Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of pkc 1998
Page
Title
1-13
Distributed Public Key Cryptosystems
14-28
How (not) to Design RSA Signature Schemes
29-49
Overview of Elliptic Curve Cryptography
50-54
Lattices and Cryptography: An Overview
55-59
A Signcryption Scheme with Signature Directly Verifiable by Public Key
60-71
Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders
72-82
Lower Bounds on Term-Based Divisible Cash Systems
83-98
Certifying Trust
99-116
On the Security of Server-Aided RSA Protocols
117-134
On the Security of ElGamal Based Encryption
135-148
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks
149-153
On the Security of Girault`s Identification Scheme
154-163
A Scheme for Obtaining a Message from the Digital Multisignature
164-181
Secure Hyperelliptic Cryptosystems and Their Performances
182-194
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer
195-202
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map
203-216
Public-Key Cryptosystems Using the Modular Group
217-233
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
234-246
A New Hash Function Based on MDx-Family and Its Application to MAC
247-252
Security Issues for Contactless Smart Cards
253-257
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm
258-262
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme