 268-287 - Thomas Plantard, Willy Susilo, Khin Than Win:
A Digital Signature Scheme Based on CVPinfinity. 288-307 - Steven D. Galbraith, Eric R. Verheul:
An Analysis of the Vector Decomposition Problem. 308-327 - Sungwook Kim, Jung Hee Cheon:
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents. 328-343 - Alexander W. Dent, Benoît Libert, Kenneth G. Paterson:
Certificateless Encryption Schemes Strongly Secure in the Standard Model. 344-359 - Benoît Libert, Damien Vergnaud:
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. 360-379 - Yi-Ru Liu, Wen-Guey Tzeng:
Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. 380-396
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.